Get the latest market trends in your inbox

Stay on top of the latest market trends and economic insights with the Axios Markets newsletter. Sign up for free.

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Catch up on coronavirus stories and special reports, curated by Mike Allen everyday

Catch up on coronavirus stories and special reports, curated by Mike Allen everyday

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Denver news in your inbox

Catch up on the most important stories affecting your hometown with Axios Denver

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Des Moines news in your inbox

Catch up on the most important stories affecting your hometown with Axios Des Moines

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Minneapolis-St. Paul news in your inbox

Catch up on the most important stories affecting your hometown with Axios Minneapolis-St. Paul

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Tampa-St. Petersburg news in your inbox

Catch up on the most important stories affecting your hometown with Axios Tampa-St. Petersburg

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Photo by Carl Court/Getty Images

Fancy Bear, a group U.S. intelligence believes hacked the Democratic National Committee in 2016 and attributes to Russia, appears to be using Lojack laptop tracking software to facilitate new hacking campaigns.

The details: Researchers at Arbor Networks' ASERT lab found that hackers tampered with Lojack to communicate with several domains used by Fancy Bear in the past.

It's unclear how the malware was installed.

The intrigue: Lojack is a security program used to locate lost and stolen laptops, designed to stay on a computer even after its hard drive is wiped clean. Because of its unique features, code associated with Lojack can sometimes slip under antivirus software's radar. The technique for using Lojack to hide malware was first discovered in 2014 and presented at the hacker conference Black Hat.

Go deeper

1 min ago - Podcasts

Former FDA chief Rob Califf on the vaccine approval process

The U.S. Food and Drug Administration (FDA) is reviewing two emergency use authorization requests for COVID-19 vaccines, with an outside advisory committee scheduled to meet next Thursday to review data from Pfizer and its German partner BioNTech.

Axios Re:Cap digs in with former FDA commissioner Rob Calif about the EUA process, the science and who should make the final call.

The recovery needs rocket fuel

Data: BLS. Chart: Axios Visuals

Friday's deeply disappointing jobs report should light a fire under Congress, which has dithered despite signs the economy is struggling to kick back into gear.

Driving the news: President-elect Biden said Friday afternoon in Wilmington that he supports another round of $1,200 checks.

1 hour ago - Health

CDC: It's time for "universal face mask use"

Photo: Paul Hennessy/SOPA Images/LightRocket via Getty

The CDC is urging “universal face mask use” for the first time since the coronavirus pandemic began, citing recent case spikes as the U.S. has entered a phase of “high-level transmission” before winter officially begins.

Why it matters: Daily COVID-related deaths across the U.S. hit a new record on Wednesday. Face coverings have been shown to increase protection of the wearer and those around them, despite some Americans' reluctance to use them.