Log in
Start free trial
Book a demo
Product
Media Database
Find the right journalists
Online Newsroom
Shape your own narrative
Press Release Creator
Create and send press releases
Media Monitoring
Track every single online mention
Media Pitching Tool
Contact recommendations & stats
PR Reports
Showcase the impact of your work
PR CRM
Manage contacts in easy way
AI PR Software
Use AI to save time on your workflow
Social Media Listening
Get a full overview of your brand's presence
Pricing
Top journalists
Top outlets
Book a demo
Log in
Start free trial
Media Database
>
Dan Goodin
Dan Goodin
Security Editor & Reporter at
Ars Technica
Contact this person
Email address
d*****@*******.com
Get email address
Influence score
57
Phone
(XXX) XXX-XXXX
Get mobile number
Location
United States
Languages
English
Covering topics
Computers & Technology
View more media outlets and journalists by signing up to Prowly
View latest data and reach out all from one place
Sign up for free
Recent Articles
arstechnica.com
Mysterious leak of Booking.com reservation data is being used to scam customers - Ars Technica
Somehow, scammers keep accessing customer reservation details, other private data.
almost 2 years ago
arstechnica.com
Hackers are selling a service that bypasses ChatGPT restrictions on...
ChatGPT restrictions on the creation of illicit content are easy to circumvent.
almost 2 years ago
arstechnica.com
Hacker group incorporates DNS hijacking into its malicious website ...
The DNS hijacking threat can be especially high for people using public Wi-Fi.
almost 2 years ago
arstechnica.com
Microsoft digital certificates have once again been abused to sign ...
Code-signing is supposed to make people safer. In this case, it made them less so.
almost 2 years ago
arstechnica.com
Feds charge man for his alleged involvement in pushing LockBit rans...
Automation features make LockBit one of the more destructive pieces of ransomware.
about 2 years ago
arstechnica.com
Feds say Ukrainian man running malware service amassed 50M unique c...
Wondering if your data got swept up by Raccoon? Here’s how to find out.
about 2 years ago
arstechnica.com
Google Play apps with >20M downloads depleted batteries and network...
Google removes 16 apps after receiving a report the apps were committing ad fraud
about 2 years ago
arstechnica.com
How a Microsoft blunder opened millions of PCs to potent malware at...
Microsoft said Windows automatically blocked dangerous drivers. It didn’t.
about 2 years ago
arstechnica.com
Unpatched Zimbra flaw under attack is letting hackers backdoor servers
The flaw has been under attack since at least early September.
about 2 years ago
arstechnica.com
How 3 hours of inaction from Amazon cost cryptocurrency holders $23...
For 2nd time in 4 years, Amazon loses control of its IP space in BGP hijacking.
about 2 years ago
arstechnica.com
Ukraine is under attack by hacking tools repurposed from Conti cybe...
Researchers from Google and IBM see unprecedented blurring of lines.
about 2 years ago
arstechnica.com
Actors behind PyPI supply chain attack have been active since late ...
Group that pulled off successful attack on PyPI has humble origins.
about 2 years ago
arstechnica.com
The number of companies caught up in recent hacks keeps growing - A...
2FA provider Authy, password manager LastPass, and DoorDash all experienced breaches.
about 2 years ago
arstechnica.com
North Korea-backed hackers have a clever way to read your Gmail
SHARPEXT has slurped up thousands of emails in the past year and keeps getting better.
over 2 years ago
arstechnica.com
Servers running Digium Phones VoiP software are getting backdoored
More than 500,000 malicious samples seen in campaign that installs web shells.
over 2 years ago
arstechnica.com
Why Lockdown mode from Apple is one of the coolest security ideas e...
Apple intros “extreme” optional protection against the scourge of mercenary spyware.
over 2 years ago
arstechnica.com
YouTube content creator credentials are under siege by YTStealer ma...
Researchers unearth suspected credential-stealer service targeting YouTubers.
over 2 years ago
arstechnica.com
Meeting Owl videoconference device used by govs is a security disaster
No patch yet for easy-to-hack access point that leaks data and exposes networks to hacks.
over 2 years ago
arstechnica.com
Botnet that hid for 18 months boasted some of the coolest tradecraf...
Once-unknown group uses a tunnel fetish and a chameleon’s ability to blend in.
over 2 years ago
arstechnica.com
Microsoft finds Linux desktop flaw that gives root to untrusted users
Elevation of privilege vulnerabilities can be used to gain persistent root access.
over 2 years ago