TaxSlayer, H&R Block, TaxAct, and Ramsey Solutions accused of sharing info with Meta and Google A quartet of lawmakers have penned a letter to the Department of Justice asking it to prosecute tax preparation companies for sharing customer data, including…
Tag: The Register – Security
US lawmakers push DOJ to prosecute tax prep firms for leaking taxpayer data to big tech
TaxSlayer, H&R Block, TaxAct, and Ramsey Solutions accused of sharing info with Meta and Google A quartet of Democratic lawmakers have penned a letter to the US Department of Justice asking it to prosecute tax preparation companies for sharing customer…
TSMC blows whistle on potential sanctions-busting shenanigans from Huawei
Chip giant tells Uncle Sam someone could be making orders on the sly TSMC has reportedly tipped off US officials to a potential attempt by Huawei to circumvent export controls and obtain AI chips manufactured by the Taiwanese company.… This…
VMware fixes critical RCE, make-me-root bugs in vCenter – for the second time
If the first patches don’t work, try, try again VMware has pushed a second patch for a critical, heap-overflow bug in the vCenter Server that could allow a remote attacker to fully compromise vulnerable systems after the first software update,…
Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures
Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing Four high-profile tech companies reached an agreement with the Securities and Exchange Commission to pay millions of dollars in penalties for misleading investors about their…
Akira ransomware is encrypting victims again following pure extortion fling
Crooks revert to old ways for greater efficiency Experts believe the Akira ransomware operation is up to its old tricks again, encrypting victims’ files after a break from the typical double extortion tactics.… This article has been indexed from The…
Pixel perfect Ghostpulse malware loader hides inside PNG image files
Miscreants combine it with an equally tricky piece of social engineering The Ghostpulse malware strain now retrieves its main payload via a PNG image file’s pixels. This development, security experts say, is “one of the most significant changes” made by…
China’s Spamouflage cranks up trolling of US Senator Rubio as election day looms
Note to Xi: Marco and Ted Cruz aren’t the same person China’s Spamouflage disinformation crew has been targeting US Senator Marco Rubio (R-Florida) with its fake news campaigns over the past couple of months, trolling the Republican lawmaker’s official X…
Sophos to snatch Secureworks in $859M buyout: Why fight when you can just buy?
Private equity giant Thoma Bravo adds another trophy to its growing collection British security biz Sophos has announced a plan to gobble up competitor Secureworks in an $859 million deal that will make Dell happy.… This article has been indexed…
The billionaire behind Trump’s ‘unhackable’ phone is on a mission to fight Tesla’s FSD
Dan O’Dowd tells El Reg about the OS secrets and ongoing clash with Musk Interview This month, presidential hopeful Donald Trump got a tool in his arsenal, some allegedly “unhackable” communications kit, and The Register has talked to the man…
macOS HM Surf vuln might already be under exploit by major malware family
Like keeping your camera and microphone private? Patch up In revealing details about a vulnerability that threatens the privacy of Apple fans, Microsoft urges all macOS users to update their systems.… This article has been indexed from The Register –…
Tesla, Intel, deny they’re the foreign company China just accused of making maps that threaten national security
As TSMC defends itself against report it may have helped Huawei Tesla has denied it was involved in illegal-map making activities in China after Beijing asserted an unnamed foreign firm working on a smart car project had done so –…
Internet Archive exposed again – this time through Zendesk
Org turns its woes into a fundraising opportunity Despite the Internet Archive’s assurances it’s back on its feet after a recent infosec incident, the org still appears to be in trouble after parties unknown claimed to hold access tokens to…
Open source LLM tool primed to sniff out Python zero-days
The static analyzer uses Claude AI to identify vulns and suggest exploit code Researchers with Seattle-based Protect AI plan to release a free, open source tool that can find zero-day vulnerabilities in Python codebases with the help of Anthropic’s Claude…
Jetpack fixes 8-year-old flaw affecting millions of WordPress sites
Also, new EU cyber reporting rules are live, exploiters hit the gas pedal, free PDNS for UK schools, and more in brief A critical security update for the near-ubiquitous WordPress plugin Jetpack was released last week. Site administrators should ensure…
Alleged Bitcoin crook faces 5 years after SEC’s X account pwned
SIM swappers strike again, warping cryptocurrency prices An Alabama man faces five years in prison for allegedly attempting to manipulate the price of Bitcoin by pwning the US Securities and Exchange Commission’s X account earlier this year.… This article has…
ESET denies it was compromised as Israeli orgs targeted with ‘ESET-branded’ wipers
Says ‘limited’ incident isolated to ‘partner company’ ESET denies being compromised after an infosec researcher highlighted a wiper campaign that appeared to victims as if it was launched using the Slovak security shop’s infrastructure.… This article has been indexed from…
Intel lightly hits back at China’s accusations it bakes in NSA backdoors
Chipzilla says it obeys the law … which could mean anything Intel has responded to Chinese claims that its chips include security backdoors at the direction of America’s NSA.… This article has been indexed from The Register – Security Read…
Intel robustly refutes China’s accusations it bakes in NSA backdoors
Chipzilla uses WeChat post to defend record of following local laws Intel has roundly rebutted Chinese accusations that its chips include security backdoors at the direction of the US National Security Agency (NSA).… This article has been indexed from The…
Biz hired, and fired, a fake North Korean IT worker – then the ransom demands began
‘My webcam isn’t working today’ is the new ‘The dog ate my network’ It’s a pattern cropping up more and more frequently: a company fills an IT contractor post, not realizing it’s mistakenly hired a North Korean operative. The phony…