A sell-off of tech stocks in the public markets has prompted private start-ups to evaluate whether their soaring valuations over the past two years will hold up.
Hackers are targeting industrial systems with malware
Enlarge (credit: Getty Images) From the what-could-possibly-go-wrong files comes this: An industrial control engineer recently made a workstation part of a botnet after inadvertently installing malware advertising itself as a means for recovering lost passwords. Lost passwords happen in many organizations. A programmable logic controller—used to automate processes inside factories, electric plants, and other industrial...
Cryptocurrency flowing into “mixers” hits an all-time high. Wanna guess why?
Enlarge (credit: Getty Images) The amount of cryptocurrency flowing into privacy-enhancing mixer services has reached an all-time high this year as funds from wallets belonging to government-sanctioned groups and criminal activity almost doubled, researchers reported on Thursday. Mixers, also known as tumblers, obfuscate cryptocurrency transactions by creating a disconnect between the funds a user deposits...
Microsoft wins deal to serve ads on Netflix, edging out Comcast and Google
Enlarge (credit: Netflix) Netflix has hired Microsoft to provide the advertising technology for the streaming service’s planned ad-supported tier, the companies announced Wednesday. Comcast’s NBCUniversal subsidiary and Google were reportedly “top contenders” to serve ads on Netflix before Microsoft won the contract. Microsoft will be the “global advertising technology and sales partner” for the “new lower...
Vulnerabilities that could allow undectable infections affect 70 Lenovo laptop models
Enlarge (credit: Lenovo) For owners of more than 70 Lenovo laptop models, it’s time once again to patch the UEFI firmware against critical vulnerabilities that attackers can exploit to install malware that can be nearly impossible to detect or remove. The laptop maker on Tuesday released updates for three vulnerabilities that researchers found in the...
Ongoing phishing campaign can hack you even when you’re protected with MFA
Enlarge (credit: Getty Images) On Tuesday, Microsoft detailed an ongoing large-scale phishing campaign that can hijack user accounts when they’re protected with multi-factor authentication measures designed to prevent such takeovers. The threat actors behind the operation, who have targeted 10,000 organizations since September, have used their covert access to victim email accounts to trick employees...
New working speculative execution attack sends Intel and AMD scrambling
Enlarge Some microprocessors from Intel and AMD are vulnerable to a newly discovered speculative execution attack that can covertly leak password data and other sensitive material, sending both chipmakers scrambling once again to contain what is proving to be a stubbornly persistent vulnerability. Researchers from ETH Zurich have named their attack Retbleed because it exploits...
New working speculative execution attack sends Intel and AMD scrambling
Enlarge Some microprocessors from Intel and AMD are vulnerable to a newly discovered speculative execution attack that can covertly leak password data and other sensitive material, sending both chipmakers scrambling once again to contain what is proving to be a stubbornly persistent vulnerability. Researchers from ETH Zurich have named their attack Retbleed because it exploits...
New working speculative execution attack sends Intel and AMD scrambling
Enlarge Some microprocessors from Intel and AMD are vulnerable to a newly discovered speculative execution attack that can covertly leak password data and other sensitive material, sending both chipmakers scrambling once again to contain what is proving to be a stubbornly persistent vulnerability. Researchers from ETH Zurich have named their attack Retbleed because it exploits...
Russian “hacktivists” are causing trouble far beyond Ukraine
Enlarge (credit: Getty Images | Sergey Balakhnichev) The attacks against Lithuania started on June 20. For the next 10 days, websites belonging to the government and businesses were bombarded by DDoS attacks, overloading them with traffic and forcing them offline. “Usually the DDoS attacks are concentrated on one or two targets and generate huge traffic,”...


