Experts have long warned “secure backdoor” systems are impossible; Salt Typhoon's reported hack of US ISPs' wiretap systems exemplifies the risks of backdoors
Security professionals and technologists have for years been sounding the alarm about the security risks of backdoors … Riana / @riana@mastodon.lawprofs.org : “Blaze told TechCrunch that the Chinese i...
Dan Kaminsky, the celebrated security researcher widely known for his work on discovering crucial DNS security flaws and Sony Rootkit infections, has died at 42
Saddened by news of the death of Dan Kaminsky, a member of the ICANN Trusted … Pierluigi Paganini / Security Affairs : The cybersecurity researcher Dan Kaminsky has died Tweets: Sarah B / @sarahbrie :...
Source: Treasury's hackers used a flaw in a SolarWinds product; SolarWinds, which touts 300K+ customers, says the flaw was the result of a “supply chain attack”
and it has the Kremlin's fingerprints all over it. https://www.bloomberg.com/... Thomas Brewster / @iblametom : New - A review of contract records shows DOD, FBI, DHS, Veterans Affairs and many other ...
Microsoft opens up its threat intelligence data, including file hash indicators used in email scams, to wider security community via GitHub during the pandemic
Microsoft is making the threat intelligence it's collected on coronavirus-related hacking campaigns public, the company announced Thursday.
Apple accuses Google's Project Zero of stoking fear by creating a “false impression of mass exploitation”, says the sophisticated attack was narrowly focused
And They're Wrong PYMNTS.com : Apple, Google At Odds On iPhone Security Flaws Tied To Attacks Michael Tsai : Apple Responds to Project Zero Abner Li / 9to5Google : Google stands by iOS vulnerability r...
Apple accuses Google's Project Zero of stoking fear by creating a “false impression of mass exploitation”, says the sophisticated attack was narrowly focused
And They're Wrong Michael Tsai : Apple Responds to Project Zero Firstpost Tech : Apple hits back at Google, accusing it of creating a ‘false impression’ of ‘mass exploitation’ around iPhone exploits A...
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12
In the earlier posts we examined … Ian Beer / Project Zero : In-the-wild iOS Exploit Chain 1 Patrick Howell O'Neill / MIT Technology Review : Websites have been quietly hacking iPhones for years, says...
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12
In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iPhone security flaws ...
Researcher discloses zero-day exploit in Zoom's Mac client that lets any malicious site force a user into a Zoom call with video enabled without user permission
“'A little less creepy' is still creepy.” Dan Goodin / Ars Technica : Zoom for Mac makes it too easy for hackers to access webcams. Here's what to do Nicole Nguyen / BuzzFeed News : The Zoom Desktop A...
Facebook confirms it has fired one of its security engineers who allegedly used privileged access to stalk women online
After a member of the information security community provided evidence to Facebook's chief information security officer, the company has terminated a security engineer …