Dan Goodin

Ars Technica reporter. Signal number 650-440-4479. The world isn't run by weapons anymore or energy or money. It's run by little 1s and 0s, little bits of data.

Categories
N/A
Content Types
N/A
More Information
Location|Languages
Publications
N/A

Published Content

1515
arstechnica.com
Article
Fake cryptocurrency apps on Google Play try to profit on bitcoin price surgears_ab.settitle(1510349);
May, 24 2019
arstechnica.com
Article
Why a Windows flaw patched nine days ago is still spooking the Internet
May, 23 2019
arstechnica.com
Article
Serial publisher of Windows 0-days drops exploits for 3 more unfixed flaws
May, 23 2019
arstechnica.com
Article
33 Linksys router models leak full historic record of every device ever connectedars_ab.settitle(1507147);
May, 18 2019
arstechnica.com
Article
Hack on Stack Overflow exposes private data for ~250 users
May, 17 2019
arstechnica.com
Article
Hackers abuse ASUS cloud service to install backdoor on users’ PCs
May, 16 2019
arstechnica.com
Article
Google warns Bluetooth Titan security keys can be hijacked by nearby hackers
May, 15 2019
arstechnica.com
Article
The radio-navigation planes use to land safely is insecure and can be hackedars_ab.settitle(1500727);
May, 15 2019
arstechnica.com
Article
Microsoft warns wormable Windows bug could lead to another WannaCry
May, 14 2019
arstechnica.com
Article
WhatsApp vulnerability exploited to infect phones with Israeli spyware
May, 14 2019
arstechnica.com
Article
Bluetooth harvester signals hacking group’s growing interest in mobile
May, 13 2019
arstechnica.com
Article
Feds charge Chinese national in 2015 hack of health insurer Anthemars_ab.settitle(1502837);
May, 9 2019
arstechnica.com
Article
Open source bug poses threat to sites running multiple CMSes
May, 9 2019
arstechnica.com
Article
More than 100 commerce sites infected with code that steals payment card dataars_ab.settitle(1502017);
May, 8 2019
arstechnica.com
Article
Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak
May, 7 2019
arstechnica.com
Article
Zero-day attackers deliver a double dose of ransomware—no clicking required
April, 30 2019
arstechnica.com
Article
Loose online lips sink hack targeting governments and embassies
April, 22 2019
arstechnica.com
Article
Marcus Hutchins, slayer of WannaCry worm, pleads guilty to malware charges
April, 19 2019
arstechnica.com
Article
Unexpected protection added to Microsoft Edge subverts IE security
April, 19 2019
arstechnica.com
Article
In new gaffe, Facebook improperly collects email contacts for 1.5 million
April, 18 2019
arstechnica.com
Article
State-sponsored domain-hijacking op targets 40 organizations in 13 countriesars_ab.settitle(1492193);
April, 17 2019
arstechnica.com
Article
A security researcher with a grudge is dropping Web 0days on innocent users
April, 13 2019
arstechnica.com
Article
Mysterious safety-tampering malware infects a second critical infrastructure site
April, 10 2019
arstechnica.com
Article
Woman from China, with malware in tow, illegally entered Trump’s Mar-a-Lago
April, 3 2019
arstechnica.com
Article
Researchers trick Tesla Autopilot into steering into oncoming traffic
April, 2 2019
arstechnica.com
Article
Brace yourselves: exploit published for serious Magento bug allowing card skimming (Updated)
March, 29 2019
arstechnica.com
Article
Mystery remains as ex-NSA worker accused of hoarding 50TB of data pleads guilty
March, 29 2019
arstechnica.com
Article
A rogue’s gallery of bad actors is exploiting that critical WinRAR flaw
March, 27 2019
arstechnica.com
Article
Two serious WordPress plugin vulnerabilities are being exploited in the wildars_ab.settitle(1479063);
March, 22 2019
arstechnica.com
Article
Critical flaw lets hackers control lifesaving devices implanted inside patients
March, 21 2019
arstechnica.com
Article
“Severe” ransomware attack cripples big aluminum producer
March, 19 2019
arstechnica.com
Article
Brace yourselves: New variant of Mirai takes aim at a new crop of IoT devicesars_ab.settitle(1475511);
March, 18 2019
arstechnica.com
Article
How a wireless keyboard lets hackers take full control of connected computersars_ab.settitle(1475021);
March, 16 2019
arstechnica.com
Article
Nasty WinRAR bug is being actively exploited to install hard-to-detect malware
March, 15 2019
arstechnica.com
Article
A new rash of highly covert card-skimming malware infects ecommerce sites
March, 14 2019
arstechnica.com
Article
Google Play apps with 150 million installs contain aggressive adware
March, 13 2019
arstechnica.com
Article
A world of hurt after GoDaddy, Apple, and Google misissue >1 million certificates
March, 12 2019
arstechnica.com
Article
3 men cop to $21 million vishing and smishing scheme
March, 11 2019
arstechnica.com
Article
Citrix says its network was breached by international criminalsars_ab.settitle(1471045);
March, 8 2019
arstechnica.com
Article
A “serious” Windows 0-day is being actively exploited in the wild
March, 8 2019
arstechnica.com
Article
Supermicro hardware weaknesses let researchers backdoor an IBM cloud server
February, 26 2019
arstechnica.com
Article
Millions of websites threatened by highly critical code-execution bug in Drupal
February, 22 2019
arstechnica.com
Article
Google Play apps with >10 million installs drain batteries, jack up data charges
February, 21 2019
arstechnica.com
Article
Nasty code-execution bug in WinRAR threatened millions of users for 14 years
February, 20 2019
arstechnica.com
Article
Hard-to-detect credential-theft malware has infected 1,200 and is still going
February, 20 2019
arstechnica.com
Article
Inside the DNSpionage hacks that hijack domains at an unprecedented scale
February, 18 2019
arstechnica.com
Article
Behold, the Facebook phishing scam that could dupe even vigilant users
February, 16 2019
arstechnica.com
Article
MalwareTech loses bid to suppress damning statements made after days of partying
February, 14 2019
arstechnica.com
Article
Microsoft patches 0-day vulnerabilities in IE and Exchange
February, 13 2019
arstechnica.com
Article
Hackers keep trying to get malicious Windows file onto MacOS
February, 11 2019
Authorship Stats
2Sites1,515Projects948,393Words
About
Dan Goodin is a writer who has produced content for arstechnica.com and arstechnica.co.uk
Key Phrases
Security Firm, Told Ars, Google Play, Blog Post, End Users, Malicious Code, Researchers Wrote, Open Source, Security Questions, Widely Used
© ClearVoice, Inc.