News

Hackers leak passwords for 500,000 Fortinet VPN accounts

A threat actor has leaked a list of almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer.

While the threat actor states that the exploited Fortinet vulnerability has since been patched, they claim that many VPN credentials are still valid.

This leak is a serious incident as the VPN credentials could allow threat actors to access a network to perform data exfiltration, install malware, and perform ransomware attacks.

Fortinet credentials leaked on a hacking forum

The list of Fortinet credentials was leaked for free by a threat actor known as ‘Orange,’ who

Read More

A.I. Can Now Write Its Own Computer Code. That’s Good News for Humans.

As soon as Tom Smith got his hands on Codex — a new artificial intelligence technology that writes its own computer programs — he gave it a job interview.

He asked if it could tackle the “coding challenges” that programmers often face when interviewing for big-money jobs at Silicon Valley companies like Google and Facebook. Could it write a program that replaces all the spaces in a sentence with dashes? Even better, could it write one that identifies invalid ZIP codes?

It did both instantly, before completing several other tasks. “These are problems that would be tough for a lot

Read More

Chinese players start review-bombing Life is Strange: True Colors over Tibetan flag

Life is Strange: True Colors is set in the town of Haven Springs, where a shop called Treasures of Tibet can be seen flying a Tibetan flag above its entrance. That flag is used a symbol of the Tibetan independence movement and is banned in mainland China, which is why it’s become a source of complaint among Chinese players on Steam.

While its user rating remains Very Positive, the majority of its negative reviews are from Chinese players. “The game contains elements of Tibetan independence, implying a split of China”, says one negative review, and “Tibet is a

Read More

These 4 downloads can ruin a Windows PC

I give a lot of advice about what you should do in your digital life. I give just as much about what you shouldn’t do.

Take, for example, the things you should never Google. No, this is not because these searches are embarrassing. These rogue searches put your security and your wallet at risk. Tap or click for my list of 7 things you should never search for.

Some mistakes ruin your expensive gadgets. Tap or click for 5 dumb ways you’re ruining your smartphone. Looking at you, everyone without a nice phone case.

When it comes to

Read More

Until 2023? Parts Shortage Will Keep Auto Prices Sky-High | Ohio News

By TOM KRISHER, AP Auto Writer

TOLEDO, Ohio (AP) — Back in the spring, a shortage of computer chips that had sent auto prices soaring appeared, finally, to be easing. Some relief for consumers seemed to be in sight.

That hope has now dimmed. A surge in COVID-19 cases from the delta variant in several Asian countries that are the main producers of auto-grade chips is worsening the supply shortage. It is further delaying a return to normal auto production and keeping the supply of vehicles artificially low.

And that means, analysts say, that record-high consumer prices for vehicles —

Read More

Former Yale Administrator Charged in Computer Thefts | Connecticut News

NEW HAVEN, Conn. (AP) — A former Yale University administrator faces federal fraud and money laundering charges related to the theft of millions of dollars in computer equipment from the university’s medical school.

The 41-year-old woman served in various positions at the school, including director of finance for the Department of Emergency Medicine.

Prosecutors allege that beginning in 2013, the woman ran a scheme that involved ordering millions of dollars in computer hardware from Yale vendors, then shipping the equipment to an out-of-state business in exchange for money.

The woman, who was authorized to make purchases below $10,000 for the

Read More

LockBit ransomware recruiting insiders to breach corporate networks

The LockBit 2.0 ransomware gang is actively recruiting corporate insiders to help them breach and encrypt networks. In return, the insider is promised million-dollar payouts.

Many ransomware gangs operate as a Ransomware-as-a-Service, which consists of a core group of developers, who maintain the ransomware and payment sites, and recruited affiliates who breach victims’ networks and encrypt devices.

Any ransom payments that victims make are then split between the core group and the affiliate, with the affiliate usually receiving 70-80% of the total amount.

However, in many cases, the affiliates purchase access to networks from other third-party pentesters rather than breaching

Read More

ICPunks to release 10,000 free NFTs in debut drop on the Internet Computer

ICPunks has announced the release of 10,000 nonfungible tokens (NFT) on the Internet Computer. Users are eligible to claim their free token Wednesday at 8 pm UTC.

Conceptualized by brothers Przemek and Tomasz Chojecki, alongside Adam Stępnik, the trio was inspired to create the avatars following acronym comparisons to the 1990s hip-hop duo Insane Clown Posse and the overwhelming success of the legendary CryptoPunk NFTs.

Following a series of exclusive early releases, it is expected that only 3,000 punks will be available to claim, one per user, at the time of release.

Cointelegraph spoke to Przemek, a co-founder of the

Read More

The computer repairman with Hunter Biden’s laptop lost his lawsuit against Twitter and has to pay the company’s legal fees

  • The computer repairman who had Hunter Biden’s laptop lost his lawsuit against Twitter.

  • He alleged Twitter defamed him when it locked the NY Post’s account for distributing info “obtained through hacking.”

  • The district judge dismissed the case with prejudice, meaning Mac Isaac can’t re-file it in court.

  • See more stories on Insider’s business page.

The computer repairman famous for fixing Hunter Biden‘s laptop lost his lawsuit against Twitter on Monday.

District Judge Beth Bloom dismissed the case against the social media company with prejudice, meaning the case cannot be brought to court again. Bloom also ordered the plaintiff,

Read More

This device could stop USB cyberattacks for good

Although USB devices such as flash drives are convenient and make moving data between devices easier, they can also be abused by cybercriminals to infect computers with malware and other viruses.

This is why a team of scientists and professors from Liverpool Hope University in the UK have created a sophisticated new device capable of countering the threats posed by malicious USB devices.

The project, led by Dr Shishir Kumar Shandilya alongside Professor Atulya Nagar, is aimed at removing one of the most common paths through which malicious files and programs can be injected by attackers and cybercriminals.

Dr Shandilya

Read More