Sicurezza

Microsoft Halts a Global Fraud Campaign That Targeted CEOs

Pubblicato il

Microsoft has neutered a large-scale fraud campaign that used knockoff domains and malicious apps to scam customers in 62 countries around the world. ARS TECHNICA This story originally appeared on Ars Technica, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED’s parent company, Condé Nast. The software […]

Sicurezza

Looks Like Russian Hackers Are on an Email Scam Spree

Pubblicato il

For years, costly email grifts have largely been the provenance of West African scammers, particularly those based in Nigeria. A newly discovered “business email compromise” campaign, though, appears to come from a criminal group in a part of the world better known for a different brand of online mayhem: Russia. Dubbed Cosmic Lynx, the group […]

Sicurezza

Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

Pubblicato il

Any company that uses a certain piece of networking equipment from Seattle-based F5 Networks had a rude interruption to their July 4 weekend, as a critical vulnerability turned the holiday into a race to implement a fix. Those who haven’t done so by now may now have a much larger problem on their hands. Late […]

Sicurezza

The Worst Hacks and Breaches of 2020 So Far

Pubblicato il

Well, what can we say about 2020 so far? Between a deadly pandemic whose reach and scale is unprecedented in our lifetimes, the corresponding global economic downturn, geopolitical strife around the world, and widespread civil rights uprisings, the first six months of the year have been remarkable in every way. And all of this has […]

Sicurezza

New Mac Ransomware Is Even More Sinister Than It Appears

Pubblicato il

The threat of ransomware may seem ubiquitous, but there haven’t been too many strains tailored specifically to infect Apple’s Mac computers since the first full-fledged Mac ransomware surfaced only four years ago. So when Dinesh Devadoss, a malware researcher at the firm K7 Lab, published findings on Tuesday about a new example of Mac ransomware, […]

Sicurezza

Schools Already Struggled With Cybersecurity. Then Came Covid-19

Pubblicato il

Another issue Henry found was in the way Polk County used Microsoft SharePoint platform, a collaboration and storage tool, to manage data. He noticed that students and teachers were lumped together in a Sharepoint “user group” and had all been granted the same access to files stored in the system. This meant that students could […]

Sicurezza

Anonymous Stole and Leaked a Megatrove of Police Documents

Pubblicato il

It’s been the better part of a decade since the hacktivist group Anonymous rampaged across the internet, stealing and leaking millions of secret files from dozens of US organizations. Now, amid the global protests following the killing of George Floyd, Anonymous is back—and it’s returned with a dump of hundreds of gigabytes of law enforcement […]

Sicurezza

The Russian Disinfo Operation You Never Heard About

Pubblicato il

The Internet Research Agency is infamous for flooding mainstream social media platforms with compelling disinformation campaigns. The GRU, Russia’s military intelligence agency, deploys strategic data leaks and destabilizing cyberattacks. But in the recent history of Russia’s online meddling, a third, distinct entity may have been at work on many of the same objectives—indicating that Russia’s […]

Sicurezza

Ripple20 Bugs Put Hundreds of Millions of IoT Devices at Risk

Pubblicato il

Security experts have warned for years that the drive to connect every device imaginable to the internet would offer a bonanza for hackers. Now researchers have found that one chunk of software designed to enable those internet connections is itself riddled with hackable vulnerabilities. As a result, security flaws have ended up in hundreds of […]

Sicurezza

Researchers Expose a New Vulnerability in Intel’s CPUs

Pubblicato il

For the past two years, modern CPUs—particularly those made by Intel—have been under siege by an unending series of attacks that make it possible for highly skilled attackers to pluck passwords, encryption keys, and other secrets out of silicon-resident memory. On Tuesday, two separate academic teams disclosed two new and distinctive exploits that pierce Intel’s […]