Category: ArsTechnica

Windows' original Secure Boot certificates expire in June—here's what you need to do
08
Mar
2026

Windows’ original Secure Boot certificates expire in June—here’s what you need to do

The second thing to check is the “default db,” which shows whether the new Secure Boot certificates are baked into…

Once-hobbled Lumma Stealer is back with lures that are hard to resist
08
Mar
2026

Once-hobbled Lumma Stealer is back with lures that are hard to resist

Last May, law enforcement authorities around the world scored a key win when they hobbled the infrastructure of Lumma, an…

Password managers' promise that they can't see your vaults isn't always true
08
Mar
2026

Password managers’ promise that they can’t see your vaults isn’t always true

Over the past 15 years, password managers have grown from a niche security tool used by the technology savvy into…

New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
08
Mar
2026

New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises

“In a normal Layer-2 switch, the switch learns the MAC of the client by seeing it respond with its source…

Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space - Ars Technica
08
Mar
2026

Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space – Ars Technica

Google and other browser makers require that all TLS certificates be published in public transparency logs, which are append-only distributed…

Column 1: Q: How did you use Al tools in a recent research project? A: I work in biology, on research related to [research topic]. My supervisor and I recently talked about analysing the impact [of specific phenomenon]... My background is in physical science... A: I used Al tools frequently... for writing [specific library] code 2nd collum Profile: • Computational biology, [subfield] • Education: physical science background • Likely PhD student or postdoc • Tools: Python, [specific library] • British English (
08
Mar
2026

LLMs can unmask pseudonymous users at scale with surprising accuracy

“What we found is that these AI agents can do something that was previously very difficult: starting from free text…

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
08
Mar
2026

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

Coruna is also notable for its use by three distinct hacking groups. Google first detected its use in February of…

From Iran to Ukraine, everyone's trying to hack security cameras
08
Mar
2026

From Iran to Ukraine, everyone’s trying to hack security cameras

In fact, Check Point says it tracked similar Iranian targeting of cameras as early as last June during Israel’s previous…