Dan Goodin - Page 7

120 Posts
0 Comments

Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones

EnlargeGetty Images Researchers have devised a low-cost smartphone attack that cracks the authentication fingerprint used to unlock the screen and perform other...

Potentially millions of Android TVs and phones come with malware preinstalled

Enlarge / Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.Getty Images Overall, Android devices...

Malware turns home routers into proxies for Chinese state-sponsored hackers

EnlargeGetty Images Researchers on Tuesday unveiled a major discovery—malicious firmware that can wrangle a wide range of residential and small office routers...

Microsoft is scanning the inside of password-protected zip files for malware

Enlarge Microsoft cloud services are scanning for malware by peeking inside users’ zip files, even when they’re protected by a password, several...

Passkeys may not be for you, but they are safe and easy—here’s why

EnlargeAurich Lawson | Getty Images My recent feature on passkeys attracted significant interest, and a number of the 1,100-plus comments raised questions...

Leak of MSI UEFI signing keys stokes fears of “doomsday” supply chain attack

EnlargeAurich Lawson A ransomware intrusion on hardware manufacturer Micro-Star International, better known as MSI, is stoking concerns of devastating supply chain attacks...

Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown

Enlarge / A domain seizure notice from the Justice Department, showing the national seals of several other governments. The US Justice Department...

T-Mobile discloses 2nd data breach of 2023, this one leaking account PINs and more

EnlargeGetty Images | Bloomberg T-Mobile on Monday said it experienced a hack that exposed account PINs and other customer data in the...

Sensitive data is being leaked from servers running Salesforce software

EnlargeGetty Images Servers running software sold by Salesforce are leaking sensitive data managed by government agencies, banks, and other organizations, according to...

Exploit released for 9.8-severity PaperCut flaw already under attack

EnlargeGetty Images Exploit code for a critical printer software vulnerability became publicly available on Monday in a release that may exacerbate the...

Latest articles