-
Economy
How Tor is fighting—and beating—Russian censorship
Enlarge (credit: Rafael Henrique/SOPA Images/Getty) For years, the anonymity service Tor has been the best way to stay private online…
Read More » -
Economy
Comcast stock falls as company fails to add Internet users for first time ever
Enlarge / Comcast CEO Brian Roberts at an event in Beijing on October 17, 2019. Comcast is the largest Internet…
Read More » -
Economy
0-days sold by Austrian firm used to hack Windows users, Microsoft says
Enlarge (credit: Getty Images) Microsoft said on Wednesday that an Austria-based company named DSIRF used multiple Windows and Adobe Reader…
Read More » -
Economy
Newly found Lightning Framework offers a plethora of Linux hacking capabilities
Enlarge (credit: Getty Images) The software framework has become essential to developing almost all complex software these days. The Django…
Read More » -
Economy
How big is the risk that someone will hack an EV charging network?
Enlarge / There are many good reasons why an EV charger should be networked, but it does come with vulnerabilities.…
Read More » -
Economy
Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
Enlarge (credit: Getty Images) Researchers have unpacked a major cybersecurity find—a malicious UEFI-based rootkit used in the wild since 2016 to…
Read More » -
Economy
Russia is quietly ramping up its Internet censorship machine
Enlarge (credit: Kremlin official photo) Since 2019, Vladimir Putin has supercharged his plan to separate Russia from the global Internet.…
Read More » -
Economy
Global shortage of fiber optic cable threatens digital growth
Enlarge (credit: Getty Images) A worldwide shortage of fiber optic cable has driven up prices and lengthened lead times, endangering…
Read More » -
Economy
Hardcoded password in Confluence app has been leaked on Twitter
Enlarge (credit: Getty Images) What’s worse than a widely used Internet-connected enterprise app with a hardcoded password? Try said enterprise…
Read More » -
Economy
Zero-day used to infect Chrome users could pose threat to Edge and Safari users, too
Enlarge (credit: Getty Images) A secretive seller of cyberattack software recently exploited a previously unknown Chrome vulnerability and two other…
Read More »