Dan Goodin - Page 11

119 Posts
0 Comments

336,000 servers remain unpatched against critical Fortigate vulnerability

Enlarge Researchers say that nearly 336,000 devices exposed to the Internet remain vulnerable to a critical vulnerability in firewalls sold by Fortinet...

Brave aims to curb practice of websites that port scan visitors

Enlarge The Brave browser will take action against websites that snoop on visitors by scanning their open Internet ports or accessing other...

FBI warns of increasing use of AI-generated deepfakes in sextortion schemes

Enlarge The FBI on Monday warned of the increasing use of artificial intelligence to generate phony videos for use in sextortion schemes...

Mass exploitation of critical MOVEit flaw is ransacking orgs big and small

EnlargeGetty Images Organizations big and small are falling prey to the mass exploitation of a critical vulnerability in a widely used file-transfer...

Google’s Android and Chrome extensions are a very sad place. Here’s why

EnlargePhoto Illustration by Miguel Candela/SOPA Images/LightRocket via Getty Images No wonder Google is having trouble keeping up with policing its app store....

Researchers tell owners to “assume compromise” of unpatched Zyxel firewalls

EnlargeGetty Images Firewalls made by Zyxel are being wrangled into a destructive botnet, which is taking control of them by exploiting a...

Critical Barracuda 0-day was used to backdoor networks for 8 months

EnlargeGetty Images A critical vulnerability patched 10 days ago in widely used email software from IT security company Barracuda Networks has been...

Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days

Enlarge Smartphone malware sold to governments around the world can surreptitiously record voice calls and nearby audio, collect data from apps such...

Chinese state hackers infect critical infrastructure throughout the US and Guam

Enlargepeterschreiber.media | Getty Images A Chinese government hacking group has acquired a significant foothold inside critical infrastructure environments throughout the US and...

Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones

EnlargeGetty Images Researchers have devised a low-cost smartphone attack that cracks the authentication fingerprint used to unlock the screen and perform other...

Latest articles