To find the update, you’ll need to check your device settings. Devices that have received the Android April update so far include Google’s Pixel devices and some third-party Android phones,…
Tag: Security / Cyberattacks and Hacks
Russia Is Being Hacked at an Unprecedented Scale
The orders are issued like clockwork. Every day, often at around 5 am local time, the Telegram channel housing Ukraine’s unprecedented “IT Army” of hackers buzzes with a new list…
Hackers Are Getting Caught Exploiting New Bugs More Than Ever
Previously unknown “zero-day” software vulnerabilities are mysterious and intriguing as a concept. But they’re even more noteworthy when hackers are spotted actively exploiting the novel software flaws in the wild…
Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Systems
Malware designed to target industrial control systems like power grids, factories, water utilities, and oil refineries represents a rare species of digital badness. So when the United States government warns…
Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine
More than half a decade has passed since the notorious Russian hackers known as Sandworm targeted an electrical transmission station north of Kyiv a week before Christmas in 2016, using…
The Tricky Aftermath of Source Code Leaks
The Lapsus$ digital extortion group is the latest to mount a high-profile data-stealing rampage against major tech companies. And among other things, the group is known for grabbing and leaking…
How Russia’s Invasion Triggered a US Crackdown on Its Hackers
Since Russia launched its full-blown invasion of Ukraine in late February, a wave of predictable cyberattacks has accompanied that offensive, striking everything from Ukrainian government agencies to satellite networks, with…
Blockchains Have a ‘Bridge’ Problem, and Hackers Know It
This week, the cryptocurrency network Ronin disclosed a breach in which attackers made off with $540 million worth of Ethereum and USDC stablecoin. The incident, which is one of the…
A Sinister Way to Beat Multifactor Authentication Is on the Rise
Multifactor authentication (MFA) is a core defense that is among the most effective at preventing account takeovers. In addition to requiring that users provide a username and password, MFA ensures…
Researchers Used a Decommissioned Satellite to Broadcast Hacker TV
Independent researchers and the United State military have become increasingly focused on orbiting satellites’ potential security vulnerabilities in recent years. These devices, which are built primarily with durability, reliability, and…