News
Google details new 24-hour process to sideload unverified Android apps
2+ hour, 10+ min ago (615+ words) The "advanced flow" will be available before verification enforcement begins later this year. With its new limits on sideloading, Android phones will only install apps that come from verified developers. To verify, devs releasing apps outside of Google Play will…...
Federal cyber experts called Microsoft's cloud a "pile of shit," approved it anyway
1+ day, 2+ hour ago (1695+ words) One Microsoft product was approved despite years of concerns about its security. In late 2024, the federal government's cybersecurity evaluators rendered a troubling verdict on one of Microsoft's biggest cloud computing offerings. The tech giant's "lack of proper detailed security documentation…...
Users hate it, but age-check tech is coming. Here's how it works.
1+ day, 8+ hour ago (1738+ words) On-device face scans and cross-platform age keys decrease privacy risks, but trust issues abound. Last month, Discord quickly backpedaled after it announced that an age-verification system would roll out globally. Discord's reversal followed a widespread'user backlash, which also intensified scrutiny…...
World ID wants you to put a cryptographically unique human identity behind your AI agents
1+ day, 22+ hour ago (235+ words) Iris-scan backed tokens could help stop agent swarms from overwhelming online systems. Over the last few months, tools like OpenClaw have shown what tech-savvy AI users can do by setting a virtual cadre of automated agents on a task. But…...
Researchers disclose vulnerabilities in IP KVMs from four manufacturers
2+ day, 2+ hour ago (370+ words) Internet-exposed devices that give BIOS-level access? What could possibly go wrong? Researchers are warning about the risks posed by a low-cost device that can give insiders and hackers unusually broad powers in compromising networks. The devices, which typically sell for…...
Supply-chain attack using invisible code hits GitHub and other repositories
5+ day, 23+ hour ago (143+ words) Unicode that's invisible to the human eye was largely abandoned'until attackers took notice. Researchers say they've discovered a supply-chain attack flooding repositories with malicious packages that contain invisible code, a technique that's flummoxing traditional defenses designed to detect such threats....
The who, what, and why of the attack that has shut down Stryker's Windows network
6+ day, 21+ hour ago (334+ words) Company says it doesn't know how long it will take to restore its Microsoft environment. Stryker said Thursday that it's in the midst of responding to a "global network disruption to our Microsoft environment as a result of a cyber…...
14,000 routers are infected by malware that's highly resistant to takedowns
1+ week, 22+ hour ago (584+ words) Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. A journalist with more than 25 years experience, he has been chronicling the... Researchers say they have uncovered…...
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
1+ week, 6+ day ago (215+ words) The long, strange trip of a large assembly of advanced iOS exploits. The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited over a 10-month span in hacking campaigns conducted by…...
Amazon appears to be down, with over 20,000 reported problems
1+ week, 6+ day ago (161+ words) Problems viewing products and checking out. Based on over 20,000 reports, Amazon appears to be experiencing an outage. According to Downdetector, reports of problems started increasing at 1:41 pm ET today. By 2:26 pm, ET, Downdetector received 18,320 reports of problems with Amazon's website....