The history of the connected battlespace, part one: Command, control, and conquer

Enlarge / Believe it or not, this fictional version of NORAD shows off the idea of the “connected battlespace” even better than the real thing.MGM/UASince the earliest days of warfare, commanders of forces in the field have sought greater awareness and control of what is now commonly referred to as the “battlespace”—a fancy word for…

DDoSers are abusing Microsoft RDP to make attacks more powerful

Enlarge / Hacker attacking server or database. Network security, Database secure and personal data protectionGetty ImagesDDoS-for-hire services are abusing the Microsoft Remote Desktop Protocol to increase the firepower of distributed denial-of-service attacks that paralyze websites and other online services, a security firm said this week. Typically abbreviated as RDP, Remote Desktop Protocol is the underpinning…

Zoombombing countermeasures are ineffective in the vast majority of cases

EnlargeAs the COVID-19 pandemic forced schools, colleges, and businesses to limit in-person meetings, the world quickly adopted video conferencing from services such as Zoom and Google Meet. That, in turn, gave way to “zoombombing,” the term for when Internet trolls join online meetings with the goal of disrupting them and harassing their participants. Meeting services…

SpaceX Starlink passes 10,000 users and fights opposition to FCC funding

Enlarge / A SpaceX Starlink user terminal/satellite dish.SpaceXLobby groups for small ISPs are urging the Federal Communications Commission to investigate whether SpaceX can deliver on its broadband promises and to consider blocking the satellite provider’s rural-broadband funding. Meanwhile, SpaceX says the Starlink beta is now serving high-speed broadband to 10,000 users. SpaceX was one of…

SolarWinds patches vulnerabilities that could allow full system control

EnlargeGetty ImagesSolarWinds, the previously little-known company whose network-monitoring tool Orion was a primary vector for one of the most serious breaches in US history, has pushed out fixes for three severe vulnerabilities. Martin Rakhmanov, a researcher with Trustwave SpiderLabs, said in a blog post on Wednesday that he began analyzing SolarWinds products shortly after FireEye…

Hackers are exploiting a critical zero-day in devices from SonicWall

EnlargeGetty ImagesNetwork security provider SonicWall said on Monday that hackers are exploiting a critical zero-day vulnerability in one of the devices it sells. The security flaw resides in the Secure Mobile Access 100 series, SonicWall said in an advisory updated on Monday. The vulnerability, which affects SMA 100 firmware 10.x code, isn’t slated to receive…

North Korea hackers use social media to target security researchers

EnlargeDmitry Nogaev | Getty ImagesGoogle has warned it has uncovered an “ongoing” state-backed hacking campaign run by North Korea targeting cyber security researchers. The Silicon Valley group said its threat analysis team found that cyber attackers posing as researchers had created numerous fake social media profiles on platforms such as Twitter and LinkedIn. To gain…

AT&T may keep majority ownership of DirecTV as it closes in on final deal

Enlarge / A DirecTV satellite dish seen outside a bar in Portland, Oregon, in October 2019.Getty Images | hapabapaAT&T is reportedly closing in on a deal to sell a stake in DirecTV to TPG, a private-equity firm. Unfortunately for customers hoping that AT&T will relinquish control of DirecTV, a Reuters report on Friday said the…

AT&T customer since 1960 buys WSJ print ad to complain of slow speeds

EnlargeGetty Images | SynergeeA man who has been an AT&T customer since 1960 has a message for CEO John Stankey about the company’s failure to upgrade DSL areas to modern Internet service. Aaron Epstein, 90, is so frustrated by his 3Mbps Internet plan that he took out a Wall Street Journal ad in today’s print…

Malicious Chrome and Edge add-ons had a novel way to hide on 3 million devices

EnlargeGetty ImagesIn December, Ars reported that as many as 3 million people had been infected by Chrome and Edge browser extensions that stole personal data and redirected users to ad or phishing sites. Now, the researchers who discovered the scam have revealed the lengths the extension developers took to hide their nefarious deeds. As previously…