Tech

Trump’s is one of 15,000 Gab accounts that just got hacked

Enlarge Gab.com The founder of the far-right social media platform Gab said that the private account of former President Donald Trump was among the data stolen and publicly released by hackers who recently breached the site. In a statement on Sunday, founder Andrew Torba used a transphobic slur to refer to Emma Best, the co-founder …

Trump’s is one of 15,000 Gab accounts that just got hacked Read More »

Minisforum U850—solid hardware and easy upgrades in a little box

The U850 comes with VESA hardware-mounting bracket, HDMI and DisplayPort cables, a USB-C charger, and a slim manual. Jim Salter The back side of the U850 offers dual NICs, dual USB 3.1 type A ports, DisplayPort and HDMI out, a USB-C power jack, and a Kensington lock slot. Jim Salter The front of the U850 …

Minisforum U850—solid hardware and easy upgrades in a little box Read More »

All the little things that add up to make iPadOS productivity a pain

The 12.9-inch 2020 iPad Pro with the Smart Keyboard and Magic Trackpad peripherals. Samuel Axon The camera and sensor array on the 2020 iPad Pro includes two lenses and a lidar sensor. It’s still as thin as before, but that camera bump is a change. The design hasn’t changed at all beyond that camera bump. …

All the little things that add up to make iPadOS productivity a pain Read More »

Hard-coded key vulnerability in Logix PLCs has severity score of 10 out of 10

Enlarge Rockwell Automation Hardware that is widely used to control equipment in factories and other industrial settings can be remotely commandeered by exploiting a newly disclosed vulnerability that has a severity score of 10 out of 10. The vulnerability is found in programmable logic controllers from Rockwell Automation that are marketed under the Logix brand. …

Hard-coded key vulnerability in Logix PLCs has severity score of 10 out of 10 Read More »

Android users now have an easy way to check the security of their passwords

Enlarge Getty Images Google is adding its password checkup feature to Android, making the mobile OS the latest company offering to give users an easy way to check if the passcodes they’re using have been compromised. Password Checkup works by checking credentials entered into apps against a list of billions of credentials compromised in the …

Android users now have an easy way to check the security of their passwords Read More »

Crooks use the bitcoin blockchain to protect their botnets from takedown

Enlarge Aurich Lawson / Ars Technica When hackers corral infected computers into a botnet, they take special care to ensure they don’t lose control of the server that sends commands and updates to the compromised devices. The precautions are designed to thwart security defenders who routinely dismantle botnets by taking over the command-and-control server that …

Crooks use the bitcoin blockchain to protect their botnets from takedown Read More »

New malware found on 30,000 Macs has security pros stumped

Enlarge Jayson Photography / Getty Images A previously undetected piece of malware found on almost 30,000 Macs worldwide is generating intrigue in security circles, which are still trying to understand precisely what it does and what purpose its self-destruct capability serves. Once an hour, infected Macs check a control server to see if there are …

New malware found on 30,000 Macs has security pros stumped Read More »

Apple faces development hurdles with MagSafe battery pack accessory

This is the current MagSafe charger, which is sold separately from the iPhone 12. Samuel Axon The MagSafe charger attached to an iPhone 12. Samuel Axon Bloomberg has published yet another report sharing details of a planned Apple product launch. This time, the publication’s sources say Apple is working on a magnetically attached battery pack for …

Apple faces development hurdles with MagSafe battery pack accessory Read More »

New browser-tracking hack works even when you flush caches or go incognito

Enlarge Getty Images The prospect of Web users being tracked by the sites they visit has prompted several countermeasures over the years, including using Privacy Badger or an alternate anti-tracking extension, enabling private or incognito browsing sessions, or clearing cookies. Now, websites have a new way to defeat all three. The technique leverages the use …

New browser-tracking hack works even when you flush caches or go incognito Read More »

Microsoft says SolarWinds hackers stole source code for 3 products

Enlarge Drew Angerer | Getty Images The hackers behind one of the worst breaches in US history read and downloaded some Microsoft source code, but there’s no evidence they were able to access production servers or customer data, Microsoft said on Thursday. The software maker also said it found no evidence the hackers used the …

Microsoft says SolarWinds hackers stole source code for 3 products Read More »