Tag Archives: Tech

“Wayforward Machine” provides a glimpse into the future of the web

reader comments 46 with 34 posters participating Share this story What could the future of the Internet look like? With the digital world of the 21st century becoming a pit of unwanted ads, tracking, paywalls, unsafe content, and legal threats, “Wayforward Machine” has a dystopian picture in mind. Behind the clickbaity name, Wayforward Machine is… Read More »

Neiman Marcus data breach impacts 4.6 million customers

reader comments 28 with 25 posters participating Share this story American luxury retailer Neiman Marcus Group (NMG) has just disclosed a major data breach impacting approximately 4.6 million customers. The breach occurred sometime in May 2020 after “an unauthorized party” obtained the personal information of some Neiman Marcus customers from their online accounts. Neiman Marcus… Read More »

Apple forgot to sanitize the Phone Number field for lost AirTags

Enlarge / Apple’s AirTags—as seen clipped to a backpack, above—allow users to attempt to find their own device via location rebroadcast from other Apple users. If all else fails, the user can enable a “Lost mode” intended to display their phone number when a finder scans the missing AirTag. reader comments 28 with 25 posters… Read More »

PoC exploit released for Azure AD brute-force bug—here’s what to do

reader comments 20 with 16 posters participating Share this story A public proof-of-concept (PoC) exploit has been released for the Microsoft Azure Active Directory credentials brute-forcing flaw discovered by Secureworks and first reported by Ars. The exploit enables anyone to perform both username enumeration and password brute-forcing on vulnerable Azure servers. Although Microsoft had initially… Read More »

New Azure Active Directory password brute-forcing flaw has no fix

reader comments 8 with 8 posters participating Share this story Imagine having unlimited attempts to guess someone’s username and password without getting caught. That would make an ideal scenario for a stealthy threat actor—leaving server admins with little to no visibility into the attacker’s actions, let alone the possibility of blocking them. A newly discovered… Read More »

Film studios sue “no logs” VPN provider for $10 million

Enlarge / Your at-home entertainment studio. reader comments 74 with 59 posters participating Share this story Dozens of movie production companies sued LiquidVPN this year over the VPN provider’s marketing efforts that could be perceived as promoting piracy. These companies, which are now seeking $10 million in damages, claim that the “no log” policy of LiquidVPN… Read More »

Phone calls disrupted by ongoing DDoS cyber attack on VOIP.ms

reader comments 19 with 18 posters participating Share this story Quebec-based provider of telephony services VoIP.ms is facing an aggressive Distributed Denial of Service (DDoS) cyber attack, causing a disruption in phone calls and services. The incident began around September 16 and has put a strain on the VoIP provider’s systems, websites, and operations. VoIP.ms… Read More »

Apple users warned: Clicking this attachment will take over your macOS

reader comments 37 with 30 posters participating Share this story A code execution bug in Apple’s macOS allows remote attackers to run arbitrary commands on your device. And the worst part is, Apple hasn’t fully patched it yet, as tested by Ars. Those shortcut files can take over your Mac Independent security researcher Park Minchan… Read More »

$5.9 million ransomware attack on farming co-op may cause food shortage

reader comments 18 with 17 posters participating Share this story Iowa-based provider of agriculture services NEW Cooperative Inc. has been hit by a ransomware attack, forcing it to take its systems offline. The BlackMatter group that is behind the attack has put forth a $5.9 million ransom demand. The farming cooperative is seen stating the attack… Read More »