Multiple “CIA failures” led to theft of agency’s top-secret hacking tools

[ad_1] Enlarge / CIA headquarters. In early 2017, WikiLeaks began publishing details of top-secret CIA hacking tools that researchers soon confirmed were part of a large tranche of confidential documents stolen from one of the agency’s isolated, high-security networks. The leak—comprising as much as 34 terabytes of information and representing the CIA’s biggest data loss…

T-Mobile’s outage yesterday was so big that even Ajit Pai is mad

[ad_1] Enlarge / The logo of Deutsche Telekom, owner of T-Mobile, seen at Mobile World Congress in February 2019 in Barcelona, Spain. Getty Images | NurPhoto T-Mobile’s network suffered an outage across the US yesterday, and the Federal Communications Commission is investigating. FCC Chairman Ajit Pai, who takes an extremely hands-off approach to regulating telecom…

Intel will soon bake anti-malware defenses directly into its CPUs

[ad_1] Enlarge / A mobile PC processor code-named Tiger Lake. It will be the first CPU to offer a security capability known as Control-Flow Enforcement Technology. Intel The history of hacking has largely been a back-and-forth game, with attackers devising a technique to breach a system, defenders constructing a countermeasure that prevents the technique, and…

Knoxville shuts down parts of its network after being hit by ransomware

[ad_1] Enlarge / The Knoxville City-County Building, overlooking the Tennessee River in Knoxville, Tennessee. The city of Knoxville, Tennessee, shut down large portions of its computer network on Thursday after being hit overnight by a ransomware attack, it was widely reported on Thursday. The attack was first noticed by members of the Knoxville Fire Department…

OpenZFS removed offensive terminology from its code

[ad_1] Enlarge / Replacements for outdated master/slave terminology tend to be considerably more accurate, as well as less offensive. On Wednesday evening, ZFS founding developer Matthew Ahrens submitted what should have been a simple, non-controversial pull request to the OpenZFS project: wherever possible without causing technical issues, the patch removed references to “slaves” and replaced…

Machine-learning clusters in Azure hijacked to mine cryptocurrency

[ad_1] Attackers recently hijacked powerful machine-learning clusters inside Microsoft’s Azure cloud-computing service so that they could mine cryptocurrency at the expense of the customers who rented them, the company said Wednesday. The nodes, which were misconfigured by customers, made the perfect target for so-called cryptojacking schemes. Machine-learning tasks typically require vast amounts of computing resources.…

FCC has “serious doubts” that SpaceX can deliver latencies under 100ms

[ad_1] The Federal Communications Commission said it has “serious doubts” that SpaceX and other low-Earth orbit (LEO) satellite providers will be able to deliver latencies of less than 100ms. As we reported yesterday, FCC Chairman Ajit Pai backed off a plan that would have completely prevented SpaceX and other LEO companies from applying for rural-broadband…

UPnP flaw exposes millions of network devices to attacks over the Internet

[ad_1] Millions of routers, printers, and other devices can be remotely commandeered by a new attack that exploits a security flaw in the Universal Plug and Play network protocol, a researcher said. CallStranger, as the exploit has been named, is most useful for forcing large numbers of devices to participate in distributed denial of service—or…