Dan Goodin - Page 11

122 Posts
0 Comments

FBI warns of increasing use of AI-generated deepfakes in sextortion schemes

Enlarge The FBI on Monday warned of the increasing use of artificial intelligence to generate phony videos for use in sextortion schemes...

Mass exploitation of critical MOVEit flaw is ransacking orgs big and small

EnlargeGetty Images Organizations big and small are falling prey to the mass exploitation of a critical vulnerability in a widely used file-transfer...

Google’s Android and Chrome extensions are a very sad place. Here’s why

EnlargePhoto Illustration by Miguel Candela/SOPA Images/LightRocket via Getty Images No wonder Google is having trouble keeping up with policing its app store....

Researchers tell owners to “assume compromise” of unpatched Zyxel firewalls

EnlargeGetty Images Firewalls made by Zyxel are being wrangled into a destructive botnet, which is taking control of them by exploiting a...

Critical Barracuda 0-day was used to backdoor networks for 8 months

EnlargeGetty Images A critical vulnerability patched 10 days ago in widely used email software from IT security company Barracuda Networks has been...

Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days

Enlarge Smartphone malware sold to governments around the world can surreptitiously record voice calls and nearby audio, collect data from apps such...

Chinese state hackers infect critical infrastructure throughout the US and Guam

Enlargepeterschreiber.media | Getty Images A Chinese government hacking group has acquired a significant foothold inside critical infrastructure environments throughout the US and...

Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones

EnlargeGetty Images Researchers have devised a low-cost smartphone attack that cracks the authentication fingerprint used to unlock the screen and perform other...

Potentially millions of Android TVs and phones come with malware preinstalled

Enlarge / Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.Getty Images Overall, Android devices...

Malware turns home routers into proxies for Chinese state-sponsored hackers

EnlargeGetty Images Researchers on Tuesday unveiled a major discovery—malicious firmware that can wrangle a wide range of residential and small office routers...

Latest articles