Biz & IT – Ars Technica Serving the Technologist for more than a decade. IT news, reviews, and analysis.
Biz & IT – Ars Technica Serving the Technologist since 1998. News, reviews, and analysis.
- Leaked chat logs expose inner workings of secretive ransomware groupby Dan Goodin on February 21, 2025 at 9:47 pm
Researchers are poring over the data and feeding it into ChatGPT.
- As the Kernel Turns: Rust in Linux saga reaches the “Linus in all-caps” phaseby Kevin Purdy on February 21, 2025 at 6:55 pm
Torvalds: You can avoid Rust as a C maintainer, but you can’t interfere with it.
- Notorious crooks broke into a company network in 48 minutes. Here’s how.by Dan Goodin on February 21, 2025 at 6:17 pm
Report sheds new light on the tactics allowing attackers to move at breakneck speed.
- HP realizes that mandatory 15-minute support call wait times isn’t good supportby Scharon Harding on February 21, 2025 at 3:45 pm
HP rescinds European support call strategy due to “feedback.”
- Russia-aligned hackers are targeting Signal users with device-linking QR codesby Kevin Purdy on February 19, 2025 at 9:21 pm
Swapping QR codes in group invites and artillery targeting are latest ploys.
- Microsoft warns that the powerful XCSSET macOS malware is back with new tricksby Dan Goodin on February 18, 2025 at 9:04 pm
XCSSET has been targeting Mac users since 2020.
- What is device code phishing, and why are Russian spies so successful at it?by Dan Goodin on February 14, 2025 at 9:16 pm
Overlooked attack method has been used since last August in a rash of account takeovers.
- Financially motivated hackers are helping their espionage counterparts and vice versaby Dan Goodin on February 13, 2025 at 11:00 am
Two players who mostly worked independently are increasingly collaborative.
- New hack uses prompt injection to corrupt Gemini’s long-term memoryby Dan Goodin on February 11, 2025 at 10:13 pm
There’s yet another way to inject malicious prompts into chatbots.
- OpenAI’s secret weapon against Nvidia dependence takes shapeby Benj Edwards on February 10, 2025 at 9:00 pm
Chatbot maker partners with TSMC to manufacture custom AI chip, with plans for future iterations.
- DeepSeek iOS app sends data unencrypted to ByteDance-controlled serversby Dan Goodin on February 6, 2025 at 10:06 pm
Apple’s defenses that protect data from being sent in the clear are globally disabled.
- Ransomware payments declined in 2024 despite massive. well-known hacksby Lily Hay Newman, wired.com on February 6, 2025 at 2:21 pm
Amount paid by victims to hackers declined by hundreds of millions of dollars.
- 7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraineby Dan Goodin on February 5, 2025 at 9:05 pm
Vulnerability stripped MotW tag Windows uses to flag Internet-downloaded files.
- Go Module Mirror served backdoor to devs for 3+ yearsby Dan Goodin on February 5, 2025 at 12:25 pm
Supply chain attack targets developers using the Go programming language.
- 22-year-old math wiz indicted for alleged DeFI hack that stole $65Mby Dan Goodin on February 4, 2025 at 1:25 pm
22-year-old Andean Medjedovic of Canada could spend decades in prison if convicted.
- Dell risks employee retention by forcing all teams back into offices full-timeby Scharon Harding on January 31, 2025 at 5:40 pm
“Dell may be missing out on some great talent…”
- Apple chips can be hacked to leak secrets from Gmail, iCloud, and moreby Dan Goodin on January 28, 2025 at 8:56 pm
Side channel gives unauthenticated remote attackers access they should never have.
- A long, costly road ahead for customers abandoning Broadcom’s VMwareby Scharon Harding on January 27, 2025 at 6:36 pm
“We loved VMware, and then when Broadcom bought ‘em, we hated ‘em.”
- Backdoor infecting VPNs used “magic packets” for stealth and securityby Dan Goodin on January 23, 2025 at 11:42 pm
J-Magic backdoor infected organizations in a wide array of industries.
- Data breach hitting PowerSchool looks very, very badby Dan Goodin on January 23, 2025 at 12:30 pm
Schools are now notifying families their data has been stolen.