Enlarge (credit: Gab.com) Over the weekend, word emerged that a hacker breached far-right social media website Gab and downloaded 70 gigabytes of data by exploiting a garden-variety security flaw known as an SQL injection. A quick review of Gab’s open source code shows that the critical vulnerability—or at least one very much like it—was introduced […]
Tag: Biz & IT
Gab, the far-right website, has been hacked and 70GB of data leaked
Enlarge (credit: Gab.com) The founder of the far-right social media platform Gab said that the private account of former President Donald Trump was among the data stolen and publicly released by hackers who recently breached the site. In a statement on Sunday, founder Andrew Torba used a transphobic slur to refer to Emma Best, the […]
Verizon tells users to disable 5G to preserve battery, then deletes tweet
Enlarge / A Verizon booth at Mobile World Congress Americas in Los Angeles in September 2018. (credit: Verizon) Verizon has spent years hyping 5G despite it bringing just a minor speed upgrade outside the limited areas where millimeter-wave spectrum has been deployed, but the carrier’s support team advised users yesterday to shut 5G off if […]
Hackers tied to Russia’s GRU targeted the US grid for years
Enlarge (credit: Yuri Smityuk | Getty Images) For all the nation-state hacker groups that have targeted the United States power grid—and even successfully breached American electric utilities—only the Russian military intelligence group known as Sandworm has been brazen enough to trigger actual blackouts, shutting the lights off in Ukraine in 2015 and 2016. Now one […]
Hard-coded key vulnerability in Logix PLCs has severity score of 10 out of 10
Enlarge (credit: Rockwell Automation) Hardware that is widely used to control equipment in factories and other industrial settings can be remotely commandeered by exploiting a newly disclosed vulnerability that has a severity score of 10 out of 10. The vulnerability is found in programmable logic controllers from Rockwell Automation that are marketed under the Logix […]
AT&T announces deal to spin off DirecTV into new company owned by… AT&T
Enlarge / AT&T’s logo at its corporate headquarters on March 13, 2020 in Dallas, Texas. (credit: Getty Images | Ronald Martinez ) Nearly six years after buying DirecTV for $48.5 billion, AT&T today announced a deal to sell a minority stake in the business unit and spin it out into a new subsidiary. AT&T said […]
Armed with exploits, hackers on the prowl for a critical VMware vulnerability
Enlarge (credit: Getty Images) Hackers are mass scanning the Internet in search of VMware servers with a newly disclosed code-execution vulnerability that has a severity rating of 9.8 out of a possible 10. CVE-2021-21974, as the security flaw is tracked, is a remote code-execution vulnerability in VMware vCenter server, an application for Windows or Linux […]
Verizon and AT&T dominate spectrum auction, spending combined $69 billion
Enlarge (credit: Getty Images | metamorworks) Verizon and AT&T dominated the US government’s latest spectrum auction, spending a combined $68.9 billion on licenses in the upper 3GHz band. Verizon’s winning bids totaled $45.45 billion, while AT&T’s came in at $23.41 billion. T-Mobile was third with $9.34 billion as the three biggest wireless carriers accounted for […]
Cox’s bad customer service stymies users who don’t want upload speeds cut
Enlarge (credit: Getty Images | Jill Ferry Photography) Cox has been making it extremely difficult or impossible for some customers to stick with their current Internet speeds despite promising that it won’t force users onto plans with slower uploads. As we wrote two weeks ago, Cox informed customers with 300Mbps download and 30Mbps upload speeds […]
Ukraine says Russia hacked its document portal and planted malicious files
Enlarge (credit: Oleksii Leonov) Ukraine has accused the Russian government of hacking into one of its government Web portals and planting malicious documents that would install malware on end users’ computers. “The purpose of the attack was the mass contamination of information resources of public authorities, as this system is used for the circulation of […]