March 25, 2015
Via: Dan GoodinRoughly half of all Android handsets are vulnerable to a newly discovered hack that in some cases allows attackers to surreptitiously modify or replace seemingly benign apps with malicious ones that steal passwords and other sensitive data. The “Android installer […]
March 20, 2015
Via: Peter BrightThose of you with long memories will recall a barrage of complaints in the run up to Windows 8’s launch that concerned the ability to install other operating systems—whether they be older versions of Windows, or alternatives such as Linux […]
March 13, 2015
Via: Dan GoodinGoogle leaked the complete hidden whois data attached to more than 282,000 domains registered through the company’s Google Apps for Work service, a breach that could bite good and bad guys alike. The 282,867 domains counted by Cisco Systems’ researchers […]
March 10, 2015
Via: Dan GoodinIn August 2010, Microsoft patched a previously unknown USB vulnerability that state-sponsored attackers had secretly exploited for years, first to infect targets of the “omnipotent” Equation Group and shortly thereafter to spread the virulent Stuxnet worm inside Iranian nuclear facilities. […]
March 10, 2015
Via: Dan GoodinIn one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux. The technique, […]