Enlarge (credit: Getty Images) Researchers have found another 17 malicious packages in an open source repository, as the use of such repositories to spread malware continues to flourish. This time, the malicious code was found in NPM, where 11 million developers trade more than 1 million packages among each other. Many of the 17 malicious […]
Tag: Biz & IT
Tor is under threat from Russian censorship and Sybil attacks
Enlarge (credit: Getty Images) The Tor anonymity service and anticensorship tool has come under fire from two threats in recent weeks: The Russian government has blocked most Tor nodes in that country, and hundreds of malicious servers have been relaying traffic. Russia’s Federal Service for Supervision of Communications, Information Technology, and Mass Media, known as […]
Verizon overrides users’ opt-out preferences in push to collect browsing history
Enlarge (credit: Getty Images | Scott Olson) Verizon is automatically enrolling customers in a new version of a program that scans mobile users’ browser histories—even when those same users previously opted out of the program when it had a different name. The carrier announced changes to its “Verizon Selects” program along with a new name […]
Microsoft seizes domains used by “highly sophisticated” hackers in China
Enlarge / Computer chip with Chinese flag, 3d conceptual illustration. (credit: Steve McDowell / Agefotostock) Microsoft said it has seized control of servers that a China-based hacking group was using to compromise targets that align with that country’s geopolitical interests. The hacking group, which Microsoft has dubbed Nickel, has been in Microsoft’s sights since at […]
SolarWinds hackers have a whole bag of new tricks for mass compromise attacks
Enlarge (credit: Getty Images) Almost exactly a year ago, security researchers uncovered one of the worst data breaches in modern history, if not ever: a Kremlin-backed hacking campaign that compromised the servers of network management provider SolarWinds and, from there, the networks of 100 of its highest-profile customers, including nine US federal agencies. Nobelium—the name […]
iPhones of US diplomats hacked using “0-click” exploits from embattled NSO
Enlarge (credit: Getty Images) The apple iphones of nine US State Department officials were infected by powerful and stealthy malware developed by NSO Group, the Israeli exploit seller that has come under increasing scrutiny for selling its wares to journalists, lawyers, activists, and US allies. The US officials, either stationed in Uganda or focusing on […]
AT&T failed to fix Ohio man’s broken Internet service for a month
Enlarge (credit: Getty Images | Ronald Martinez ) Ohio resident John Sopko had to go a month without his AT& T fixed wireless Internet service because the company repeatedly failed to diagnose and fix the problem, the Akron Beacon Journal reported today . AT& T finally figured out this week that the antenna on Sopko’s […]
Ransomware attack on Planned Parenthood steals data of 400,000 patients
Enlarge (credit: Rob Engelaar | Getty Images) Ransomware hackers broke into a Planned Parenthood network and accessed medical records or other sensitive data for more than 400,000 patients of the reproductive health care group. The disclosure came in a sample letter posted to the California attorney general’s website and a release published by the organization. […]
Hackers drain $31 million from cryptocurrency service MonoX Finance
Enlarge (credit: Getty Images) Blockchain startup MonoX Finance said on Wednesday that a hacker stole $31 million by exploiting a bug in software the service uses to draft smart contracts. The company uses a decentralized finance protocol known as MonoX that lets users trade digital currency tokens without some of the requirements of traditional exchanges. […]
Thousands of AT&T customers in the US infected by new data-stealing malware
Enlarge (credit: Getty Images) Thousands of networking devices belonging to AT&T Internet subscribers in the US have been infected with newly discovered malware that allows the devices to be used in denial-of-service attacks and attacks on internal networks, researchers said on Tuesday. The device model under attack is the EdgeMarc Enterprise Session Border Controller, an […]