Goznym Takedown Shows the Anatomy of a Modern Cybercriminal Supply Chain

Charges against 10 men across Eastern Europe associated with the Goznym malware crew reveal global law enforcement’s reach—and its...

Read More
The radio navigation planes use to land safely is insecure and can be hacked
May16

The radio navigation planes use to land safely is insecure and can be hacked

Enlarge / A plane in the researchers’ demonstration attack as spoofed ILS signals induce a pilot to land to the right of the runway. (credit: Sathaye et al.) Just about every aircraft that has flown over the past 50 years—whether a single-engine Cessna or a 600-seat jumbo jet—is aided by radios to safely land at airports. These instrument landing systems (ILS) are considered precision approach systems, because unlike...

Read More

Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign

A very bad vulnerability in Windows XP could have serious ramifications, even with a patch.

Read More

Google Will Replace Titan Security Key Over a Bluetooth Flaw

Google will replace any Titan BLE branded security key, after disclosing that a nearby attacker could use it to compromise your accounts.

Read More

The FCC's Robocall Plan Sounds Awfully Familiar

FCC chairman Ajit Pai has proposed a set of rules to combat robocalls. Don’t get your hopes up quite yet.

Read More

New speculative execution bug leaks data from Intel chips’ internal buffers

First disclosed in January 2018, the Meltdown and Spectre attacks have opened the floodgates, leading to extensive research into the speculative execution hardware found in modern processors, and a number of additional attacks have been published in the months since. Today sees the publication of a range of closely related flaws named variously RIDL, Fallout, ZombieLoad, or Microarchitectural Data Sampling. The many names are a...

Read More