Ransomware has crippled hospitals in Alabama and Australia, blocking admission for all but the most critical new patients.
Ars Technica From ACM TechNews | October 4, 2019
Microsoft warns a serious vulnerability in Windows Remote Desktop Services could be exploited to launch a WannaCry-level attack against Internet-connected computers...Ars Technica From ACM TechNews | May 17, 2019
A "RobbinHood" ransomware attack earlier this week crippled networks used by Baltimore's city government.
Ars Technica From ACM TechNews | May 10, 2019
The crashed Lion Air 737 MAX and the Ethiopian Airlines 737 MAX aircraft had more in common than aircraft design and the apparently malfunctioning flight system...Ars Technica From ACM News | March 22, 2019
Federal authorities and private researchers are warning companies about a wave of domain hijacking attacks.
Ars Technica From ACM TechNews | January 15, 2019
In the wake of the Cambridge Analytica revelations regarding the exposure of profile data for millions of users, Facebook is now facing an investigation into its...Ars Technica From ACM News | March 28, 2018
Stripe is one of the most popular ways for small online organizations to accept credit card payments. And in 2014 it became one of the first major payment processors...Ars Technica From ACM News | January 24, 2018
The Meltdown and Spectre flaws—two related vulnerabilities that enable a wide range of information disclosure from every mainstream processor, with particularly...Ars Technica From ACM News | January 5, 2018
In the darkness of early morning on August 21, the guided-missile destroyer USS John S. McCain collided with a tanker in the Strait of Malacca off Singapore.
Ars Technica From ACM News | August 25, 2017
The US House of Representatives voted Tuesday to eliminate ISP privacy rules, following the Senate vote to take the same action last week. The legislation to kill...Ars Technica From ACM News | March 30, 2017
Google Brain researchers say they have developed artificial intelligence technology that can form encryptions and communicate securely.Ars Technica From ACM TechNews | November 2, 2016
A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now this week...Ars Technica From ACM News | August 24, 2016
The Federal Bureau of Investigation has access to as many as 411.9 million images as part of its face-recognition database. Ars Technica From ACM News | June 20, 2016
The US government isn't saying whether it will divulge to Apple the method it used to access the locked iPhone seized by one of the San Bernardino shooters.Ars Technica From ACM News | March 29, 2016
Less than 24 hours before a highly anticipated Tuesday court session where prosecutors and Apple lawyers would have squared off here in federal court, government...Ars Technica From ACM News | March 22, 2016
Apple has been served with a court order at the FBI's request, demanding that it assist the government agency with unlocking an iPhone 5C that was used by Syed...Ars Technica From ACM News | February 19, 2016
Apple CEO Tim Cook on Tuesday evening said the US government's legal position on encryption backdoors was setting "a dangerous precedent."Ars Technica From ACM News | February 18, 2016