Archives: Projects

Home » Projects » Page 516
Why it’s hard to sanction ransomware groups
Project

Why it’s hard to sanction ransomware groups

Enlarge (credit: Rob Engelaar | Getty Images) This story was originally published by ProPublica. On February 25, the day after Russia invaded Ukraine, a prolific ransomware gang called Conti made a proclamation on its dark website. It was an unusually political statement for a cybercrime organization: Conti pledged its “full support of Russian government” and...

Project

Researchers find backdoor lurking in WordPress plugin used by schools

Enlarge (credit: BeeBright / Getty Images / iStockphoto) Researchers said on Friday that they found a malicious backdoor in a WordPress plugin that gave attackers full control of websites that used the package, which is marketed to schools. The premium version of School Management, a plugin schools use to operate and manage their websites, has...

Twitter deal leaves Elon Musk with no easy way out
Project

Twitter deal leaves Elon Musk with no easy way out

Enlarge (credit: Chris Delmas/Getty Images) Since the financial crisis, corporate lawyers have aspired to build the ultimate ironclad merger contract that keeps buyers with cold feet from backing out. The “bulletproof” modern deal agreement now faces one of its biggest tests, as Elon Musk, the Tesla boss and richest person in the world, openly entertains...

How we learned to break down barriers to machine learning
Project

How we learned to break down barriers to machine learning

Dr. Sephus discusses breaking down barriers to machine learning at Ars Frontiers 2022. Click here for transcript. (video link) Welcome to the week after Ars Frontiers! This article is the first in a short series of pieces that will recap each of the day’s talks for the benefit of those who weren’t able to travel...

Project

New Bluetooth hack can unlock your Tesla—and all kinds of other devices

Enlarge (credit: Getty Images) When you use your phone to unlock a Tesla, the device and the car use Bluetooth signals to measure their proximity to each other. Move close to the car with the phone in hand, and the door automatically unlocks. Move away, and it locks. This proximity authentication works on the assumption...

Project

New Bluetooth hack can unlock your Tesla—and all kinds of other devices

Enlarge (credit: Getty Images) When you use your phone to unlock a Tesla, the device and the car use Bluetooth signals to measure their proximity to each other. Move close to the car with the phone in hand, and the door automatically unlocks. Move away, and it locks. This proximity authentication works on the assumption...

Project

New Bluetooth hack can unlock your Tesla—and all kinds of other devices

Enlarge (credit: Getty Images) When you use your phone to unlock a Tesla, the device and the car use Bluetooth signals to measure their proximity to each other. Move close to the car with the phone in hand, and the door automatically unlocks. Move away, and it locks. This proximity authentication works on the assumption...

Project

New Bluetooth hack can unlock your Tesla—and all kinds of other devices

Enlarge (credit: Getty Images) When you use your phone to unlock a Tesla, the device and the car use Bluetooth signals to measure their proximity to each other. Move close to the car with the phone in hand, and the door automatically unlocks. Move away, and it locks. This proximity authentication works on the assumption...

Project

New Bluetooth hack can unlock your Tesla—and all kinds of other devices

Enlarge (credit: Getty Images) When you use your phone to unlock a Tesla, the device and the car use Bluetooth signals to measure their proximity to each other. Move close to the car with the phone in hand, and the door automatically unlocks. Move away, and it locks. This proximity authentication works on the assumption...

Project

2 vulnerabilities with 9.8 severity ratings are under exploit. A 3rd looms

Enlarge (credit: Getty Images) Malicious hackers, some believed to be state-backed, are actively exploiting two unrelated vulnerabilities—both with severity ratings of 9.8 out of a possible 10—in hopes of infecting sensitive enterprise networks with backdoors, botnet software, and other forms of malware. The ongoing attacks target unpatched versions of multiple product lines from VMware and...