Tech

Backdoor in public repository used new form of attack to target big firms

Enlarge (credit: Getty Images) A backdoor that researchers found hiding inside open source code targeting four German companies was the work of a professional penetration tester. The tester was checking clients’ resilience against a new class of attacks that exploits public repositories used by millions of software projects worldwide. But it could have been bad. […]

Tech

US and its allies say Russia waged cyberattack that took out satellite network

Enlarge (credit: Sean Gladwell / Getty Images) The US and European Union on Tuesday said Russia was responsible for a cyberattack in February that crippled a satellite network in Ukraine and neighboring countries, disrupting communications and a wind farm used to generate electricity. The February 24 attack unleashed wiper malware that destroyed thousands of satellite […]

Tech

Netflix’s ad-supported tier will reportedly roll out sooner than expected

Enlarge (credit: Getty Images | Anadolu Agency) Netflix has reportedly told employees it plans to roll out an ad-supported tier by the end of this year, sooner than expected. Additionally, Netflix’s plan for an extra fee to fight password-sharing would roll out around the same time. In a note to employees, “Netflix executives said that […]

Tech

Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating

Enlarge Researchers are marveling at the scope and magnitude of a vulnerability that hackers are actively exploiting to take full control of network devices that run on some of the world’s biggest and most sensitive networks. The vulnerability, which carries a 9.8 severity rating out of a possible 10, affects F5’s BIG-IP, a line of […]

Tech

It’s Ars Frontiers week—and we’ve got something happening every day

Enlarge (credit: Aurich Lawson) We made it! After announcing our inaugural conference and providing you with updates, we’re ready to get things started. We’ve been planning this event for months, and as some of your favorite Ars staffers start hopping on planes to meet up in Washington, DC, later in the week, we’ll be kicking things […]

Tech

Small drones are giving Ukraine an unprecedented edge

Enlarge (credit: Petro Zadorozhny | Getty Images) In the snowy streets of the north Ukrainian town of Trostyanets, the Russian missile system fires rockets every second. Tanks and military vehicles are parked on either side of the blasting artillery system, positioned among houses and near the town’s railway system. The weapon is not working alone, […]

Tech

How Apple, Google, and Microsoft will kill passwords and phishing in 1 stroke

Enlarge (credit: Getty Images) For more than a decade, we’ve been promised that a world without passwords is just around the corner, and yet year after year, this security Nirvana proves out of reach. Now, for the first time, a workable form of passwordless authentication is about to become available to the masses in the […]

Tech

SEC fines Nvidia $5. 5M for misleading investors about GPU sales to crypto miners

Enlarge (credit: Getty Images) Nvidia has agreed to pay $5. 5 million in fines to the United States Securities and Exchange Commission in order to settle charges that it failed to disclose how many of its GPUs were being sold for cryptocurrency mining, the agency announced today . These charges are unrelated to the current […]

Tech

Russia hammered by pro-Ukrainian hackers following invasion

Enlarge (credit: Getty Images) For years, Dmitriy Sergeyevich Badin sat atop the FBI’s most wanted list. The Russian government-backed hacker has been suspected of cyber attacks on Germany’s Bundestag and the 2016 Olympics, held in Rio de Janeiro. A few weeks into Russia’s invasion of Ukraine, his own personal information—including his email and Facebook accounts […]

Tech

Gear from Netgear, Linksys, and 200 others has unpatched DNS poisoning flaw

Enlarge (credit: Getty Images) Hardware and software makers are scrambling to determine if their wares suffer from a critical vulnerability recently discovered in third-party code libraries used by hundreds of vendors, including Netgear, Linksys, Axis, and the Gentoo embedded Linux distribution. The flaw makes it possible for hackers with access to the connection between an […]