Advertisements


Hacker took pains to hide $3.36B of stolen bitcoin. Feds found it anyway

The haul, the second biggest in DOJ history, shows the difficulty of hiding cryptocurrency. Enlarge / Bitcoin laundering concept vector illustration. Federal prosecutors have recovered $3.36 billion in bitcoin that was.....»»

Category: topSource:  arstechnicaNov 8th, 2022

Thousands of Asus routers taken over by malware to form new proxy service

Outdated Asus routers are being assimilated into a malicious botnet used by hackers to hide their traces.....»»

Category: topSource:  theglobeandmailRelated NewsMar 27th, 2024

This ‘unpatchable’ Mac flaw is keeping me up at night

A newly discovered vulnerability could leave Apple Silicon Macs wide open to malicious hacker attacks -- and it looks like the flaw can’t even be patched......»»

Category: topSource:  digitaltrendsRelated NewsMar 25th, 2024

Feds want grizzly bears back in Washington"s North Cascades

The National Park Service and U.S. Fish & Wildlife Service published a final series of proposals Thursday calling for reintroducing grizzly bears to the North Cascades......»»

Category: topSource:  pcmagRelated NewsMar 22nd, 2024

Ex-Secret Service agent and convicted hacker share stage at GISEC Global

A former United States Secret Service Agent and a Vietnamese former-hacker-turned-cybersecurity-specialist are set to reunite for the first time at GISEC Global 2024 to discuss their unique cat-and-mouse-style chase, which ultimately resulted in an a.....»»

Category: securitySource:  netsecurityRelated NewsMar 22nd, 2024

The Feds Are Trying to Get Plants to Mine Metal Through Their Roots

Some species can absorb extreme amounts of nickel from soils. Such “phytomining” could help provide batteries essential for the renewable revolution......»»

Category: gadgetSource:  wiredRelated NewsMar 21st, 2024

Fake data breaches: Countering the damage

Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum cla.....»»

Category: securitySource:  netsecurityRelated NewsMar 21st, 2024

Preventing another "Jan. 6" starts by changing how elections are certified, experts say

The 2024 presidential election may be a rematch between President Joe Biden and former President Donald Trump, but preventing a repeat of Jan. 6, 2021—when false claims of a stolen election promoted by Donald Trump and his allies led to an insurrec.....»»

Category: topSource:  theglobeandmailRelated NewsMar 20th, 2024

Study suggests major chemical corporations hide most polluting activities in subsidiaries

According to the EPA's Toxics Release Inventory (TRI), chemical manufacturing is one of the U.S.'s three largest polluters, along with metal mining and electric utilities, which together account for two-thirds of the country's toxic releases......»»

Category: topSource:  physorgRelated NewsMar 19th, 2024

ASCII art elicits harmful responses from 5 major AI chatbots

LLMs are trained to block harmful responses. Old-school images can override those rules. Enlarge / Some ASCII art of our favorite visual cliche for a hacker. (credit: Getty Images) Researchers have discovered a new way.....»»

Category: topSource:  arstechnicaRelated NewsMar 16th, 2024

Researchers use ASCII art to elicit harmful responses from 5 major AI chatbots

LLMs are trained to block harmful responses. Old-school images can override those rules. Enlarge / Some ASCII art of our favorite visual cliche for a hacker. (credit: Getty Images) Researchers have discovered a new way.....»»

Category: topSource:  arstechnicaRelated NewsMar 16th, 2024

Amid paralyzing ransomware attack, feds probe UnitedHealth’s HIPAA compliance

UnitedHealth said it will cooperate with the probe as it works to restore services. Enlarge (credit: Getty | Bloomberg) As health systems around the US are still grappling with an unprecedented ransomware attack on the c.....»»

Category: topSource:  arstechnicaRelated NewsMar 14th, 2024

“Overwhelming evidence” shows Craig Wright did not create bitcoin, judge says

Jack Dorsey posted a "W," as judge halts Wright's suits against developers. Enlarge / Dr. Craig Wright arrives at the Rolls Building, part of the Royal Courts of Justice, on February 06, 2024, in London, England. (credit: Dan Ki.....»»

Category: topSource:  arstechnicaRelated NewsMar 14th, 2024

The potential TikTok ban is being decided on by the wrong people

Here we go again. Four years after the last time the feds tried this, TikTok is on the cusp of an effective ban forged by a host of elected officials who know about money but dangerously know nothing about technology.A state-level TikTok ban has been.....»»

Category: appleSource:  appleinsiderRelated NewsMar 14th, 2024

AirTag & police save builder from massive stolen car replacement expense

A worksman left his car keys on the dash, and the vehicle was promptly stolen. Apple's AirTag came to the rescue.Builder Paul Conway from Leeds in England has told local news site Leeds Live that at Christmas, his wife had bought a four-pack of AirTa.....»»

Category: appleSource:  appleinsiderRelated NewsMar 14th, 2024

Meta sues “brazenly disloyal” former exec over stolen confidential docs

Meta's former exec allegedly shared data center secrets with a shadowy startup. Enlarge (credit: Boris Zhitkov | Moment) A recently unsealed court filing has revealed that Meta has sued a former senior employee for "braz.....»»

Category: topSource:  arstechnicaRelated NewsMar 14th, 2024

Bitcoin Fog operator convicted of laundering $400M in bitcoins on darknet

Roman Sterlingov will appeal, denouncing DOJ's crypto-tracing techniques. Enlarge (credit: Bloomberg / Contributor | Bloomberg) A US federal jury has convicted a dual Russian-Swedish national, Roman Sterlingov, for opera.....»»

Category: topSource:  arstechnicaRelated NewsMar 14th, 2024

Stanford University says data of thousands was stolen in ransomware attack

Some 27,000 people have had their data stolen, including Social Security numbers and government ID data......»»

Category: topSource:  pcmagRelated NewsMar 13th, 2024

Keyloggers, spyware, and stealers dominate SMB malware detections

In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers subsequently use this stolen information to gain unauthorized remote access, e.....»»

Category: securitySource:  netsecurityRelated NewsMar 13th, 2024

Bitcoin app accused of stealing $120,000 in another App Store failure [u]

Bitcoin app accused of stealing $120,000 in another App Store failure [u].....»»

Category: appleSource:  appleinsiderRelated NewsMar 11th, 2024

Microsoft: Russian hackers accessed internal systems, code repositories

Midnight Blizzard (aka APT29), a group of Russian hackers tied to the country’s Foreign Intelligence Service (SVR), has leveraged information stolen from Microsoft corporate email systems to burrow into the company’s source code repositor.....»»

Category: securitySource:  netsecurityRelated NewsMar 11th, 2024