Tech

Ukraine arrests ransomware gang in global cybercriminal crackdown

Enlarge / A Colonial Pipeline facility in Woodbridge, New Jersey. Hackers last month disrupted the pipeline supplying petroleum to much of the East Coast. (credit: Michael M. Santiago, Getty Images) Ukrainian police have arrested members of a notorious ransomware gang that recently targeted American universities, as pressure mounts on global law enforcement to crack down […]

Tech

Newly discovered Vigilante malware outs software pirates and blocks them

Enlarge (credit: Getty Images) A researcher has uncovered one of the more unusual finds in the annals of malware: boobytrapped files available on sites frequented by software pirates that rat out downloaders and try to prevent unauthorized downloading in the future. Vigilante, as SophosLabs Principal Researcher Andrew Brandt is calling the malware, gets installed when […]

Tech

Starlink dishes go into “thermal shutdown” once they hit 122° Fahrenheit

Enlarge / Starlink satellite dish and equipment in the Idaho panhandle’s Coeur d’Alene National Forest. (credit: Wandering-coder) A Starlink beta user in Arizona said he lost Internet service for over seven hours yesterday when the satellite dish overheated, demonstrating one of the drawbacks of SpaceX’s broadband service. When the user’s Internet service was disrupted, the Starlink […]

Tech

Mystery malware steals 26M passwords from 3M PCs. Are you affected?

Enlarge (credit: Getty Images) Researchers have discovered yet another massive trove of sensitive data, a dizzying 1.2TB database containing login credentials, browser cookies, autofill data, and payment information extracted by malware that has yet to be identified. In all, researchers from NordLocker said on Wednesday, the database contained 26 million login credentials, 1.1 million unique […]

Tech

Hackers can mess with HTTPS connections by sending data to your email server

Enlarge (credit: Getty Images) When you visit an HTTPS-protected website, your browser doesn’t exchange data with the webserver until it has ensured that the site’s digital certificate is valid. That prevents hackers with the ability to monitor or modify data passing between you and the site from obtaining authentication cookies or executing malicious code on […]

Tech

Hacker lexicon: What is a supply chain attack?

Enlarge (credit: Frank Lindecke / Flickr) Cybersecurity truisms have long been described in simple terms of trust: Beware email attachments from unfamiliar sources, and don’t hand over credentials to a fraudulent website. But increasingly, sophisticated hackers are undermining that basic sense of trust and raising a paranoia-inducing question: What if the legitimate hardware and software […]