Advertisements

Biz & IT

Valve says turning away researcher reporting Steam vulnerability was a mistake

Enlarge Timothy Brown / Flickr In an attempt to quell a controversy that has raised the ire of white-hat hackers, the maker of the Steam online game platform said on Thursday it made a mistake when it turned away a researcher who recently reported two separate vulnerabilities. In its statement, Valve Corporation references HackerOne, the …

Valve says turning away researcher reporting Steam vulnerability was a mistake Read More »

Advertisements

While one Texas county shook off ransomware, small cities took full punch

Enlarge / They did. Hemera Technologies/Getty Images Few details have emerged about the coordinated ransomware attack that struck 22 local governments in Texas last week. But five local governments affected by the attack have been identified. On August 20, the Texas Department of Information Resources revised its initial report that 23 “entities” had been affected …

While one Texas county shook off ransomware, small cities took full punch Read More »

Google, Apple, and Mozilla block Kazakhstan government’s browser spying

Enlarge Getty Images | Thomas Jackson Major browser makers are blocking the use of a root certificate that Kazakhstan’s government has used to intercept Internet traffic. Mozilla and Google issued a joint announcement today saying that “the companies deployed technical solutions within Firefox and Chrome to block the Kazakhstan government’s ability to intercept Internet traffic …

Google, Apple, and Mozilla block Kazakhstan government’s browser spying Read More »

Anonymous “Anonymous Cowards” are, for now, not welcome on Slashdot

Enlarge / What’s to come of Slashdot’s Anonymous Coward feature? It was down, then it came back with a change; will it get changed once more? Aurich Lawson On August 9, tech news aggregator Slashdot quietly removed one of its earliest features, which had been available to all visitors since its founding in 1997: the …

Anonymous “Anonymous Cowards” are, for now, not welcome on Slashdot Read More »

New Attack exploiting serious Bluetooth weakness can intercept sensitive data

Enlarge Researchers have demonstrated a serious weakness in the Bluetooth wireless standard that could allow hackers to intercept keystrokes, address books, and other sensitive data sent from billions of devices. Dubbed Key Negotiation of Bluetooth—or KNOB for short—the attack forces two or more devices to choose an encryption key just a single byte in length …

New Attack exploiting serious Bluetooth weakness can intercept sensitive data Read More »

Disney fights streaming account sharing with help from cable industry

Enlarge / Here they come, all together in a streaming bundle. Disney / Sam Machkovech Disney and Charter Communications are teaming up to fight account sharing in an attempt to prevent multiple people from using a single account to access streaming video services. The battle against account sharing was announced as Disney and the nation’s …

Disney fights streaming account sharing with help from cable industry Read More »

Woman accused of Capital One hack had stolen data from 30 companies, authorities say

Enlarge / Paige Thompson, 33, a former Seattle technology company software engineer, was arrested after she boasted about a massive data theft from Capital One on GitHub. She is now accused of 30 other data thefts. Johannes Eisele/AFP/Getty Images In a petition filed on August 13 in federal court in Seattle, the Justice Department asserted …

Woman accused of Capital One hack had stolen data from 30 companies, authorities say Read More »

Apple’s new credit card comes with forced arbitration—here’s how to opt out

Enlarge / Shiny! Apple’s new credit card is rolling out in stages to interested users (I got mine Monday!) and the early reception is generally positive. The card’s primary draw isn’t in its benefits, which are perfectly fine but not outstanding by any metric, but instead lies with its tight vertical integration with the Apple …

Apple’s new credit card comes with forced arbitration—here’s how to opt out Read More »

Hack in the box: Hacking into companies with “warshipping”

Enlarge / The “warshipping” rig, exposed, with solar recharging panel. Sean Gallagher LAS VEGAS—Penetration testers have long gone to great lengths to demonstrate the potential chinks in their clients’ networks before less friendly attackers exploit them. But in recent tests by IBM’s X-Force Red, the penetration testers never had to leave home to get in …

Hack in the box: Hacking into companies with “warshipping” Read More »