A cybersecurity company says a popular smart home security system has a pair of vulnerabilities that can be exploited to disarm the system altogether. Rapid7 found the vulnerabilities in the Fortress S03, a home security system that relies on Wi-Fi to connect cameras, motion sensors and sirens to the internet, allowing owners to remotely monitor […]
Ragnarok ransomware gang shuts down and releases its decryption key
Ragnarok, a ransomware gang operational since 2019 that gained notoriety after launching attacks against unpatched Citrix ADC servers, has shut down and released a free decryption key for its victims. The gang, sometimes referred to as Asnarok, last week replaced all 12 of the victims listed on its dark web portal with a short instruction […]
アマゾンが収集している大量の個人情報の中身と、その“追跡”をかわす方法
アマゾンはユーザーのさまざまな個人情報を収集している。Amazonでの検索や購入の履歴のみならず、一つひとつのクリックやスクロール、そして「Alexa」が録音した音声まで、アマゾンのエコシステム内でとる行動のすべてが知られているのだ。この“追跡”は、いったいどこまでかわすことができるのか──。その方法を調べてみた。
…
How Microsoft, Google, Apple, and IBM Will Help the US Improve Its Cybersecurity
Infosecurity magazine reports:
Some of the world’s biggest tech companies have committed tens of billions of dollars to improving supply chain security, closing industry skills gaps and driving security awareness among the public, according to the Whit…
Linux 5.14 set to boost future enterprise application security
Linux is set for a big release this Sunday August 29, setting the stage for enterprise and cloud applications for months to come. The 5.14 kernel update will include security and performance improvements. A particular area of interest for both enterprise and cloud users is always security and to that end, Linux 5.14 will help […]
T-Mobile Hacker Explains How He Breached Carrier’s Security
According to the Wall Street Journal, the person behind T-Mobile’s recent security breach that affected more than 50 million customers is a 21-year-old named John Binns. ” Binns said he broke through the T-mobile defenses after discovering an unprotect…
China’s Microsoft Hack May Have Had A Bigger Purpose Than Just Spying
An anonymous reader shares a report: Steven Adair hunts hackers for a living. Back in January, in a corner-of-his-eye, peripheral kind of way, he thought he saw one in his customer’s networks — a shadowy presence downloading emails. Adair is the found…
To prevent cyberattacks, the government should limit the scope of a software bill of materials
There is no reason to disdain the concept of SBOM outright. Indeed, it’s heartening to see the federal government take cybersecurity so seriously.