Linux programmers do a better job of patching security holes than programmers at Apple, Google, and…
Category: Security
Millions of Routers Exposed to RCE by USB Kernel Bug
The high-severity RCE flaw is in the KCodes NetUSB kernel module, used by popular routers from…
Raspberry Pi Detects Malware Using Electromagnetic Waves
Researchers take antivirus support to the next level with the Raspberry Pi. Read more at Tom’s…
DDR4 memory protections are broken wide open by new Rowhammer technique
Researchers build “fuzzer” that supercharges potentially serious bitflipping exploits. Read more at Ars Technica…
PS5 Exploit: Fail0verflow show decrypted PS5 firmware files (they already have the PS5 keys???) – Wololo.net
What a day for the PS5 scene! After TheFloW shared what appears to be a PS5…
The Deep-Learning Algorithm Can Guess an ATM PIN, Even With Keypads Covered
The algorithm only fails to guess the ATM PIN with 100% hand coverage. Whereas the attackers…
Python ransomware strikes virtual machines in ‘ultra-high-speed’ attacks
The attack was unique for its speed and use of a Python ransomware Read more at…
Wireless key-logger hidden inside USB-C to Lightning cable
A USB-C to Lightning cable with a hidden wireless key-logger can enable an attacker to capture…
AI Wrote Better Phishing Emails Than Humans in a Recent Test
Researchers found that tools like OpenAI’s GPT-3 helped craft devilishly effective spearphishing messages. Read more at…
Software downloaded 30,000 times from PyPI ransacked developers’ machines
Expect to see more of these “Frankenstein” malware packages, researchers warn. Read more at Ars Technica…
Pegasus Spyware: This New App Says It Can Instantly Check For Pegasus
Pegasus spyware might be becoming a bit easier to find, because iVerify has added the capability…
4 vulnerabilities under attack give hackers full control of Android devices
Google updates a 2-week-old security bulletin to say some vulnerabilities were 0-days. Read more at Ars…
Cybersecurity Researchers Build a Better “Canary Trap” – Using AI to Generate Fake Documents
A new artificial intelligence system generates fake documents to fool adversaries. During World War II, British…
Apple Execs Chose to Keep a Hack of 128 Million iPhones Quiet
Emails from the Epic Games lawsuit show Apple brass discussing how to handle a 2015 iOS…
Researchers Uncover Stealthy Linux Malware That Went Undetected for 3 Years
Researchers Uncover Stealthy Linux Malware That Went Undetected for 3 Years Read more at The Hacker…
Linux Foundation Bans University After It Intentionally Submitted Buggy Patches
Stable as they go. Read more at Tom’s Hardware…
University Responds to Ban On Linux Contributions
“We take this situation extremely seriously” Read more at Tom’s Hardware…
Hackers Are Stealing Sex Vids From Home Security Systems and Selling Them
“Many people like such kind of stuff nowadays, watching people’s privacy, what they’re doing at the…
IBM bets homomorphic encryption is ready to deliver stronger data security for early adopters
Homomorphic encryption enables computing on data while it remains encrypted. IBM believes this will unlock a…
Ransomware admin is refunding victims their ransom payments
After recently announcing the end of the operation, the administrator of Ziggy ransomware is now stating…