Sicurezza

An Elite Spy Group Used 5 Zero-Days to Hack North Koreans

Pubblicato il

Most North Koreans don’t spend much of their lives in front of a computer. But some of the lucky few who do, it seems, have been hit with a remarkable arsenal of hacking techniques over the last year—a sophisticated spying spree that some researchers suspect South Korea may have pulled off. Cybersecurity researchers at Google’s […]

Sicurezza

How an Elaborate North Korean Crypto Heist Fell Apart

Pubblicato il

At the end of 2018, North Korea carried out a heist. Hackers acting on behalf of the secretive state infiltrated and extracted more than $250 million (£195m) in cryptocurrency. Where the theft took place is a mystery, but the elaborate scheme the hackers used to move the funds back within North Korea has now started […]

Sicurezza

Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys

Pubblicato il

That adds a layer of complexity, but the researchers note that a thief could simply turn the barrel with a screwdriver or hot-wire the car’s ignition switch, just as car thieves did before the introduction of immobilizers neutered those techniques. “You’re downgrading the security to what it was in the ’80s,” says University of Birmingham […]

Sicurezza

A Flaw in Billions of Wi-Fi Chips Let Attackers Decrypt Data

Pubblicato il

Billions of devices—many of them already patched—are affected by a Wi-Fi vulnerability that allows nearby attackers to decrypt sensitive data sent over the air, researchers said on Wednesday at the RSA security conference. ARS TECHNICA This story originally appeared on Ars Technica, a trusted source for technology news, tech policy analysis, reviews, and more. Ars […]

Sicurezza

Gmail Is Catching More Malicious Attachments With Deep Learning

Pubblicato il

Distributing malware by attaching tainted documents to emails is one of the oldest tricks in the book. It’s not just a theoretical risk—real attackers use malicious documents to infect targets all the time. So on top of its anti-spam and anti-phishing efforts, Gmail expanded its malware detection capabilities at the end of last year to […]

Sicurezza

North Korea Is Recycling Mac Malware. That’s Not the Worst Part

Pubblicato il

For years, North Korea’s Lazarus Group hackers have plundered and pillaged the global internet, scamming and infecting digital devices around the world for espionage, profit, and sabotage. One of their weapons of choice: a so-called loader that allows them to clandestinely run a diverse array of malware on targeted Macs with hardly a trace. But […]

Sicurezza

The US Blames Russia’s GRU for Sweeping Cyberattacks in Georgia

Pubblicato il

For more than a decade, Russian hackers have tormented the country’s neighbors, bombarding Estonian websites with junk traffic and even triggering blackouts in Ukraine. As long as Russia has kept those relentless, disruptive cyberattacks within its own region, the West has mostly turned a blind eye. But as the US seeks to head off any […]

Sicurezza

Hundreds of Millions of PC Components Still Have Hackable Firmware

Pubblicato il

That laptop on your desk or that server on a data center rack isn’t so much a computer as a network of them. Its interconnected devices—from hard drives to webcams to trackpads, largely sourced from third parties—have their own dedicated chips and code. That represents a serious security problem: Despite years of warnings, those computers […]

Sicurezza

Over 500 Chrome Extensions Secretly Uploaded Private Data

Pubblicato il

More than 500 browser extensions downloaded millions of times from Google’s Chrome Web Store surreptitiously uploaded private browsing data to attacker-controlled servers, researchers said on Thursday. ARS TECHNICA This story originally appeared on Ars Technica, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED’s parent company, Condé […]