Techmeme

Results 1 - 10 of about 541:

Dan Goodin / Ars Technica:
New tool decrypts WannaCry-infected computers running Windows XP, 7, and 2003, if they have not been rebooted   —  A tool released on Friday decrypts PCs running a fuller suite of Windows versions.  —  New hope glimmered on Friday for people hit by last week's virulent ransomware worm …
May 19, 2017, 1:35 PMIn context
Dan Goodin / Ars Technica:
Researchers say EternalBlue, the NSA exploit used in WannaCry, was used in an earlier and possibly larger-scale hack, to install Adylkuzz cryptocurrency miner   —  Campaign that flew under the radar used hacked computers to mine Monero currency.  —  On Friday, ransomware called WannaCry …
May 17, 2017, 8:35 AMIn context
Dan Goodin / Ars Technica:
Researchers say Conexant audio driver, found on 24+ HP laptops, logs all keystrokes and stores them in an unencrypted file   —  Audio driver supplied by Conexant may put PCs from other makers at risk, too.  —  HP is selling more than two dozen models of laptops and tablets …
May 11, 2017, 7:15 PMIn context
Dan Goodin / Ars Technica:
Cisco patches 318 switch models for 0-day remote exploit from March's WikiLeaks CIA dump   —  Fix neutralizes attack code that was put into the wild in early March.  —  Cisco Systems has patched a critical flaw that even novice hackers could exploit using Central Intelligence Agency attack tools …
May 9, 2017, 6:20 PMIn context
Dan Goodin / Ars Technica:
Flaw in Intel chipsets' remote management allows hijacking using any authentication string; HP, Lenovo, others issue advisories; Intel expects patches this week   —  Patch for severe authentication bypass bug won't be available until next week.  —  A remote hijacking flaw that lurked …
May 6, 2017, 8:40 PMIn context
Dan Goodin / Ars Technica:
Microsoft Word exploit that bypasses Windows safeguards has been sent to millions to push Dridex bank fraud malware   —  Blast could give a boost to Dridex, one of the Internet's worst bank fraud threats.  —  Booby-trapped documents exploiting a critical zero-day vulnerability in Microsoft Word …
Apr 11, 2017, 1:50 PMIn context
Dan Goodin / Ars Technica:
Symantec links alleged Vault7 CIA malware to hacking operation that attacked at least 40 targets in 16 countries across the Middle East, Europe, Asia, Africa   —  WikiLeaks dump identical to operation that has been hacking governments since 2011.  —  Malware that WikiLeaks purports belongs …
Apr 10, 2017, 5:10 PMIn context
Dan Goodin / Ars Technica:
Researchers uncover BrickerBot-powered botnet attacks that are designed to brick poorly secured Linux-based routers and other IoT devices   —  Ongoing “BrickerBot” attacks might be trying to kill devices before they can join a botnet.  —  Researchers have uncovered a rash of ongoing attacks designed …
Apr 7, 2017, 2:45 PMIn context
Dan Goodin / Ars Technica:
Project Zero finds serious Broadcom WiFi chipset flaw in Android and iOS devices; Google released patch on April 5, iOS was patched on April 3 with 10.3.1   —  Broadcom chips allow rogue Wi-Fi signals to execute code of attacker's choosing.  —  A broad array of Android phones are vulnerable …
Apr 6, 2017, 4:40 PMIn context
Dan Goodin / Ars Technica:
Remote exploit, successfully demoed on two fully-updated Samsung smart TV models in Feb., compromises TVs via maliciously-crafted digital video broadcast signal   —  Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks.  —  A new attack that uses terrestrial radio signals …
Apr 2, 2017, 9:25 PMIn context

Sponsor Posts

Microsoft:
Empowering a more accessible and inclusive world  —  How Microsoft is enabling more people in schools, workplaces, cities and beyond, and what we're doing to achieve further gains.
VMware:
The Internet of Thieves?  Why IoT Urgently Needs to Be Secured  —  For those who are interested in the Internet of Things (IoT) and IT security, I recommend an insightful article from Fortune magazine, titled “Who to Blame for the Attack on the Internet.”
Zoho:
15 Untapped sources to drive quality traffic to your website  —  Most marketers have two goals in common: to attract more traffic and convert more leads.  More traffic translates to more visibility and profitability.
Worldpay:
Missed the VentureBeat subscriptions webinar with Ancestry.com?  —  Join us on-demand to explore how leaders in subscription pricing marry strategy and tech seamlessly to make the global leap.