Sophisticated New Malware Found on 30,000 Macs Stumps Security Pros

Long-time Slashdot reader b0s0z0ku quotes Ars Technica:
A previously undetected piece of malware found on almost 30,000 Macs worldwide is generating intrigue in security circles, which are still trying to understand precisely what it does and what purpose its self-destruct capability serves. Once an hour, infected Macs check a control server to see if there are any new commands the malware should…

How the NSA-led US Cyber Command Wishes You a Happy Valentine’s Day

Slashdot reader DevNull127 writes: The U.S. Cyber Command, headed by the National Security Agency’s director, has been a part of America’s Department of Defense since 2009. Today this unified combatant command wished its followers on Twitter a happy Valentine’s Day, adding “As our gift to you, we present 12 crypto challenges designed by the information security community. “Love is in the…

Cops Are Playing Music While Citizens Are Filming To Trigger Copyright Filters

An anonymous reader quotes a report from Motherboard: Last Friday, a man entered the Beverly Hills police department, only to be treated to a mini DJ set that could potentially get his Instagram account banned. Sennett Devermont was at the department to file a form to obtain body camera footage from an incident in which he received a ticket he felt…

Amazon Plans Wall-Mounted Echo as Smart Home Command Center

Amazon is developing a new Echo device with a large touchscreen that attaches to the wall and serves as a smart home control panel, video chat device and media player, Bloomberg reports, citing people familiar with the plans. From a report: The company’s Lab126 hardware division is designing the device to be a digital command center, showing users upcoming calendar events,…

How the NSA’s Hubris Left America Vulnerable

A new book promises “the untold story of the cyberweapons market — the most secretive, invisible, government-backed market on earth — and a terrifying first look at a new kind of global warfare.” Its author — a New York Times cybersecurity reporter — shares the book’s story about David Evenden, a former National Security Agency analyst who later worked in Abu…

Despite Funny Name Ideas, US Space Force Has a Serious Mission

Friday the U.S. military released 400 other names it considered for Space Force’s soliders (before settling on the word “guardians.”) Politico writes that the names were “crowdsourced” from the U.S. military’s space workforce, and “Troops clearly had fun with their submissions, which included Space Cadet, Spacies, Anti-Gravity Gang, Homo Spaciens and Spacefolk.” But the Space Force had more science fiction-inspired names…

Google Chrome Sync Feature Can Be Abused For C&C and Data Exfiltration

Threat actors have discovered they can abuse the Google Chrome sync feature to send commands to infected browsers and steal data from infected systems, bypassing traditional firewalls and other network defenses. From a report: For non-Chrome users, Chrome sync is a feature of the Chrome web browser that stores copies of a user’s Chrome bookmarks, browsing history, passwords, and browser and…

SpaceX Announces First-Ever All-Civilian Space Flight Crew

Jared Isaacman, an entrepreneur behind a payment processing startup, is funding a multimillion trip to space aboard a SpaceX Crew Dragon capsule, which could be the first-ever orbital flight crewed entirely by non-astronauts. CNN reports: Isaacman, 37, said he will command the mission, which is slated for late-2021 and will see the spacecraft make a “multi-day” trip into Earth’s orbit, according…

After SolarWinds Breach, Lawmakers Ask NSA for Help in Cracking Juniper Cold Case

As the U.S. investigation into the SolarWinds hacking campaign grinds on, lawmakers are demanding answers from the National Security Agency about another troubling supply chain breach that was disclosed five years ago. From a report: A group of lawmakers led by Sen. Ron Wyden, D-Ore., are asking the NSA what steps it took to secure defense networks following a years-old breach…

Windows 10 Bug Corrupts Your Hard Drive On Seeing This File’s Icon

An unpatched zero-day in Microsoft Windows 10 allows attackers to corrupt an NTFS-formatted hard drive with a one-line command. Bleeping Computer reports: In August 2020, October 2020, and finally this week, infosec researcher Jonas L drew attention to an NTFS vulnerability impacting Windows 10 that has not been fixed. When exploited, this vulnerability can be triggered by a single-line command to…