Tech

DDoSers are abusing the Plex Media Server to make attacks more potent

Enlarge (credit: Getty Images) Distributed denial-of-service attackers have seized on a new vector for amplifying the junk traffic they lob at targets to take them offline: end users or networks using the Plex Media Server. DDoS amplification is a technique that leverages the resources of an intermediary to increase the firepower of attacks. Rather than […]

Tech

Zoombombing countermeasures are ineffective in the vast majority of cases

Enlarge As the COVID-19 pandemic forced schools, colleges, and businesses to limit in-person meetings, the world quickly adopted video conferencing from services such as Zoom and Google Meet. That, in turn, gave way to “zoombombing,” the term for when Internet trolls join online meetings with the goal of disrupting them and harassing their participants. Meeting […]

Tech

Google Pixel phones will soon track heart rate using only the camera

Google Fit for Pixel phones will have this new card in the middle for vitals tracking. [credit: Google ] Google’s latest Pixel-exclusive feature is the ability to track your heart rate and respiratory rate, without any extra hardware. The company says that, starting next month, Google Fit on Pixel phones will track these health stats using […]

Tech

New report on Apple’s VR headset: 8K in each eye, potential $3,000 price tag

Enlarge / The “Sword of Damocles” head-mounted display, the original augmented reality headset, circa 1968. Augmented reality has gotten a lot more mobile in the past decade. (credit: Ivan Sutherland) A new report in The Information corroborates and expands upon an earlier Bloomberg report claiming that Apple is preparing to launch a high-end VR headset […]

Tech

SolarWinds patches vulnerabilities that could allow full system control

Enlarge (credit: Getty Images) SolarWinds, the previously little-known company whose network-monitoring tool Orion was a primary vector for one of the most serious breaches in US history, has pushed out fixes for three severe vulnerabilities. Martin Rakhmanov, a researcher with Trustwave SpiderLabs, said in a blog post on Wednesday that he began analyzing SolarWinds products […]

Tech

Malicious Chrome and Edge add-ons had a novel way to hide on 3 million devices

Enlarge (credit: Getty Images) In December, Ars reported that as many as 3 million people had been infected by Chrome and Edge browser extensions that stole personal data and redirected users to ad or phishing sites. Now, the researchers who discovered the scam have revealed the lengths the extension developers took to hide their nefarious […]

Tech

Hate the Apple TV remote? Use a gorgeous modded Game Boy instead

A modified Game Boy Color being used as an Apple TV remote. [credit: Otto Climan ] A tech DIY YouTuber named Otto Climan worked with Retro Modding to make a beautiful, classic Apple-style Game Boy Color with an updated screen and the ability to work as an Apple TV remote. There’s no overstating the love-it/hate-it […]

Tech

Boston Dynamics’ robot dog gets an arm attachment, self-charging capabilities

Boston Dynamics’ “Spot” robot is getting some upgrades. The robot dog officially went on sale to the public last year for a cool $74,500. For the first time in the company’s 29-year history, Boston Dynamics actually started selling robots to the general public, and it’s pretty incredible that you can actually just head to the […]

Tech

Containerize all the things with Ubuntu Core 20

Enlarge / You might draw a fairly similar schematic diagram to give someone a simplified idea of how a traditional Linux distribution is put together—but it wouldn’t be as close to literal accuracy as this Ubuntu Core diagram is. (credit: Canonical) Canonical released Ubuntu Core 20 today, and it is now available for download. If […]

Tech

High-performance computers are under siege by a newly discovered backdoor

Enlarge (credit: Getty Images) High-performance computer networks, some belonging to the world’s most prominent organizations, are under attack by a newly discovered backdoor that gives hackers the ability to remotely execute commands of their choice, researchers said on Tuesday. Kobalos, as researchers from security firm Eset have named the malware, is a backdoor that runs […]