Sicurezza

Palantir Manual Shows How Law Enforcement Tracks Families

Pubblicato il

On Zoom conference calls across the US this week, brows furrowed as the news broke that the video conference company had a flaw in its backend that could give hackers access to people’s webcams. Worse, Zoom seemed at first unwilling to fix the problem. Thankfully, hours after the initial reports, Zoom backtracked and issued a […]

Sicurezza

An Amazon Phishing Scam Hits Just in Time For Prime Day

Pubblicato il

Next week, Amazon will celebrate Prime Day, a bacchanal of modestly discounted ephemera. But amid the flurry of cheap TVs and ebooks and what else, maybe Instant Pots? Watch out for this clever phishing campaign that might hit your inbox. Researchers from security company McAfee today have shared details of a so-called phishing kit, which […]

Sicurezza

Magecart Hacker Group Hits 17,000 Domains—and Counting

Pubblicato il

You may not recognize the name Magecart, but you’ve seen its impact. A set of sophisticated hacking groups, Magecart has been behind some of the bigger hacks of the past few years, from British Airways to Ticketmaster, all with the singular goal of stealing credit card numbers. Think of them as the ATM skimmers of […]

Sicurezza

Zoom Will Fix the Flaw That Let Hackers Hijack Webcams

Pubblicato il

After initially saying that it wouldn’t issue a full fix for a vulnerability disclosed on Monday, the video conferencing service Zoom has changed course. The company now tells WIRED that it will push a patch on Tuesday to alter Zoom’s functionality and eliminate the bug. You should update Zoom now. The Zoom controversy stems from […]

Sicurezza

A Zoom Flaw Gives Hackers Easy Access to Your Webcam

Pubblicato il

Zoom has gained devotees—and a post-IPO boom—thanks to its dead-simple video conferencing tech. Joining a call is particularly easy; with the click of a meeting URL, the page automatically launches the desktop app, and you’re in. But as security researcher Jonathan Leitschuh discovered, that seamlessness comes with a striking set of vulnerabilities for Zoom users […]

Sicurezza

What Is Credential Dumping?

Pubblicato il

Despite all the cybersecurity industry’s talk of preventing “breaches,” a computer network in some ways is less like a fortress and more like a human body. And skillful hackers are like germs: They tend to get in via some orifice or another. Once inside, it’s whether they can thrive and multiply their infections—and what vital […]

Sicurezza

The Biggest Cybersecurity Crises of 2019 So Far

Pubblicato il

Six months of 2019 are on the books already, and certainly there have been six months’ worth of data breaches, supply chain manipulations, state-backed hacking campaigns, and harbingers of cyberwar to show for it. But the hallmark of 2019, perhaps, is feeling like the worst is yet to come. Ransomware is an ever-growing threat, corporate […]

Sicurezza

Ransomware Hits Georgia Courts As Municipal Attacks Spread

Pubblicato il

Ransomware has no shortage of cautionary tales and wakeup calls from the past decade. But for local governments, this past year has been a particularly brutal reminder of the threat. Following a 2018 attack that paralyzed the City of Atlanta for weeks, more than half a dozen cities and public services across the country have […]

Sicurezza

Myspace Employees Used to Spy on Users

Pubblicato il

As we approach the July 4 holiday, the security world had no shortage of fireworks—starting with a hacker group, likely from China, that has spent years breaking into carriers in an effort to hoover up metadata from prime targets. Russia gets most of the attention lately, but never count out China’s sophistication and verve. Also […]

Sicurezza

How Hackers Turn Microsoft Excel’s Own Features Against It

Pubblicato il

You probably think of Microsoft’s classic spreadsheet program Excel as mostly boring. Sure, it can wrangle data, but it’s not exactly Apex Legends. For hackers, though, it’s a lot of fun. Like the rest of the Office 365 suite, attackers often manipulate Excel to launch their digital strikes. And two recent findings demonstrate how the […]