Results 161 - 170 of about 565:

Dan Goodin / Ars Technica:
Superfish doubles down, says HTTPS-busting adware poses no security risk   —  Denial comes despite near-unanimous agreement that it left Lenovo users wide open.  —  Following security professionals' near-unanimous condemnation of adware that hijacked encrypted Web connections on Lenovo computers …
Feb 20, 2015, 7:45 PMIn context
Dan Goodin / Ars Technica:
Some Lenovo notebooks shipped with man-in-the-middle Superfish adware that breaks HTTPS connections, affects Chrome and Internet Explorer   —  Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections  —  Superfish may make it trivial for attackers to spoof any HTTPS website.
Feb 19, 2015, 6:40 AMIn context
Dan Goodin / Ars Technica:
Extensive Kasperky Lab report details advanced spy capabilities of Stuxnet-linked threat actor dubbed “Equation Group”   —  How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last  —  “Equation Group” ran the most advanced hacking operation ever uncovered.
Feb 16, 2015, 4:10 PMIn context
Dan Goodin / Ars Technica:
Microsoft issues patch for 15 year old Windows flaw dubbed Jasbug that could allow remote code execution; Windows Server 2003 unpatched   —  15-year-old bug allows malicious code execution in all versions of Windows  —  Windows admins: Patch now, unless you run 2003, in which case you're out of luck.
Feb 11, 2015, 7:10 PMIn context
Dan Goodin / Ars Technica:
Security researcher publishes 10M unredacted usernames with passwords despite risk of FBI raid   —  Fearing an FBI raid, researcher publishes 10 million passwords/usernames  —  Move could advance password research—and test prosecutors' tolerance for leaks.
Feb 10, 2015, 5:20 PMIn context
Dan Goodin / Ars Technica:
Serious bug in fully patched Internet Explorer puts user credentials at risk   —  Microsoft engineers are working to patch universal XSS vulnerability.  —  A vulnerability in fully patched versions of Internet Explorer allows attackers to steal login credentials and inject malicious content into users' browsing sessions.
Feb 4, 2015, 8:00 AMIn context
Dan Goodin / Ars Technica:
Silent Circle fixed bug in privacy-centric BlackPhone that let hackers remotely decrypt texts and stalk users   —  Bug in ultra secure BlackPhone let attackers decrypt texts, stalk users  —  Silent Circle purges remotely exploitable “type confusion” flaw.  —  A recently fixed vulnerability …
Jan 28, 2015, 11:35 AMIn context
Dan Goodin / Ars Technica:
Highly critical “Ghost” allowing code execution affects most Linux systems   —  New bug haunting Linux could spark “a lot of collateral damage on the Internet.”  —  An extremely critical vulnerability affecting most Linux distributions gives attackers the ability to execute malicious code …
Jan 27, 2015, 3:40 PMIn context
Dan Goodin / Ars Technica:
Court document for Silk Road 2 trial suggests investigators may have spent six months last year exploiting Tor anonymity bug   —  Did feds mount a sustained attack on Tor to decloak crime suspects?  —  Last week's arrest of a man alleged to help run the Silk Road 2. online drug bazaar …
Jan 21, 2015, 9:25 PMIn context
Dan Goodin / Ars Technica:
Blackhat filmmakers used hacking consultants to depict hacking in a more realistic way   —  Blackhat brings some hacking realism to Hollywood, but to what effect?  —  During one scene in the upcoming hacker action movie Blackhat, a team is sent into the control room of a burned …
Jan 19, 2015, 4:25 AMIn context

Sponsor Posts

The truth about quantum computing: Schrödinger's Cat speaks  —  There are many cat videos online.  But only ours explains quantum computing in under 4 minutes.
New security features from eero Plus  —  Protect all your connected devices with VPN, 1Password, Malwarebytes, and Ad blocking.
Get a glimpse into the future of retail technology  —  The retail world always takes leaps, but as 2018 approaches, Adyen data and market research gives some early clues as to where it might land.
Quick access to all your recordings in Zoho Meeting  —  Recording your sessions is important — almost as important as the event or meeting itself.  It reduces the need for meeting notes, improves attendee focus and engagement …
Thomson Reuters:
2018 Top 100 Global Tech Leaders  —  21st century technology-sector leadership requires more than financial success.  It also requires a commitment to compliance, innovation, and much more.  Who are today's leaders?