Showing only posts tagged Tech. Show all posts.

Hackers backdoor PHP source code after breaching internal git server

Source

Enlarge (credit: BeeBright / Getty Images / iStockphoto ) A hacker compromised the server used to distribute the PHP programming language and added a backdoor to source code that would have made websites vulnerable to complete takeover, members of the open source project said. Two updates pushed to the PHP Git server …

Hackers access security cameras inside Cloudflare, jails, and hospitals

Source

Enlarge (credit: Getty Images) Hackers say they broke into the network of Silicon Valley startup Verkada and gained access to live video feeds from more than 150,000 surveillance cameras the company manages for Cloudflare, Tesla, and a host of other organizations. The group published videos and images they …

Gab, a haven for pro-Trump conspiracy theories, has been hacked again

Source

Enlarge (credit: Aurich Lawson) Beleaguered social networking site Gab was breached on Monday, marking the second time in as many weeks that hackers have gained unauthorized access to a platform that caters to users pushing hate speech and pro-Trump conspiracy theories. The compromise came to light after someone hijacked …

Tens of thousands of US organizations hit in ongoing Microsoft Exchange hack

Source

Enlarge (credit: Getty Images ) Tens of thousands of US-based organizations are running Microsoft Exchange servers that have been backdoored by threat actors who are stealing administrator passwords and exploiting critical vulnerabilities in the email and calendaring application, it was widely reported. Microsoft issued emergency patches on Tuesday, but they …

A new type of supply-chain attack with serious consequences is flourishing

Source

Enlarge (credit: Przemyslaw Klos / EyeEm / Getty Images ) A new type of supply chain attack unveiled last month is targeting more and more companies, with new rounds this week taking aim at Microsoft, Amazon, Slack, Lyft, Zillow, and an unknown number of others. In weeks past, Apple, Microsoft, Tesla, and …

Donald Trump is one of 15,000 Gab users whose account just got hacked

Source

Enlarge (credit: Gab.com ) The founder of the far-right social media platform Gab said that the private account of former President Donald Trump was among the data stolen and publicly released by hackers who recently breached the site. In a statement on Sunday, founder Andrew Torba used a transphobic …

Trump’s is one of 15,000 Gab accounts that just got hacked

Source

Enlarge (credit: Gab.com ) The founder of the far-right social media platform Gab said that the private account of former President Donald Trump was among the data stolen and publicly released by hackers who recently breached the site. In a statement on Sunday, founder Andrew Torba used a transphobic …

Android users now have an easy way to check the security of their passwords

Source

Enlarge (credit: Getty Images) Google is adding its password checkup feature to Android, making the mobile OS the latest company offering to give users an easy way to check if the passcodes they’re using have been compromised. Password Checkup works by checking credentials entered into apps against a …

New malware found on 30,000 Macs has security pros stumped

Source

Enlarge (credit: Jayson Photography / Getty Images ) A previously undetected piece of malware found on almost 30,000 Macs worldwide is generating intrigue in security circles, which are still trying to understand precisely what it does and what purpose its self-destruct capability serves. Once an hour, infected Macs check a …

New browser-tracking hack works even when you flush caches or go incognito

Source

Enlarge (credit: Getty Images) The prospect of Web users being tracked by the sites they visit has prompted several countermeasures over the years, including using Privacy Badger or an alternate anti-tracking extension, enabling private or incognito browsing sessions, or clearing cookies. Now, websites have a new way to defeat …

New type of supply-chain attack hit Apple, Microsoft and 33 other companies

Source

Enlarge (credit: Getty Images) Last week, a researcher demonstrated a new supply-chain attack that executed counterfeit code on networks belonging to some of the biggest companies on the planet, Apple, Microsoft, and Tesla included. Now, fellow researchers are peppering the Internet with copycat packages, with more than 150 of …

Microsoft is seeing a big spike in Web shell use

Source

Enlarge (credit: Getty Images) Security personnel at Microsoft are seeing a big increase in the use of Web shells, the light-weight programs that hackers install so they can burrow further into compromised websites. The average number of Web shells installed from August, 2020 to January of this year was …

Android barcode scanner with 10 million+ downloads infects users

Source

Enlarge (credit: portal gda / Flickr ) A benign barcode scanner with more than 10 million downloads from Google Play has been caught receiving an upgrade that turned it to the dark side, prompting the search-and-advertising giant to remove it. Barcode Scanner, one of dozens of such apps available in the …

Chrome users have faced 3 security concerns over the past 24 hours

Source

(credit: Chrome ) Users of Google’s Chrome browser have faced three security concerns over the past 24 hours in the form of a malicious extension with more than 2 million users, a just-fixed zero-day, and new information about how malware can abuse Chrome's sync feature to bypass firewalls. Let …

High-performance computers are under siege by a newly discovered backdoor

Source

Enlarge (credit: Getty Images) High-performance computer networks, some belonging to the world’s most prominent organizations, are under attack by a newly discovered backdoor that gives hackers the ability to remotely execute commands of their choice, researchers said on Tuesday. Kobalos, as researchers from security firm Eset have named …

New supply chain attack uses poisoned updates to infect gamers’ computers

Source

Enlarge / Circuit board with speed motion and light. (credit: Getty Images ) Researchers have uncovered a software supply chain attack that is being used to install surveillance malware on the computers of online gamers. The unknown attackers are targeting select users of NoxPlayer, a software package that emulates the Android …

Home alarm tech backdoored security cameras to spy on customers having sex

Source

Enlarge (credit: Getty Images / Aurich Lawson) A home security technician has admitted he repeatedly broke into cameras he installed and viewed customers engaging in sex and other intimate acts. Telesforo Aviles, a 35-year-old former employee of home and small office security company ADT, said that over a five-year period …

How law enforcement gets around your smartphone’s encryption

Source

Enlarge / Uberwachung, Symbolbild, Datensicherheit, Datenhoheit (credit: Westend61 | Getty Images) Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have …

SolarWinds malware has “curious” ties to Russian-speaking hackers

Source

Enlarge (credit: Getty Images ) The malware used to hack Microsoft, security company FireEye, and at least a half-dozen federal agencies has “interesting similarities” to malicious software that has been circulating since at least 2015, researchers said on Monday. Sunburst is the name security researchers have given to malware that …

« newer articles | page 3