Attack breaks through RC4 cipher; many websites vulnerable

exploit
The Internet is a constantly evolving complex of technology, and with more users than ever relying upon it on a daily basis, that’s never been more true than today. Unfortunately, the ways and means that malicious parties target people and services via the Internet is also in a constant state of growth.

Often, the people working to protect users and those looking to take advantage of them find themselves responding to each other’s efforts. Now, it seems that the latter are finding a way to perform attacks thanks to the venerable RC4 cipher.

RC4 is a stream cipher first designed in 1987 that became very popular thanks to its speed, but that has received widespread criticism in recent years as a result of its vulnerabilities. Companies including Mozilla and Microsoft have recommended that it’s best to disable RC4 wherever possible to avoid leaving systems open to attack.

It was previously believed that this sort of breach would require 2,000 hours of data collection time to carry out, but researchers have found a way to execute an attack with as little as 52 hours, according to an article by the Tech Report. This makes the method more attractive than ever to hackers, and presents a serious concern for system administrators still using RC4.

Many security organizations have been attempting to curb RC4 usage for years, and this development would seem to be the final nail in its coffin. While figures for RC4 usage have certainly shown a drop since these efforts started, there’s now more of an impetus than ever to accelerate the process.

For more information on the reasons to drop RC4, as well as in-depth guide on how to do so, visit Microsoft’s documentation on the subject on the company’s Security Research and Defense Blog.

Mobile

Think iPhones can’t get viruses? Our expert explains why it could happen

If your iPhone has been acting strangely, then you may be concerned about the possibility it is infected with a virus or some malware. We take a look at just how likely that is and explain why iOS is considered relatively safe.
Social Media

Twitter is testing a handy subscription feature for following threads

Twitter has recently started testing a feature that lets you subscribe to a thread so that you’ll no longer need to like a comment or post to it yourself in order to receive notifications of new contributions.
Mobile

Huawei has a bold Plan B should tensions affect its software relationships

Huawei has its own software for smartphones and computers prepared, should its relationship with Google and Microsoft be adversely affected by ongoing tensions between it and the U.S..
Social Media

Yep, it’s not just you. Facebook, Instagram, and WhatsApp are down for many

Facebook's family of apps has been suffering issues for much of the day. Instagram, WhatsApp, Facebook Messenger, and Facebook itself have been out of action for users around the world, with the company scrambling to sort it out.
Computing

Teens using Google Docs as the modern version of passing notes in class

Google Docs is reportedly being used by teens as a secret communications app. Instead of passing notes, students are now using the software's live chat function or comment boxes to talk with their friends while in the middle of classes.
Emerging Tech

A.I.-generated text is supercharging fake news. This is how we fight back

A new A.I. tool is reportedly able to spot passages of text written by algorithm. Here's why similar systems might prove essential in a world of fake news created by smart machines.
Computing

HP’s Omen Mindframe headset keeps your ears chill, but might leave you lukewarm

The Omen Mindframe headset uses HP's FrostCap technology to keep ears cool during long gaming sections. While it delivers on keeping ears cool, it forgets some of the essentials of a quality gaming headset.
Computing

Windows updates shouldn't cause problems, but if they do, here's how to fix them

Windows update not working? It's a more common problem than you might think. Fortunately, there are a few steps you can take to troubleshoot it and in this guide we'll break them down for you step by step.
Computing

Here’s how you can watch today’s Nvidia GTC 2019 keynote live

Nvidia's rumored 7nm Ampere graphics could debut soon. The company will be kicking off its GPU Technology conference at 2 p.m. PT today, Monday, March 18, and you can watch the opening keynote here.
Computing

After fourth attack, hacker puts personal records of 26M people up for sale

A serial hacker going by the name of Gnosticplayers is selling the personal data of 26 million people who have been using the services of six different companies from across the world.
Computing

There’s more space on MySpace after ‘accidental’ wipe of 50 million songs

MySpace is no longer a safe refuge for music and media produced in the 2000s. It said that almost any artistic content uploaded to the site between 2003 and 2015 may have been lost as part of a server migration last year.
Computing

HP’s spring sale cuts prices on the 15-inch Spectre x360 by $270

Looking for a new laptop to start off the spring season? HP has you covered and is currently running a sale that is cutting $270 off the price of the 15-inch touchscreen variant of its Spectre X360 Windows 10 convertible laptop. 
Computing

Intel and Facebook team up to give Cooper Lake an artificial intelligence boost

Intel's upcoming Cooper Lake microarchitecture will be getting a boost when it comes to artificial intelligence processes, thanks to a partnership with Facebook. The results are CPUs that are able to work faster.
Computing

Dodge the cryptojackers with the best torrent clients available today

Looking for the best torrent clients to help you share all of that wonderful legal content you own? Here's a list of our favorite torrent clients, all packed with great features while dodging malware and adverts.