Tag: Biz & IT – Ars Technica

While one Texas county shook off ransomware, small cities took full punch

Enlarge / They did. (credit: Hemera Technologies/Getty Images) Few details have emerged about the coordinated ransomware attack that struck 22 local governments in Texas last week. But five local governments affected by the attack have been identified. On August 20, the Texas Department of Information Resources revised its initial report that 23 “entities” had been

Google, Apple, and Mozilla block Kazakhstan government’s browser spying

Enlarge (credit: Getty Images | Thomas Jackson) Major browser makers are blocking the use of a root certificate that Kazakhstan’s government has used to intercept Internet traffic. Mozilla and Google issued a joint announcement today saying that “the companies deployed technical solutions within Firefox and Chrome to block the Kazakhstan government’s ability to intercept Internet

The year-long rash of supply chain attacks against open source is getting worse

(credit: Wired UK/Shuttershock) A rash of supply chain attacks hitting open-source software over the past year shows few signs of abating, following the discovery this week of two separate backdoors slipped into a dozen libraries downloaded by hundreds of thousands of server administrators. The first backdoor to come to light was in Webmin, a Web-based

CenturyLink’s 37-hour outage blocked 911 service for 17 million people

Enlarge (credit: Getty Images | RiverNorthPhotography) CenturyLink’s nationwide, 37-hour outage in December 2018 disrupted 911 service for millions of Americans and prevented completion of at least 886 calls to 911, a new Federal Communications Commission report said. Back in December, FCC Chairman Ajit Pai called the outage on CenturyLink’s fiber network “completely unacceptable” and vowed

New Attack exploiting serious Bluetooth weakness can intercept sensitive data

Enlarge Researchers have demonstrated a serious weakness in the Bluetooth wireless standard that could allow hackers to intercept keystrokes, address books, and other sensitive data sent from billions of devices. Dubbed Key Negotiation of Bluetooth—or KNOB for short—the attack forces two or more devices to choose an encryption key just a single byte in length
Skip to toolbar