Sicurezza

Flash Is Dead—but Not Gone

Pubblicato il

On January 12, just after 8:15 am local time, computers started to malfunction at the Dalian Train Operation Depot in northeast China. The dispatcher’s browsers weren’t loading train schedule details. Six hours later, dispatchers also lost the ability to print train data from the web app. According to the depot’s account on Weibo and WeChat, […]

Sicurezza

The FTC Cracks Down on Bot-Wielding Ticket Scalpers

Pubblicato il

This week, Joe Biden was sworn in as the 46th president of the United States. To commemorate the outgoing Donald Trump’s four years in office, we took a look at the most absurd, bizarre, or outright dangerous things Trump has said about cybersecurity. (At least he’s not saying them on Facebook or Twitter anymore.) He’s […]

Sicurezza

Chrome and Edge Want to Help Solve Your Password Problems

Pubblicato il

If you’re like lots of people, someone has probably nagged you to use a password manager and you still haven’t heeded the advice. Now, Chrome and Edge are coming to the rescue with beefed-up password management built directly into the browsers. Microsoft on Thursday announced a new password generator for the recently released Edge 88. […]

Sicurezza

Bitcoin and Its Likely Impact on the Threat Landscape

Pubblicato il

Bitcoin, the first blockchain-based cryptocurrency, was created by Satoshi Nakamoto in 2008 and released to the public in 2009. It is a decentralized digital currency without the need for a central bank. Over the last decade, it has evolved from a proof-of-concept where early adopters used the currency for illicit activities on darknet marketplaces to […]

Sicurezza

Cisco tags critical security holes in SD-WAN software

Pubblicato il

Cisco has noted and fixed two critical and a number of high-degree vulnerabilities in its SD-WAN software portfolio. Most of the vulnerabilities could let an authenticated attacker execute command injection attacks against an affected device, which could let the attacker utilize root privileges on the device. The first critical problem–with a Common Vulnerability Scoring System […]

Sicurezza

Parler Finds a Reprieve in Russia—but Not a Solution

Pubblicato il

In the wake of the Capitol riots two weeks ago, a number of large tech companies pulled support for Parler, a Twitter-like social network that Donald Trump’s supporters have increasingly favored since its launch in 2018. Apple and Google removed the Parler app from their digital stores, and Amazon Web Services cut the platform’s hosting […]

Sicurezza

A Site Published Every Face From Parler’s Capitol Riot Videos

Pubblicato il

When hackers exploited a bug in Parler to download all of the right-wing social media platform’s contents last week, they were surprised to find that many of the pictures and videos contained geolocation metadata revealing exactly how many of the site’s users had taken part in the invasion of the US Capitol building just days […]

Sicurezza

Lessons that insurrection selfies hold for legitimate enterprises

Pubblicato il

The pro-Trump rioters who invaded the Capitol on January 6 came with smartphones to record and celebrate what they thought was a righteous effort to prevent president-elect Joe Biden from taking office two weeks later. Now those electronic devices, along with the GPS data they generated, are being used to track the location of rioters […]

Sicurezza

The SolarWinds Hackers Used Tactics Other Groups Will Copy

Pubblicato il

One of the most chilling aspects of Russia’s recent hacking spree—which breached numerous United States government agencies among other targets—was the successful use of a “supply chain attack” to gain tens of thousands of potential targets from a single compromise at the IT services firm SolarWinds. But this wasn’t the only striking feature of the […]