Posts

Showing posts from July, 2021

Faster CRDTs: An Adventure in Optimization

Faster CRDTs: An Adventure in Optimization 539 by xnx | 117 comments on Hacker News.

New exotic matter particle, a tetraquark, discovered at CERN

New exotic matter particle, a tetraquark, discovered at CERN 507 by mherrmann | 193 comments on Hacker News.

Show HN: Static.wiki – read-only Wikipedia using a 43GB SQLite file

Show HN: Static.wiki – read-only Wikipedia using a 43GB SQLite file 569 by segfall | 138 comments on Hacker News.

1 out of every 153 American workers is an Amazon employee

1 out of every 153 American workers is an Amazon employee 572 by pseudolus | 453 comments on Hacker News.

Who Owns My Name?

Who Owns My Name? 584 by Tomte | 183 comments on Hacker News.

Grand jury indicts Trevor Milton, Nikola founder, on three counts of fraud

Grand jury indicts Trevor Milton, Nikola founder, on three counts of fraud 530 by us0r | 456 comments on Hacker News.

Experts Uncover Several C&C Servers Linked to WellMess Malware

Image
Cybersecurity researchers on Friday unmasked new command-and-control (C2) infrastructure belonging to the Russian threat actor tracked as APT29, aka Cozy Bear, that has been spotted actively serving WellMess malware as part of an ongoing attack campaign. More than 30 C2 servers operated by the Russian foreign intelligence have been uncovered, Microsoft-owned cybersecurity subsidiary RiskIQ said  from The Hacker News https://ift.tt/3zVWcW3 via IFTTT

Several Malicious Typosquatted Python Libraries Found On PyPI Repository

Image
As many as eight Python packages that were downloaded more than 30,000 times have been removed from the PyPI portal for containing malicious code, once again highlighting how software package repositories are evolving into a popular target for supply chain attacks. "Lack of moderation and automated security controls in public software repositories allow even inexperienced attackers to use them from The Hacker News https://ift.tt/3feN5Ym via IFTTT

A New Wiper Malware Was Behind Recent Cyberattack On Iranian Train System

Image
A cyber attack that derailed websites of Iran's transport ministry and its national railway system earlier this month, causing widespread disruptions in train services, was the result of a never-before-seen reusable wiper malware called "Meteor." The campaign — dubbed "MeteorExpress" — has not been linked to any previously identified threat group or to additional attacks, making it the first from The Hacker News https://ift.tt/3yhWcPM via IFTTT

Phony Call Centers Tricking Users Into Installing Ransomware and Data-Stealers

Image
An ongoing malicious campaign that employs phony call centers has been found to trick victims into downloading malware capable of data exfiltration as well as deploying ransomware on infected systems. The attacks — dubbed "BazaCall" — eschew traditional social engineering techniques that rely on rogue URLs and malware-laced documents in favor of a vishing-like method wherein targeted users are from The Hacker News https://ift.tt/3fbIJBq via IFTTT

Facebook is now claiming official CDC.gov links are “False Information”

Facebook is now claiming official CDC.gov links are “False Information” 549 by URfejk | 409 comments on Hacker News.

Crafting Interpreters is available in print

Crafting Interpreters is available in print 498 by azhenley | 105 comments on Hacker News.

700k lines of code, 20 years, and one developer: How Dwarf Fortress is built

700k lines of code, 20 years, and one developer: How Dwarf Fortress is built 496 by andreareina | 180 comments on Hacker News.

Activision Blizzard Hires Notorious Union-Busting Firm WilmerHale

Activision Blizzard Hires Notorious Union-Busting Firm WilmerHale 449 by dv_dt | 222 comments on Hacker News.

Evil programmer's tip: avoid “easy” things (2016)

Evil programmer's tip: avoid “easy” things (2016) 480 by damir | 182 comments on Hacker News.

IPv4 pricing

IPv4 pricing 518 by terom | 508 comments on Hacker News.

Video game developers at Activision Blizzard say they'll walk out Wednesday

Video game developers at Activision Blizzard say they'll walk out Wednesday 489 by waynekerr | 524 comments on Hacker News.

Discord Launches Threads

Discord Launches Threads 437 by dchengy | 225 comments on Hacker News.

Postgres Full-Text Search: A search engine in a database

Postgres Full-Text Search: A search engine in a database 581 by twakefield | 136 comments on Hacker News.

Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs

Image
An unidentified threat actor has been exploiting a now-patched zero-day flaw in Internet Explorer browser to deliver a fully-featured VBA-based remote access trojan (RAT) capable of accessing files stored in compromised Windows systems, and downloading and executing malicious payloads as part of an "unusual" campaign. The backdoor is distributed via a decoy document named "Manifest.docx" that from The Hacker News https://ift.tt/3rF5ClE via IFTTT

The mermaid is taking over Google search in Norway

The mermaid is taking over Google search in Norway 621 by oarth | 223 comments on Hacker News.

New Ransomware Gangs — Haron and BlackMatter — Emerge on Cybercrime Forums

Image
Two new ransomware-as-service (RaaS) programs have appeared on the threat radar this month, with one group professing to be a successor to DarkSide and REvil, the two infamous ransomware syndicates that went off the grid following major attacks on Colonial Pipeline and Kaseya over the past few months. "The project has incorporated in itself the best features of DarkSide, REvil, and LockBit," the from The Hacker News https://ift.tt/3BVTnFY via IFTTT

Best Practices to Thwart Business Email Compromise (BEC) Attacks

Image
Business email compromise (BEC) refers to all types of email attacks that do not have payloads. Although there are numerous types, there are essentially two main mechanisms through which attackers penetrate organizations utilizing BEC techniques, spoofing and account take-over attacks. In a recent study, 71% of organizations acknowledged they had seen a business email compromise (BEC) attack from The Hacker News https://ift.tt/37ebNnf via IFTTT

New Android Malware Uses VNC to Spy and Steal Passwords from Victims

Image
A previously undocumented Android-based remote access trojan (RAT) has been found to use screen recording features to steal sensitive information on the device, including banking credentials, and open the door for on-device fraud. Dubbed "Vultur" due to its use of Virtual Network Computing (VNC)'s remote screen-sharing technology to gain full visibility on targeted users, the mobile malware was from The Hacker News https://ift.tt/3zLvYVT via IFTTT

Top 30 Critical Security Vulnerabilities Most Exploited by Hackers

Image
Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to weaponize publicly disclosed flaws to their advantage swiftly. "Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, from The Hacker News https://ift.tt/2URNJV1 via IFTTT

UBEL is the New Oscorp — Android Credential Stealing Malware Active in the Wild

Image
An Android malware that was observed abusing accessibility services in the device to hijack user credentials from European banking applications has morphed into an entirely new botnet as part of a renewed campaign that began in May 2021. Italy's CERT-AGID, in late January, disclosed details about Oscorp, a mobile malware developed to attack multiple financial targets with the goal of stealing from The Hacker News https://ift.tt/3i6eCNI via IFTTT

Naval Architecture

Naval Architecture 602 by todsacerdoti | 106 comments on Hacker News.

Chinese Hackers Implant PlugX Variant on Compromised MS Exchange Servers

Image
A Chinese cyberespionage group known for targeting Southeast Asia leveraged flaws in the Microsoft Exchange Server that came to light earlier this March to deploy a previously undocumented variant of a remote access trojan (RAT) on compromised systems. Attributing the intrusions to a threat actor named PKPLUG (aka Mustang Panda and HoneyMyte), Palo Alto Networks' Unit 42 threat intelligence team from The Hacker News https://ift.tt/373chwH via IFTTT

Hackers Posed as Aerobics Instructors for Years to Target Aerospace Employees

Image
An Iranian cyberespionage group masqueraded as an aerobics instructor on Facebook in an attempt to infect the machine of an employee of an aerospace defense contractor with malware as part of years-long social engineering and targeted malware campaign. Enterprise security firm Proofpoint attributed the covert operation to a state-aligned threat actor it tracks as TA456, and by the wider from The Hacker News https://ift.tt/3zMlci6 via IFTTT

Windows 96

Windows 96 578 by besnn00 | 252 comments on Hacker News.

Father builds exoskeleton to help wheelchair-bound son walk

Father builds exoskeleton to help wheelchair-bound son walk 558 by geox | 162 comments on Hacker News.

Mammals dream about the world they are about to experience before they are born

Mammals dream about the world they are about to experience before they are born 551 by birriel | 177 comments on Hacker News.

New Bug Could Let Attackers Hijack Zimbra Server by Sending Malicious Email

Image
Cybersecurity researchers have discovered multiple security vulnerabilities in Zimbra email collaboration software that could be potentially exploited to compromise email accounts by sending a malicious message and even achieve a full takeover of the mail server when hosted on a cloud infrastructure. The flaws — tracked as CVE-2021-35208 and CVE-2021-35208 — were discovered and reported in from The Hacker News https://ift.tt/2TCnvoG via IFTTT

Element raises $30M to boost Matrix

Element raises $30M to boost Matrix 567 by Sami_Lehtinen | 232 comments on Hacker News.

Several Bugs Found in 3 Open-Source Software Used by Several Businesses

Image
Cybersecurity researchers on Tuesday disclosed nine security vulnerabilities affecting three open-source projects — EspoCRM, Pimcore, and Akaunting — that are widely used by several small to medium businesses and, if successfully exploited, could provide a pathway to more sophisticated attacks. All the security flaws in question, which impact EspoCRM v6.1.6, Pimcore Customer Data Framework from The Hacker News https://ift.tt/2WsrN35 via IFTTT

Hackers Turning to 'Exotic' Programming Languages for Malware Development

Image
Threat actors are increasingly shifting to "exotic" programming languages such as Go, Rust, Nim, and Dlang that can better circumvent conventional security protections, evade analysis, and hamper reverse engineering efforts. "Malware authors are known for their ability to adapt and modify their skills and behaviors to take advantage of newer technologies," said Eric Milam, Vice President of from The Hacker News https://ift.tt/3i6On9J via IFTTT

The Insecurity Industry

The Insecurity Industry 561 by stanislavb | 241 comments on Hacker News.

Apple Releases Urgent 0-Day Bug Patch for Mac, iPhone and iPad Devices

Image
Apple on Monday rolled out an urgent security update for iOS, iPadOS, and macOS to address a zero-day flaw that it said may have been actively exploited, making it the thirteenth such vulnerability Apple has patched since the start of this year. The updates, which arrive less than a week after the company released iOS 14.7, iPadOS 14.7, and macOS Big Sur 11.5 to the public, fixes a memory from The Hacker News https://ift.tt/2WkA353 via IFTTT

Toyota is quietly pushing Congress to slow the shift to electric vehicles

Toyota is quietly pushing Congress to slow the shift to electric vehicles 501 by hassanahmad | 617 comments on Hacker News.

TSMC eyes Germany as possible location for first Europe chip plant

TSMC eyes Germany as possible location for first Europe chip plant 512 by stereoradonc | 328 comments on Hacker News.

Google results for PHP tutorials contain SQL injection vulnerabilities

Google results for PHP tutorials contain SQL injection vulnerabilities 524 by phil294 | 306 comments on Hacker News.

BIMI: A Visual Take on Email Authentication and Security

Image
There is a saying that goes something like, "Do not judge a book by its cover." Yet, we all know we can not help but do just that - especially when it comes to online security. Logos play a significant role in whether or not we open an email and how we assess the importance of each message. Brand Indicators for Message Identification, or BIMI, aims to make it easier for us to quickly identify from The Hacker News https://ift.tt/2UISq3o via IFTTT

How to Mitigate Microsoft Windows 10, 11 SeriousSAM Vulnerability

Image
Microsoft Windows 10 and Windows 11 users are at risk of a new unpatched vulnerability that was recently disclosed publicly. As we reported last week, the vulnerability — SeriousSAM — allows attackers with low-level permissions to access Windows system files to perform a Pass-the-Hash (and potentially Silver Ticket) attack.  Attackers can exploit this vulnerability to obtain hashed passwords from The Hacker News https://ift.tt/3yctNdW via IFTTT

Microsoft Warns of LemonDuck Malware Targeting Windows and Linux Systems

Image
An infamous cross-platform crypto-mining malware has continued to refine and improve upon its techniques to strike both Windows and Linux operating systems by setting its sights on older vulnerabilities, while simultaneously latching on to a variety of spreading mechanisms to maximize the effectiveness of its campaigns. "LemonDuck, an actively updated and robust malware that's primarily known from The Hacker News https://ift.tt/3zvPwgW via IFTTT

Introduction to open source private LTE and 5G networks

Introduction to open source private LTE and 5G networks 510 by peter_d_sherman | 96 comments on Hacker News.

New PetitPotam NTLM Relay Attack Lets Hackers Take Over Windows Domains

Image
A newly uncovered security flaw in the Windows operating system can be exploited to coerce remote Windows servers, including Domain Controllers, to authenticate with a malicious destination, thereby allowing an adversary to stage an NTLM relay attack and completely take over a Windows domain. The issue, dubbed "PetitPotam," was discovered by security researcher Gilles Lionel, who shared from The Hacker News https://ift.tt/3x4D06B via IFTTT

Anna Kiesenhofer: Mathematician, amateur cyclist, Olympic champion

Anna Kiesenhofer: Mathematician, amateur cyclist, Olympic champion 481 by billfruit | 136 comments on Hacker News.

Signal on Android: Images sent to wrong contacts

Signal on Android: Images sent to wrong contacts 499 by jiripospisil | 258 comments on Hacker News.

Please, enough with the dead butterflies (2017)

Please, enough with the dead butterflies (2017) 458 by andrelaszlo | 158 comments on Hacker News.

How the Python import system works

How the Python import system works 439 by zikohh | 174 comments on Hacker News.

Self hosting is important

Self hosting is important 426 by hucste | 267 comments on Hacker News.

Open-source alternatives to popular B2B tools

Open-source alternatives to popular B2B tools 440 by deeptichopra | 125 comments on Hacker News.

A YouTube chat about chess got flagged for hate speech

A YouTube chat about chess got flagged for hate speech 438 by prostoalex | 422 comments on Hacker News.

AWS's Egregious Egress

AWS's Egregious Egress 483 by jgrahamc | 137 comments on Hacker News.

BirdNet – The Easiest Way to Identify Birds by Sound

BirdNet – The Easiest Way to Identify Birds by Sound 481 by r_singh | 119 comments on Hacker News.

Nasty macOS Malware XCSSET Now Targets Google Chrome, Telegram Software

Image
A malware known for targeting macOS operating system has been updated once again to add more features to its toolset that allows it to amass and exfiltrate sensitive data stored in a variety of apps, including apps such as Google Chrome and Telegram, as part of further "refinements in its tactics." XCSSET was uncovered in August 2020, when it was found targeting Mac developers using an unusual from The Hacker News https://ift.tt/3Bw4m8Z via IFTTT

Wake up! Identify API Vulnerabilities Proactively, From Code Back to Production

Image
After more than 20 years in the making, now it's official: APIs are everywhere. In a 2021 survey, 73% of enterprises reported that they already publish more than 50 APIs, and this number is constantly growing. APIs have crucial roles to play in virtually every industry today, and their importance is increasing steadily, as they move to the forefront of business strategies. This comes as no from The Hacker News https://ift.tt/3zsYUC1 via IFTTT

Dutch Police Arrest Two Hackers Tied to "Fraud Family" Cybercrime Ring

Image
Law enforcement authorities in the Netherlands have arrested two alleged individuals belonging to a Dutch cybercriminal collective who were involved in developing, selling, and renting sophisticated phishing frameworks to other threat actors in what's known as a "Fraud-as-a-Service" operation. The apprehended suspects, a 24-year-old software engineer, and a 15-year-old boy, are said to have been from The Hacker News https://ift.tt/3ztRz56 via IFTTT

Migrating Facebook to MySQL 8.0

Migrating Facebook to MySQL 8.0 443 by moneil971 | 276 comments on Hacker News.

The Framework Laptop is now shipping

The Framework Laptop is now shipping 538 by ahaferburg | 255 comments on Hacker News.

Akamai Edge DNS was down

Akamai Edge DNS was down 453 by vhab | 210 comments on Hacker News.

Starlink review, four months in

Starlink review, four months in 460 by geerlingguy | 331 comments on Hacker News.

The FTC Votes Unanimously to Enforce Right to Repair

The FTC Votes Unanimously to Enforce Right to Repair 585 by donohoe | 83 comments on Hacker News.

Germany's national healthcare system adopts Matrix for communication

Germany's national healthcare system adopts Matrix for communication 508 by Arathorn | 139 comments on Hacker News.

Kubernetes is our generation's Multics

Kubernetes is our generation's Multics 563 by genericlemon24 | 523 comments on Hacker News.

Man dies of a heart attack after minors swatted him over his rare Twitter handle

Man dies of a heart attack after minors swatted him over his rare Twitter handle 520 by miles | 575 comments on Hacker News.

A case against security nihilism

A case against security nihilism 463 by feross | 328 comments on Hacker News.

Restaurant workers quit at record rate

Restaurant workers quit at record rate 439 by boulos | 915 comments on Hacker News.

Kaseya Gets Universal Decryptor to Help REvil Ransomware Victims

Image
Nearly three weeks after Florida-based software vendor Kaseya was hit by a widespread supply-chain ransomware attack, the company on Thursday said it obtained a universal decryptor to unlock systems and help customers recover their data. <!--adsense--> "On July 21, Kaseya obtained a decryptor for victims of the REvil ransomware attack, and we're working to remediate customers impacted by the from The Hacker News https://ift.tt/3eOI48J via IFTTT

APT Hackers Distributed Android Trojan via Syrian e-Government Portal

Image
An advanced persistent threat (APT) actor has been tracked in a new campaign deploying Android malware via the Syrian e-Government Web Portal, indicating an upgraded arsenal designed to compromise victims. "To the best of our knowledge, this is the first time that the group has been publicly observed using malicious Android applications as part of its attacks," Trend Micro researchers Zhengyu from The Hacker News https://ift.tt/3eMb8xQ via IFTTT

Reduce End-User Password Change Frustrations

Image
Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges.  This often results in a greater burden on the IT service desk staff as end-users encounter issues related to security software, policies, and password restrictions.  One of the most common areas where security may cause challenges for from The Hacker News https://ift.tt/3hWiVLl via IFTTT

Oracle Warns of Critical Remotely Exploitable Weblogic Server Flaws

Image
Oracle on Tuesday released its quarterly Critical Patch Update for July 2021 with 342 fixes spanning across multiple products, some of which could be exploited by a remote attacker to take control of an affected system. Chief among them is CVE-2019-2729, a critical deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services that's remotely exploitable without from The Hacker News https://ift.tt/2V4n86A via IFTTT

Another Hacker Arrested for 2020 Twitter Hack and Massive Bitcoin Scam

Image
A U.K. citizen has been arrested in the Spanish town of Estepona over his alleged involvement in the July 2020 hack of Twitter, resulting in the compromise of 130 high-profile accounts. Joseph O'Connor, 22, has been charged with intentionally accessing a computer without authorization and obtaining information from a protected computer, as well as for making extortive communications. The Spanish from The Hacker News https://ift.tt/3eL3Zh7 via IFTTT

Papers every developer should read at least twice (2009)

Papers every developer should read at least twice (2009) 602 by teleforce | 94 comments on Hacker News.

Malicious NPM Package Caught Stealing Users' Saved Passwords From Browsers

Image
A software package available from the official NPM repository has been revealed to be actually a front for a tool that's designed to steal saved passwords from the Chrome web browser. The package in question, named "nodejs_net_server" and downloaded over 1,283 times since February 2019, was last updated seven months ago (version 1.1.2), with its corresponding repository leading to non-existent from The Hacker News https://ift.tt/3iBQodd via IFTTT

XLoader Windows InfoStealer Malware Now Upgraded to Attack macOS Systems

Image
Cybersecurity researchers on Wednesday disclosed details of an evolving malware that has now been upgraded to steal sensitive information from Apple's macOS operating system. The malware, dubbed "XLoader," is a successor to another well-known Windows-based info stealer called Formbook that's known to vacuum credentials from various web browsers, collect screenshots, log keystrokes, and download from The Hacker News https://ift.tt/3y7Fzpy via IFTTT

Several New Critical Flaws Affect CODESYS Industrial Automation Software

Image
Cybersecurity researchers on Wednesday disclosed multiple security vulnerabilities impacting CODESYS automation software and the WAGO programmable logic controller (PLC) platform that could be remotely exploited to take control of a company's cloud operational technology (OT) infrastructure. The flaws can be turned "into innovative attacks that could put threat actors in position to remotely from The Hacker News https://ift.tt/3kBZIAt via IFTTT

[eBook] A Guide to Stress-Free Cybersecurity for Lean IT Security Teams

Image
Today’s cybersecurity landscape is enough to make any security team concerned. The rapid evolution and increased danger of attack tactics have put even the largest corporations and governments at heightened risk. If the most elite security teams can’t prevent these attacks from happening, what can lean security teams look forward to?  Surprisingly, leaner teams have a much greater chance than from The Hacker News https://ift.tt/3zh50FB via IFTTT

Our lawsuit against ChessBase

Our lawsuit against ChessBase 592 by EvgeniyZh | 203 comments on Hacker News.

New Windows and Linux Flaws Give Attackers Highest System Privileges

Image
Microsoft's Windows 10 and the upcoming Windows 11 versions have been found vulnerable to a new local privilege escalation vulnerability that permits users with low-level permissions access Windows system files, in turn, enabling them to unmask the operating system installation password and even decrypt private keys. "Starting with Windows 10 build 1809, non-administrative users are granted from The Hacker News https://ift.tt/3eDgBH0 via IFTTT

Hungarian journalists and critics of Orbán were targeted with Pegasus

Hungarian journalists and critics of Orbán were targeted with Pegasus 565 by r_sz | 464 comments on Hacker News.

16-Year-Old Security Bug Affects Millions of HP, Samsung, Xerox Printers

Image
Details have emerged about a high severity security vulnerability affecting a software driver used in HP, Xerox, and Samsung printers that has remained undetected since 2005. Tracked as CVE-2021-3438 (CVSS score: 8.8), the issue concerns a buffer overflow in a print driver installer package named "SSPORT.SYS" that can enable remote privilege and arbitrary code execution. Hundreds of millions of from The Hacker News https://ift.tt/2VVFmaR via IFTTT

This New Malware Hides Itself Among Windows Defender Exclusions to Evade Detection

Image
Cybersecurity researchers on Tuesday lifted the lid on a previously undocumented malware strain dubbed "MosaicLoader" that singles out individuals searching for cracked software as part of a global campaign. "The attackers behind MosaicLoader created a piece of malware that can deliver any payload on the system, making it potentially profitable as a delivery service," Bitdefender researchers from The Hacker News https://ift.tt/3kBZJEw via IFTTT

US and Global Allies Accuse China of Massive Microsoft Exchange Attack

Image
The U.S. government and its key allies, including the European Union, the U.K., and NATO, formally attributed the massive cyberattack against Microsoft Exchange email servers to state-sponsored hacking crews working affiliated with the People's Republic of China's Ministry of State Security (MSS). In a statement issued by the White House on Monday, the administration said, "with a high degree of from The Hacker News https://ift.tt/3exfoB2 via IFTTT

Time to assume that health research is fraudulent until proven otherwise?

Time to assume that health research is fraudulent until proven otherwise? 594 by lnyan | 313 comments on Hacker News.

Leak uncovers global abuse of cyber-surveillance weapon

Leak uncovers global abuse of cyber-surveillance weapon 573 by johnny_reilly | 136 comments on Hacker News.

Huge data leak shatters the lie that the innocent need not fear surveillance

Huge data leak shatters the lie that the innocent need not fear surveillance 632 by ipster_io | 117 comments on Hacker News.

Apple sued by teen wrongly accused of shoplifting by unreliable facial-rec tech

Apple sued by teen wrongly accused of shoplifting by unreliable facial-rec tech 614 by walterbell | 167 comments on Hacker News.

Researchers Warn of Linux Cryptojacking Attackers Operating from Romania

Image
A threat group likely based in Romania and active since at least 2020 has been behind an active cryptojacking campaign targeting Linux-based machines with a previously undocumented SSH brute-forcer written in Golang. Dubbed "Diicot brute," the password cracking tool is alleged to be distributed via a software-as-a-service model, with each threat actor furnishing their own unique API keys to from The Hacker News https://ift.tt/3Bl23Wr via IFTTT

Julian Assange Case: Keystone Witness Admits He Lied, US Media Ignores

Julian Assange Case: Keystone Witness Admits He Lied, US Media Ignores 593 by graderjs | 126 comments on Hacker News.

Turns Out That Low-Risk iOS Wi-Fi Naming Bug Can Hack iPhones Remotely

Image
The Wi-Fi network name bug that was found to completely disable an iPhone's networking functionality had remote code execution capabilities and was silently fixed by Apple earlier this year, according to new research. The denial-of-service vulnerability, which came to light last month, stemmed from the way iOS handled string formats associated with the SSID input, triggering a crash on any from The Hacker News https://ift.tt/3Bh2ZLi via IFTTT

Five Critical Password Security Rules Your Employees Are Ignoring

Image
According to Keeper Security's Workplace Password Malpractice Report, many remote workers aren't following best practices for password security. Password security was a problem even before the advent of widespread remote work. So, what happened post-pandemic? Keeper Security's Workplace Password Malpractice Report sought to find out. In February 2021, Keeper surveyed 1,000 employees in the U.S. from The Hacker News https://ift.tt/3zc5755 via IFTTT

Right or left, you should be worried about big tech censorship

Right or left, you should be worried about big tech censorship 568 by DiabloD3 | 432 comments on Hacker News.

Researcher Uncover Yet Another Unpatched Windows Printer Spooler Vulnerability

Image
Merely days after Microsoft sounded the alarm on an unpatched security vulnerability in the Windows Print Spooler service, possibly yet another zero-day flaw in the same component has come to light, making it the fourth printer-related shortcoming to be discovered in recent weeks. "Microsoft Windows allows for non-admin users to be able to install printer drivers via Point and Print," CERT from The Hacker News https://ift.tt/3rkzvaN via IFTTT

Private Israeli spyware used to hack cellphones of journalists, activists

Private Israeli spyware used to hack cellphones of journalists, activists 573 by tosh | 148 comments on Hacker News.

New Leak Reveals Abuse of Pegasus Spyware to Target Journalists Globally

Image
A sweeping probe into a data leak of more than 50,000 phone numbers has revealed an extensive misuse of Israeli company NSO Group's Pegasus "military-grade spyware" to facilitate human rights violations by surveilling heads of state, activists, journalists, and lawyers around the world. Dubbed the "Pegasus Project," the investigation is a collaboration by more than 80 journalists from a from The Hacker News https://ift.tt/3hO0d8P via IFTTT

An app for M1 Macs that plays the sound of a fan as CPU usage goes up

An app for M1 Macs that plays the sound of a fan as CPU usage goes up 548 by spideymans | 283 comments on Hacker News.

Looking Glass: Run a Windows VM on Linux in a Window with Native Performance

Looking Glass: Run a Windows VM on Linux in a Window with Native Performance 544 by tambourine_man | 197 comments on Hacker News.

China's New Law Requires Researchers to Report All Zero-Day Bugs to Government

Image
The Cyberspace Administration of China (CAC) has issued new stricter vulnerability disclosures regulations that mandate security researchers uncovering critical flaws in computer systems to mandatorily disclose them first-hand to the government authorities within two days of filing a report. The "Regulations on the Management of Network Product Security Vulnerability" are expected to go into from The Hacker News https://ift.tt/3ksQxlH via IFTTT

Instagram Launches 'Security Checkup' to Help Users Recover Hacked Accounts

Image
Instagram earlier this week introduced a new "Security Checkup" feature that aims to keep accounts safe and help users—whose accounts may have been compromised—to recover them. In order to gain access to accounts, users will be prompted to perform a series of steps, which include checking recent login activity, reviewing profile information, and updating contact details such as phone numbers or from The Hacker News https://ift.tt/36GDi8K via IFTTT

CloudFlare CDNJS Bug Could Have Led to Widespread Supply-Chain Attacks

Image
Web infrastructure and website security company Cloudflare last month fixed a critical vulnerability in its CDNJS library that's used by 12.7% of all websites on the internet. CDNJS is a free and open-source content delivery network (CDN) that serves about 4,041 JavaScript and CSS libraries, making it the second most popular CDN for JavaScript after Google Hosted Libraries. The weakness from The Hacker News https://ift.tt/3hM3029 via IFTTT

Why we're blind to the color blue

Why we're blind to the color blue 490 by goodway | 193 comments on Hacker News.

Hubble telescope has new lease on life after computer swap appears to fix glitch

Hubble telescope has new lease on life after computer swap appears to fix glitch 498 by sohkamyung | 186 comments on Hacker News.

Open Insulin Foundation

Open Insulin Foundation 517 by hmmx3 | 230 comments on Hacker News.

Google Drive bans distribution of “misleading content”

Google Drive bans distribution of “misleading content” 539 by temp8964 | 595 comments on Hacker News.

The Alexander: Why did you build such a long piano?

The Alexander: Why did you build such a long piano? 486 by kurthr | 95 comments on Hacker News.

The Definitive RFP Templates for EDR/EPP and APT Protection

Image
Advanced Persistent Threats groups were once considered a problem that concerns Fortune 100 companies only. However, the threat landscape of the recent years tells otherwise—in fact, every organization, regardless of vertical and size is at risk, whether as a direct target, supply chain or collateral damage. The vast majority of security decision-makers acknowledge they need to address the APT from The Hacker News https://ift.tt/2AuUMFf via IFTTT

Intel in talks to buy GlobalFoundries for about $30B

Intel in talks to buy GlobalFoundries for about $30B 469 by hi5eyes | 124 comments on Hacker News.

Israeli Firm Helped Governments Target Journalists, Activists with 0-Days and Spyware

Image
Two of the zero-day Windows flaws patched by Microsoft as part of its Patch Tuesday update earlier this week were weaponized by an Israel-based company called Candiru in a series of "precision attacks" to hack more than 100 journalists, academics, activists, and political dissidents globally. The spyware vendor was also formally identified as the commercial surveillance company that Google's from The Hacker News https://ift.tt/3kpM82X via IFTTT

Facebook Suspends Accounts Used by Iranian Hackers to Target US Military Personnel

Image
Facebook on Thursday disclosed it dismantled a "sophisticated" online cyber espionage campaign conducted by Iranian hackers targeting about 200 military personnel and companies in the defense and aerospace sectors in the U.S., U.K., and Europe using fake online personas on its platform. The social media giant pinned the attacks to a threat actor known as Tortoiseshell (aka Imperial Kitten) based from The Hacker News https://ift.tt/3eptl3S via IFTTT

Alphafold

Alphafold 461 by matejmecka | 133 comments on Hacker News.

Update Your Chrome Browser to Patch New Zero‑Day Bug Exploited in the Wild

Image
Google has pushed out a new security update to Chrome browser for Windows, Mac, and Linux with multiple fixes, including a zero-day that it says is being exploited in the wild. The latest patch resolves a total of eight issues, one of which concerns a type confusion issue in its V8 open-source and JavaScript engine (CVE-2021-30563). The search giant credited an anonymous researcher for reporting from The Hacker News https://ift.tt/3wJP64I via IFTTT

Microsoft Warns of New Unpatched Windows Print Spooler Vulnerability

Image
Microsoft on Thursday shared fresh guidance on yet another vulnerability affecting the Windows Print Spooler service, stating that it's working to address it in an upcoming security update. Tracked as CVE-2021-34481 (CVSS score: 7.8), the issue concerns a local privilege escalation flaw that could be abused to perform unauthorized actions on the system. The company credited security researcher from The Hacker News https://ift.tt/3hHDNG4 via IFTTT

I am often asked if I will “return to cryptocurrency”

I am often asked if I will “return to cryptocurrency” 445 by null_object | 277 comments on Hacker News.

The Well-Tempered Traveler

The Well-Tempered Traveler 436 by nvahalik | 156 comments on Hacker News.

Germany fines YouTube for removing video of anti-lockdown protest

Germany fines YouTube for removing video of anti-lockdown protest 477 by sbuttgereit | 445 comments on Hacker News.

WebAssembly from Scratch: From FizzBuzz to DooM

WebAssembly from Scratch: From FizzBuzz to DooM 503 by popitter | 83 comments on Hacker News.

Firefox 90

Firefox 90 455 by TangerineDream | 329 comments on Hacker News.

Valve Steam Deck

Valve Steam Deck 531 by homarp | 459 comments on Hacker News.

China's Cyberspies Targeting Southeast Asian Government Entities

Image
A sweeping and "highly active campaign" that originally set its sights on Myanmar has broadened its focus to strike a number of targets located in the Philippines, according to new research. Russian cybersecurity firm Kaspersky, which first spotted the infections in October 2020, attributed them to a threat actor it tracks as "LuminousMoth," which it connected with medium to high confidence to a from The Hacker News https://ift.tt/2UhxUGB via IFTTT