13 Agosto 2022Sicurezza Flaw in the VA Medical Records Platform May Put Patients at Risk the U.S. Department of Veterans Affairs runs some interesting technology programs, but it’s not known for being a flexible or nimble organization. […]
13 Agosto 2022Sicurezza A Single Flaw Broke Every Layer of Security in MacOS Every time you shut down your Mac, a pop-up appears: “Are you sure you want to shut down your computer now?” Nestled […]
12 Agosto 2022Sicurezza Zoom’s Auto-Update Feature Came With Hidden Risks on Mac Many of us have been there: You fire up the Zoom app as you rush to join a meeting you’re already late […]
11 Agosto 2022Sicurezza The US Offers a $10M Bounty for Intel on Conti Ransomware Gang Many members of Conti are believed to be based in Russia or surrounding regions. For years, the Kremlin has largely turned a […]
11 Agosto 2022Sicurezza Sloppy Software Patches Are a ‘Disturbing Trend’ The whole purpose of vulnerability disclosure is to notify software developers about flaws in their code so they can create fixes, or […]
10 Agosto 2022Sicurezza Google’s Android Red Team Had a Full Pixel 6 Pwn Before Launch When Google launched the Pixel 6 and 6 Pro in October 2021, key features included its custom Tensor system-on-a-chip processor and the […]
10 Agosto 2022Sicurezza The Hacking of Starlink Terminals Has Begun “From a high-level view, there are two obvious things that you could try to attack: the signature verification or the hash verification,” […]
9 Agosto 2022Sicurezza One of 5G’s Biggest Features Is a Security Minefield True 5G wireless data, with its ultrafast speeds and enhanced security protections, has been slow to roll out around the world. As […]
9 Agosto 2022Sicurezza GitHub Moves to Guard Open Source Against Supply Chain Attacks Following the 2020 SolarWinds cyberespionage campaign, in which Russian hackers slipped tainted updates into a widely used IT management platform, a series […]
6 Agosto 2022Sicurezza The US Emergency Alert System Has Dangerous Flaws Cryptocurrency tracing has become a key tool for police investigating everything from fraud and ransomware to child abuse. But its accuracy may […]