Sicurezza

US Indicts Sandworm, Russia’s Most Destructive Cyberwar Unit

Pubblicato il

The new indictment also represents the first official acknowledgement from the US government that Sandworm was responsible for a cyberattack on the 2018 Winter Olympics, in which a piece of malware known as Olympic Destroyer took down much of the IT infrastructure of the Games just as the opening ceremony was beginning in Pyeongchang, South […]

Sicurezza

Fancy Bear Imposters Are on a Hacking Extortion Spree

Pubblicato il

Ransomware attacks that tear through corporate networks can bring massive organizations to their knees. But even as these hacks reach new popularity highs—and new ethical lows—among attackers, it’s not the only technique criminals are using to shake down corporate victims. A new wave of attacks relies instead on digital extortion—with a side of impersonation. On […]

Sicurezza

A Trickbot Assault Shows US Military Hackers’ Growing Reach

Pubblicato il

For more than two years, General Paul Nakasone has promised that, under his leadership, United States Cyber Command would “defend forward,” finding adversaries and preemptively disrupting their operations. Now that offensive strategy has taken an unexpected form: an operation designed to disable or take down Trickbot, the world’s largest botnet, believed to be controlled by […]

Sicurezza

Split-Second ‘Phantom’ Images Can Fool Tesla’s Autopilot

Pubblicato il

Safety concerns over automated driver-assistance systems like Tesla’s usually focus on what the car can’t see, like the white side of a truck that one Tesla confused with a bright sky in 2016, leading to the death of a driver. But one group of researchers has been focused on what autonomous driving systems might see […]

Sicurezza

Researchers Found 55 Flaws in Apple’s Corporate Network

Pubblicato il

For months, Apple’s corporate network was at risk of hacks that could have stolen sensitive data from potentially millions of its customers and executed malicious code on their phones and computers, a security researcher said on Thursday. ARS TECHNICA This story originally appeared on Ars Technica, a trusted source for technology news, tech policy analysis, […]

Sicurezza

Apple’s T2 Security Chip Has an Unfixable Flaw

Pubblicato il

A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple’s trusted T2 security chip and gain deep system access. The flaw is one researchers have also been using for more than a year to jailbreak older models of iPhones. But the fact that the T2 chip is vulnerable in the […]

Sicurezza

A China-Linked Group Repurposed Hacking Team’s Stealthy Spyware

Pubblicato il

When a hacking organization’s secret tools are stolen and dumped online for anyone to pick up and repurpose, the consequences can roil the globe. Now one new discovery shows how long those effects can persist. Five years after the notorious spy contractor Hacking Team had its code leaked online, a customized version of one of […]

Sicurezza

Facebook Shut Down Malware That Hijacked Accounts to Run Ads

Pubblicato il

Usually when you hear about malicious activity on Facebook it’s tied up in geopolitical skulduggery of some sort. But on Thursday the company detailed a campaign out of China that wasn’t focused on disinformation or stealing account data. The hackers instead stole user credentials and gained access to their accounts toward a different goal: hawking […]

Sicurezza

When Coffee Machines Demand Ransom, You Know IoT Is Screwed

Pubblicato il

With the name Smarter, you might expect a maker of network-connected kitchen appliances to be, well, smarter than companies selling conventional appliances. But in the case of the Smarter internet-of-things coffee maker, you’d be wrong. ARS TECHNICA This story originally appeared on Ars Technica, a trusted source for technology news, tech policy analysis, reviews, and […]

Sicurezza

Russia’s Fancy Bear Hackers Likely Penetrated a US Federal Agency

Pubblicato il

A warning that unidentified hackers broke into an agency of the US federal government and stole its data is troubling enough. But it becomes all the more disturbing when those unidentified intruders are identified—and appear likely to be part of a notorious team of cyberspies working in the service of Russia’s military intelligence agency, the […]