Source: arstechnica.com

For 8 days Windows bundled a password manager with a critical flaw

For 8 days Windows bundled a password manager with a critical flaw

Want to really understand how bitcoin works? Here’s a gentle primer

Want to really understand how bitcoin works? Here’s a gentle primer

“Malware-free” attacks mount in big breaches, CrowdStrike finds

“Malware-free” attacks mount in big breaches, CrowdStrike finds

100,000-strong botnet built on router 0-day could strike at any time

100,000-strong botnet built on router 0-day could strike at any time

RIP net neutrality: FCC chair releases plan to deregulate ISPs

RIP net neutrality: FCC chair releases plan to deregulate ISPs

Apple’s iOS 11.1.2 fixes the cold weather input bug on the iPhone X

Apple’s iOS 11.1.2 fixes the cold weather input bug on the iPhone X

Senator urges ad blocking by feds as possible remedy to malvertising scourge

Senator urges ad blocking by feds as possible remedy to malvertising scourge

Survey of bug bounty hunters shows who pans for pwns

Survey of bug bounty hunters shows who pans for pwns

How AV can open you to attacks that otherwise wouldn’t be possible

How AV can open you to attacks that otherwise wouldn’t be possible

Cryptojacking craze that drains your CPU now done by 2,500 sites

Cryptojacking craze that drains your CPU now done by 2,500 sites

Flaw crippling millions of crypto keys is worse than first disclosed

Flaw crippling millions of crypto keys is worse than first disclosed

Stuxnet-style code signing is more widespread than anyone thought

Stuxnet-style code signing is more widespread than anyone thought

Critical Tor flaw leaks users’ real IP address—update now

Critical Tor flaw leaks users’ real IP address—update now

Security vs. convenience? IoT requires another level of thinking about risk

Security vs. convenience? IoT requires another level of thinking about risk

Inspired by brain’s visual cortex, new AI utterly wrecks CAPTCHA security

Inspired by brain’s visual cortex, new AI utterly wrecks CAPTCHA security

Bad Rabbit used NSA “EternalRomance” exploit to spread, researchers say

Bad Rabbit used NSA “EternalRomance” exploit to spread, researchers say