'New wave of data-encrypting malware hits Russia and Ukraine':
https://arstechnica.co.uk/informati...g-malware-crashes-through-russia-and-ukraine/
https://arstechnica.co.uk/informati...g-malware-crashes-through-russia-and-ukraine/
This is nasty, why not start a thread about it?Laptop touchpad driver included extra feature: a keylogger:
https://arstechnica.com/information...-found-on-hp-may-affect-many-other-notebooks/
Thanks, but meh, I'm too lazy.I guess there is not a relevant 'catch all' thread for this stuff, and this thread became a bit of that? Since the clamp-down on what we can and can not post (that is not obscene or obviously not acceptable etc) it is hard to find motivation to post here, so i do the best i can. Please feel free to make a separate thread for this info if you want![]()
Just in: if you install Flash, legitimate or not, you deserve every bit of pain you get.
@Zak - are you an Ars Technica editor or something?![]()
A surprisingly big number of top-name websites—Facebook and PayPal among them—recently tested positive for a critical, 19-year-old vulnerability that allowed attackers to decrypt encrypted data and sign communications using the sites' secret encryption key.
........
On Wednesday, a team of researchers said an Internet scan conducted last month found that 27 of the 100 most-visited websites—including Facebook and PayPal—were vulnerable to what was essentially the same attack. About 2.8 percent of the top 1 million sites also tested positive.
The attackers were able bypass protections provided by HTTPS-based encryption by first using their control of the Fox-IT domain to obtain a new transport layer security certificate. The process happened in the first 10 minutes of the attack, during which time all Fox-IT email was rerouted to the attackers. With that in place, the attackers were able to able to decrypt all incoming traffic and to cryptographically impersonate the hijacked domain. After intercepting and reading incoming traffic, the attackers forwarded it to Fox-IT in an attempt to prevent company engineers from detecting the attack.
The detailed account underscores just how easily hacks can succeed, even against security-savvy parties with relatively robust practices in place. It wouldn't be surprising to see the same techniques succeed against scores or even hundreds of other companies that use the same industry-standard countermeasures.