Advertisements

Biz & IT

Hackers behind dangerous oil and gas intrusions are probing US power grids

Enlarge / Power Lines in Page, Arizona IIP Photo Archive In a new troubling escalation, hackers behind at least two potentially fatal intrusions on industrial facilities have expanded their activities to probing dozens of power grids in the US and elsewhere, researchers with security firm Dragos reported Friday. The group, now dubbed Xenotime by Dragos, …

Hackers behind dangerous oil and gas intrusions are probing US power grids Read More »

Advertisements

Cable companies can save money now that DOCSIS 3.1 upgrade is mostly done

Enlarge / A Comcast van in Sunnyvale, California, in November 2018. Getty Images | Andrei Stanescu Cable-company spending on network equipment is dropping as major providers like Comcast and Charter finish up their nationwide DOCSIS 3.1 rollouts. Equipment vendors that sell to cable companies such as Arris/CommScope and Casa Systems are reporting drops in cable-related …

Cable companies can save money now that DOCSIS 3.1 upgrade is mostly done Read More »

If you haven’t patched Vim or NeoVim text editors, you really, really should

Enlarge unknown A recently patched vulnerability in text editors preinstalled in a variety of Linux distributions allows hackers to take control of computers when users open a malicious text file. The latest version of Apple’s macOS is continuing to use a vulnerable version, although attacks only work when users have changed a default setting that …

If you haven’t patched Vim or NeoVim text editors, you really, really should Read More »

Group to fund and operate first hydrogen fuel ferry fleet in the US

The first hydrogen-powered commercial ferry under construction. Golden Gate Zero Emission Marine / Switch Maritime An artist’s rendering of the hydrogen fuel cell ferry in front of the Golden Gate Bridge. Golden Gate Zero Emission Marine / Switch Maritime On Wednesday, a plan to put hydrogen fuel cell-powered ferries in US waters moved forward as …

Group to fund and operate first hydrogen fuel ferry fleet in the US Read More »

Researchers discover “Fishwrap” influence campaign recycling old terror news

Enlarge / Old news, new fish. Rick Barrentine/Getty Images Researchers at Recorded Future have uncovered what appears to be a new, growing social media-based influence operation involving more than 215 social media accounts. While relatively small in comparison to influence and disinformation operations run by the Russia-affiliated Internet Research Agency (IRA), the campaign is notable …

Researchers discover “Fishwrap” influence campaign recycling old terror news Read More »

Researchers use Rowhammer bit flips to steal 2048-bit crypto key

Enlarge / A DDR3 DIMM with error-correcting code from Samsung. ECC is no longer an absolute defense against Rowhammer attacks. Samsung The Rowhammer exploit that lets unprivileged attackers corrupt or change data stored in vulnerable memory chips has evolved over the past four years to take on a range of malicious capabilities, including elevating system …

Researchers use Rowhammer bit flips to steal 2048-bit crypto key Read More »

As summer heats up, Calif. utility starts cutting power to prevent wildfires

Enlarge / A firefighter passes by a Smokey the Bear fire danger sign during a brush fire in Burbank, Calif., on May 25, 2018. Ronen Tivony/NurPhoto via Getty Images This weekend, one of California’s largest utilities—Pacific Gas and Electric (PG&E)—elected to shut off power to customers in two counties as part of its newly-expanded “Public …

As summer heats up, Calif. utility starts cutting power to prevent wildfires Read More »

Millions of machines affected by command execution flaw in Exim mail server

Enlarge Michael Theis / Flickr Millions of Internet-connected machines running the open source Exim mail server may be vulnerable to a newly disclosed vulnerability that, in some cases, allows unauthenticated attackers to execute commands with all-powerful root privileges. The flaw, which dates back to version 4.87 released in April 2016, is trivially exploitable by local …

Millions of machines affected by command execution flaw in Exim mail server Read More »

The clever cryptography behind Apple’s “Find My” feature

Enlarge / The 2018 15-inch Apple MacBook Pro with Touch Bar. Samuel Axon When Apple executive Craig Federighi described a new location-tracking feature for Apple devices at the company’s Worldwide Developer Conference keynote on Monday, it sounded—to the sufficiently paranoid, at least—like both a physical security innovation and a potential privacy disaster. But while security …

The clever cryptography behind Apple’s “Find My” feature Read More »