Tag Archives: security

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

The scourge of software supply chain attacks—an increasingly common hacking technique that hides malicious code in a widely used legitimate program—can take many forms. Hackers can penetrate an update server to seed out their malware, or even break into the network where the software was developed to corrupt it at …

Read More »

The XZ Backdoor: Everything You Need to Know

On Friday, a lone Microsoft developer rocked the world when he revealed a backdoor had been intentionally planted in XZ Utils, an open source data compression utility available on almost all installations of Linux and other Unix-like operating systems. The person or people behind this project likely spent years on …

Read More »

The Incognito Mode Myth Has Fully Unraveled

If you still hold any notion that Google Chrome’s “Incognito mode” is a good way to protect your privacy online, now’s a good time to stop. Google has agreed to delete “billions of data records” the company collected while users browsed the web using Incognito mode, according to documents filed …

Read More »

You Should Update Apple iOS and Google Chrome ASAP

It’s time to check your software updates. March has seen the release of important patches for Apple’s iOS, Google’s Chrome, and its privacy-conscious competitor Firefox. Bugs have also been squashed by enterprise software giants including Cisco, VMware, and SAP. Here’s what you need to know about the security updates issued …

Read More »

Yogurt Heist Reveals a Rampant Form of Online Fraud

The saga of WikiLeaks founder Julian Assange continued this week after the UK’s high court ordered a delay in his extradition to the United States. Assange faces 18 charges in the US, including 17 alleged violations of the Espionage Act—charges that have alarmed journalism watchdogs. The two judges who issued …

Read More »

Jeffrey Epstein’s Island Visitors Exposed by Data Broker

Nearly 200 mobile devices of people who visited Jeffrey Epstein’s notorious “pedophile island” in the years prior to his death left an invisible trail of data pointing back to their own homes and offices. Maps of these visitations generated by a troubled international data broker with defense industry ties, discovered …

Read More »