Skip to main content
All Stories Tagged:

Security

Cybersecurity is the rickety scaffolding supporting everything you do online. For every new feature or app, there are a thousand different ways it can break – and a hundred of those can be exploited by criminals for data breaches, identity theft, or outright cyber heists. Staying ahead of those exploits is a full-time job, and one of the most lucrative and sought-after skills in the tech industry. All too often, it’s something up-and-coming companies decide to skip out on, only to pay the price later on.

If you have one of these D-Link routers, you need to replace it, now.

The Register points out an advisory from D-Link for a series of business routers asking owners to “Please Retire and Replace” these models: DSR-150 / DSR-150N / DSR-250 / DSR-250N.

The problem? A “stack buffer overflow vulnerability, which allows unauthenticated users to execute remote code execution,” published after their EOL, so D-Link isn’t fixing it and will instead offer owners a discounted upgrade.


A D-Link DSR 150 router shown from the front and from the back on a white background.
D-Link DSR 150 router
Image: D-Link
A
External Link
A major forensics tool is only getting “partial” data from recent phones.

The folks at 404 Media are reporting on leaked documents revealing the capabilities of Graykey, a tool that law enforcement uses to hack into seized phones. From the looks of it, Graykey can only retrieve some data from the iPhone 12 and newer, whereas it’s possible to recover “full” info from an iPhone 11. The cat and mouse game continues.


R
External Link
A hacker reportedly acquired ‘damaging’ evidence against Matt Gaetz.

The former congressman selected as Trump’s attorney general has come up in connection to a defamation lawsuit filed by one of his friends, as the New York Times reports a hacker has obtained evidence shared among lawyers on the case:

The file of 24 exhibits is said to include sworn testimony by a woman who said that she had sex with Mr. Gaetz in 2017 when she was 17, as well as corroborating testimony by a second woman who said that she witnessed the encounter.


E
Twitter
Here’s proof that iOS 18 reboots your iPhone if you don’t use it.

As spotted by TechCrunch, researcher Jiska Classen posted a video showing that iOS 18 will reboot your iPhone after three days of inactivity. The security feature, which 404 Media originally reported on, is apparently making it more difficult for police to break into suspects’ phones.


J
External Link
Google will now issue frequent scam advisories.

The search giant has released two new blogs that examine recent scam trends that people online should be wary of, and share policy recommendations Google is urging governments and tech industries to take to better fend against them.

“Preventing user harm from malicious scams requires effective cooperation across the online ecosystem,” says Google’s Trust and Safety head Laurie Richardson. “Bad actors are constantly evolving their tactics and techniques.”


Valorant is winning the war against PC gaming cheaters

Riot Games’ investment into its Vanguard system is paying off.

U
Twitter
Sound the Alarmo!

Nintendo’s buzzy new alarm clock has been jailbroken by a hacker named Gary who figured out the device’s boot sequence and found a way to exploit and run code through USB. It opens up the possibility for some interesting hacks, but to start we have cat pictures and plasma effects.

Gary previously created a Wii U DNS exploit and chimed in on dying Wii Us.


R
Youtube
Delta is suing CrowdStrike over July’s global IT outage.

Reuters reports Delta filed a lawsuit Friday over the July 19th crash, blaming CrowdStrike for having “forced untested and faulty updates to its customers, causing more than 8.5 million Microsoft Windows-based computers around the world to crash.”

Delta’s CEO already called out Microsoft and CrowdStrike during a CNBC interview (included below), saying, “When was the last time you heard of a big outage at Apple?,” while Microsoft said Delta ignored offers to help recover faster.


R
External Link
‘Salt Typhoon’ hackers reportedly targeted phone numbers for Trump and Harris campaigns.

The Wall Street Journal previously reported Chinese hackers “engaged in a vast collection of internet traffic” from ISPs, including Verizon, AT&T, and Lumen, that reached the system used for court-ordered wiretapping requests. The New York Times now says Donald Trump and JD Vance were targeted in the Verizon breach.

Later on Friday afternoon, the WSJ followed up with another report confirming that, while saying other targets included people affiliated with the Harris campaign and even a WSJ writer reporting on the investigation. The FBI and Verizon also acknowledged an investigation without adding additional details.

Update: Added details from WSJ.


J
External Link
Microsoft published a new report about efforts from Russia, Iran, and China to influence the election.

Since the last report, according to Microsoft:

Russian actors continue to integrate generative AI into their content, Iranian groups ramp up their preparations to enable cyber-influence operations, while Chinese actors shift focus to several down-ballot candidates and members of Congress. Russian actors have notably attempted to target the Harris-Walz campaign by attacking the candidates’ characters.  


T
External Link
Passkeys are getting portable.

The alliance managing the passwordless login standard is working on a way to securely move passkeys between password managers offered by 1Password, Apple, Google, Microsoft, Okta, etc. The draft specifications for secure credential exchange are now in community review.

Hopefully this will get sorted soon as passkeys inch closer to going mainstream. The last thing users want is to have their passwords locked to a tech ecosystem.


W
External Link
Chinese state hackers reportedly accessed US wiretap systems.

The hackers worked their way into the networks of AT&T, Verizon, Lumen Technologies, and others, according to anonymous sources cited by The Wall Street Journal:

For months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data, according to people familiar with the matter ... The attackers also had access to other tranches of more generic internet traffic, they said.

The US DHS recently said thwarting Chinese hackers was a top security priority.


W
Twitter
Lego’s site was hacked to promote fake crypto.

An X post spotted by The Brick Fan flagged to the company yesterday that its online shop was displaying a “LEGO Coin” cryptocurrency banner.

Naturally, there is no such thing; Lego tells Engadget that the situation was quickly resolved and no user data was compromised.