Tech

Judge grants class-action status to MacBook butterfly-keyboard suit

Enlarge (credit: Samuel Axon) A judge has granted class-action status to a suit against Apple over its controversial, allegedly defective MacBook “butterfly” keyboard design, agreeing that owners of any affected model in seven states qualify for the class. Beginning in 2018, several MacBook owners in seven states filed suits against Apple claiming the company knew […]

Tech

To security pros’ dread, another critical server vulnerability is under exploit

Enlarge (credit: Getty Images) In a development security pros feared, attackers are actively targeting yet another set of critical server vulnerabilities that leave corporations and governments open to serious network intrusions. The vulnerability this time is in BIG-IP, a line of server appliances sold by Seattle-based F5 Networks. Customers use BIG-IP servers to manage traffic […]

Tech

“Expert” hackers used 11 zerodays to infect Windows, iOS, and Android users

Enlarge (credit: Getty Images) A team of advanced hackers exploited no fewer than 11 zeroday vulnerabilities in a nine-month campaign that used compromised websites to infect fully patched devices running Windows, iOS, and Android, a Google researcher said. Using novel exploitation and obfuscation techniques, a mastery of a wide range of vulnerability types, and a […]

Tech

Attackers are trying awfully hard to backdoor iOS developers’ Macs

Enlarge (credit: Jayson Photography / Getty Images) Researchers said they’ve found a trojanized code library in the wild that attempts to install advanced surveillance malware on the Macs of iOS software developers. It came in the form of a malicious project the attacker wrote for Xcode, a developer tool that Apple makes freely available to […]

Tech

Mainstream DDoSers are abusing D/TLS servers to up the potency of attacks

Enlarge (credit: Getty Images) Criminals are upping the potency of distributed denial-of-service attacks with a technique that abuses a widely used Internet protocol that drastically increases the amount of junk traffic directed at targeted servers. DDoSes are attacks that flood a website or server with more data than it can handle. The result is a […]

Tech

I was a teenage Twitter hacker. Graham Ivan Clark gets 3-year sentence

(credit: Bob Jagendorf) A Florida teenager accused of orchestrating one of last year’s Twitter hacks—this one used celebrity accounts to make more than $100,000 in a cryptocurrency scam—pleaded guilty on Tuesday in exchange for a three-year sentence, it was widely reported. Authorities said that Graham Ivan Clark, now 18, and two other men used social […]

Tech

Mimecast says SolarWinds hackers breached its network and spied on customers

Enlarge / Breaking in the computer. (credit: Getty Images) Email-management provider Mimecast has confirmed that a network intrusion used to spy on its customers was conducted by the same advanced hackers responsible for the SolarWinds supply chain attack. The hackers, which US intelligence agencies have said likely have Russian origins, used a backdoored update for […]

Tech

Touch of gray: The Air Force can’t retire the Boeing 707

(video link) The Boeing B-52 Stratofortress may have a lock on the title for oldest active-duty US military aircraft. But it only has two years on the Air Force’s other senior citizen, an aircraft that will likely keep flying for as long as the B-52: the venerable Boeing 707. While the Air Force is working […]

Tech

$16 attack let hacker intercept a T-Mobile user’s text messages

Enlarge (credit: Getty Images | Milan_Jovic) In a new article titled “A Hacker Got All My Texts for $16,” Vice reporter Joseph Cox detailed how the white-hat hacker—an employee at a security vendor—was able to redirect all of his text messages and then break into online accounts that rely on texts for authentication. This wasn’t […]

Tech

If you’re getting bombarded with FaceTime group calls, you’re not alone

Enlarge (credit: Getty Images) FaceTime users are getting bombarded with group calls from numbers they’ve never seen before, often as many as 20 times in short succession during late hours of the night. Griefers behind the pranks call as many as 31 numbers at a time. When a person receiving one of the calls hangs […]