Stories by Jeremy Kirk

Google+

MacKeeper customers can file a claim to get their money back

Customers of the oft-criticized security and performance program MacKeeper have until Nov. 30 to file a claim for reimbursement, the result of a proposed class-action suit settlement.

New malware turns your computer into a cellular antenna

A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.

ICANN resets passwords after website breach

The overseer of the Internet's addressing system said Wednesday that someone obtained information related to user accounts for its public website, although no financial information was divulged.

Android device makers to release monthly security fixes

Google, Samsung and LG will start to issue monthly security patches for Android devices, taking a cue from the PC industry after critical vulnerabilities put hundreds of millions of smartphone users at risk.

SDN switches aren't hard to compromise, researcher says

Software-defined switches hold a lot of promise for network operators, but new research due to be presented at Black Hat will show that security measures haven't quite caught up yet.

Sounds can knock drones out of the sky

Knocking a drone out of the sky is sometimes possible using an invisible weapon -- sound.

Apple computers vulnerable to 'Thunderstrike 2' firmware worm

An improved attack on the firmware in Apple computers makes them vulnerable to hard-to-detect malware without even being connected to a network, according to a Black Hat conference presentation due to be given later this week.

Cleaning up botnets takes years, if ever, to complete

In late 2008, a worm called Conficker began infecting millions of computers, startling the computer security community into action.

DNS server attacks begin using BIND software flaw

Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses.

Fake Apple iOS crash reports prove tricky to remove

Some Apple mobile users have been encountering a pop-up message that is particularly difficult to close.

Researchers develop astonishing Web-based attack on a computer's DRAM

Millions of Web users could be vulnerable to an attack on their computer's DRAM via the Web, a surprising development that expands on a bug that has increasingly worried computer security experts.

Russian hackers use Twitter to mask sneaky data theft

A group of suspected Russian hackers are using Twitter in a clever way to mask their data-stealing malware, according to computer security firm FireEye.

No building access card? No problem if you have new Def Con tools

RFID card access systems are used by most companies to let people into their buildings. But over the last few years, researchers have shown how these systems can be easily bypassed.

Brinks safe can be hacked with just a USB stick

In the old days, thieves used explosives to get into a safe. But these days for one kind of Brinks safe, all it takes is a USB stick with 100 lines of code.

Over 10 million Web surfers possibly exposed to malvertising

Upwards of 10 million people may have visited websites carrying malicious advertisements in the last ten days, possibly infecting their computers with malware, according to computer security company Cyphort.