Crook made millions by breaking into execs’ Office365 inboxes, US law enforcement says ~finance business Article 724 words 9 votes
“Something has gone seriously wrong,” dual-boot systems warn after Microsoft update ~tech linux security.cyber microsoft Article 918 words 43 votes
‘TunnelVision’ attack leaves nearly all VPNs vulnerable to spying ~tech security.cyber privacy Article 918 words, published May 6 2024 40 votes
Hackers can read private AI-assistant chats even though they’re encrypted ~tech security.cyber Article 639 words, published Mar 14 2024 20 votes
US prescription market hamstrung for nine days (so far) by ransomware attack ~health Article 599 words 39 votes
Canada declares Flipper Zero public enemy No. 1 in car-theft crackdown ~transport Article 629 words 27 votes
ChatGPT is leaking passwords from private conversations of its users, Ars reader says ~tech privacy security.cyber Article 586 words 17 votes
In major gaffe, hacked Microsoft test account was assigned admin privileges ~tech security.cyber microsoft Article 432 words 28 votes
Hackers can infect network-connected wrenches to install ransomware, researchers say ~tech security.cyber Article 493 words 28 votes
4-year campaign backdoored iPhones using possibly the most advanced exploit ever ~comp security Article 761 words, published Dec 27 2023 43 votes
Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters ~tech apple google security Article 630 words 13 votes
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware ~tech security ios Article 1152 words, published Jun 1 2023 21 votes
Google removes fake Signal and Telegram apps hosted on Play ~tech google.play Article 794 words 27 votes
Windows Secure Time Seeding sometimes resets clocks months or years off the correct time ~tech microsoft Article 716 words 19 votes
Russia-backed hackers unleash new USB-based malware on Ukraine’s military ~tech Article 778 words 27 votes
Hackers can steal cryptographic keys by video-recording power LEDs sixty feet away ~tech Article 744 words 12 votes
How one of Vladimir Putin’s most prized hacking units got pwned by the FBI ~tech Article 492 words 6 votes
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices. CryWiper masquerades as ransomware, but its real purpose is to permanently destroy data. ~tech security.cyber Article 696 words 12 votes
Researchers devise iPhone malware that runs even when device is turned off ~tech security Article 655 words 6 votes
Amazon devices in the US will automatically join the Amazon Sidewalk mesh network and start sharing internet with neighbors on June 10th, unless opted out ~tech internet privacy security amazon.sidewalk Article 882 words, published May 29 2021 30 votes
Gab removes their public Git repository after it reveals their developers adding (and struggling to fix) basic security issues that led to a 70GB data leak ~tech social media security Article 672 words 12 votes
ADT employee covertly accessed about 200 security cameras he installed to spy on people having sex ~tech privacy security.home Article 472 words 9 votes
WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app ~tech facebook social media privacy Article 545 words 28 votes
Ticketmaster admits it hacked rival company before it went out of business ~finance business Article 540 words 17 votes
NSA and FBI warn that previously undisclosed Drovorub malware for Linux threatens national security ~tech linux security.national Article 957 words 22 votes
Google researchers find serious privacy risks in Safari’s anti-tracking protections ~tech apple google privacy Article 844 words 9 votes
Hackers steal secret crypto keys for NordVPN. Here’s what we know so far. ~tech Article 1305 words 29 votes
My browser, the spy: How extensions slurped up browsing histories of 4M users ~tech browsers privacy internet Article 3609 words 15 votes