Malvertising Domain Had So Much Traffic It Reached #517 in the Alexa Ranking
A group known as NoTrove is driving massive amounts of traffic to survey pages, scams sites, and shady software download portals, so much so that one of the domains they used in their campaings peaked at #517 in Amazon's Alexa traffic ranking, according to a report released today by digital threat management firm RiskIQ. [...]
https://www.bleepingcomputer.com/news/security/malvertising-domain-had-so-much-traffic-it-reached-517-in-the-alexa-ranking/
A group known as NoTrove is driving massive amounts of traffic to survey pages, scams sites, and shady software download portals, so much so that one of the domains they used in their campaings peaked at #517 in Amazon's Alexa traffic ranking, according to a report released today by digital threat management firm RiskIQ. [...]
https://www.bleepingcomputer.com/news/security/malvertising-domain-had-so-much-traffic-it-reached-517-in-the-alexa-ranking/
BleepingComputer
Malvertising Domain Had So Much Traffic It Reached #517 in the Alexa Ranking
A group known as NoTrove is driving massive amounts of traffic to survey pages, scams sites, and shady software download portals, so much so that one of the domains they used in their campaings peaked at #517 in Amazon's Alexa traffic ranking, according toβ¦
Chrome Will Mark HTTP Sites in Incognito Mode as Not Secure
Google announced plans to increase the usage of the "Not secure" indicator on sites loaded via HTTP. The company's plan includes two major changes. [...]
https://www.bleepingcomputer.com/news/software/chrome-will-mark-http-sites-in-incognito-mode-as-not-secure/
Google announced plans to increase the usage of the "Not secure" indicator on sites loaded via HTTP. The company's plan includes two major changes. [...]
https://www.bleepingcomputer.com/news/software/chrome-will-mark-http-sites-in-incognito-mode-as-not-secure/
BleepingComputer
Chrome Will Mark HTTP Sites in Incognito Mode as Not Secure
Google announced plans to increase the usage of the "Not secure" indicator on sites loaded via HTTP. The company's plan includes two major changes.
Several Cable Modem Models Affected by SNMP God Mode Flaw
A severe security flaw in the implementation of the SNMP protocol allows an attacker to take over at least 78 cable modem models, according to a team of researchers. [...]
https://www.bleepingcomputer.com/news/security/several-cable-modem-models-affected-by-snmp-god-mode-flaw/
A severe security flaw in the implementation of the SNMP protocol allows an attacker to take over at least 78 cable modem models, according to a team of researchers. [...]
https://www.bleepingcomputer.com/news/security/several-cable-modem-models-affected-by-snmp-god-mode-flaw/
BleepingComputer
Several Cable Modem Models Affected by SNMP God Mode Flaw
A severe security flaw in the implementation of the SNMP protocol allows an attacker to take over at least 58 cable modem models, according to a team of researchers.
WikiLeaks Publishes CIA Anti-Whistleblowers Tool for Microsoft Office Documents
Today, WikiLeaks continued its "Vault 7" campaign by dumping another set of CIA files, but this time around, the organization also included the tool's source code, something they have not leaked in previous data dumps. [...]
https://www.bleepingcomputer.com/news/gaming/wikileaks-publishes-cia-anti-whistleblowers-tool-for-microsoft-office-documents/
Today, WikiLeaks continued its "Vault 7" campaign by dumping another set of CIA files, but this time around, the organization also included the tool's source code, something they have not leaked in previous data dumps. [...]
https://www.bleepingcomputer.com/news/gaming/wikileaks-publishes-cia-anti-whistleblowers-tool-for-microsoft-office-documents/
BleepingComputer
WikiLeaks Publishes CIA Anti-Whistleblowers Tool for Microsoft Office Documents
Today, WikiLeaks continued its "Vault 7" campaign by dumping another set of CIA files, but this time around, the organization also included the tool's source code, something they have not leaked in previous data dumps.
Open Ports Create Backdoors in Millions of Smartphones
Applications that open ports on Android smartphones are opening those phones to remote hacking, claims a team of researchers from the University of Michigan. [...]
https://www.bleepingcomputer.com/news/security/open-ports-create-backdoors-in-millions-of-smartphones/
Applications that open ports on Android smartphones are opening those phones to remote hacking, claims a team of researchers from the University of Michigan. [...]
https://www.bleepingcomputer.com/news/security/open-ports-create-backdoors-in-millions-of-smartphones/
BleepingComputer
Open Ports Create Backdoors in Millions of Smartphones
Applications that open ports on Android smartphones are opening those phones to remote hacking, claims a team of researchers from the University of Michigan.
Italian Botnet Operator Who Made Over $325,000 Extradited to the US
US officials successfully extradited a 30-year-old Italian man for his role in creating and running a botnet of hacked servers. [...]
https://www.bleepingcomputer.com/news/security/italian-botnet-operator-who-made-over-325-000-extradited-to-the-us/
US officials successfully extradited a 30-year-old Italian man for his role in creating and running a botnet of hacked servers. [...]
https://www.bleepingcomputer.com/news/security/italian-botnet-operator-who-made-over-325-000-extradited-to-the-us/
BleepingComputer
Italian Botnet Operator Who Made Over $325,000 Extradited to the US
The Week in Ransomware - April 28th 2017 -
Was a good week as not a lot of news when it comes to ransomware. Some more in-dev crap and nothing really new this week. The biggest news is that Cerber is now being distributed via MALSPAM that utilizes CVE-2017-0199 in the attached DOC files. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2017-/
Was a good week as not a lot of news when it comes to ransomware. Some more in-dev crap and nothing really new this week. The biggest news is that Cerber is now being distributed via MALSPAM that utilizes CVE-2017-0199 in the attached DOC files. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2017-/
BleepingComputer
The Week in Ransomware - April 28th 2017 -
Was a good week as not a lot of news when it comes to ransomware. Some more in-dev crap and nothing really new this week. The biggest news is that Cerber is now being distributed via MALSPAM that utilizes CVE-2017-0199 in the attached DOC files.
My People comes to Windows 10 Insider Build 16184 For PC
Today Microsoft released Insider Preview Build 16184 for PC and Insider Preview Build 15208 for Mobile to insiders on the fast ring. With build 16184, Microsoft introduces My People to Windows 10, which allows users to pin people to the taskbar and communicate with them by installing apps such as Skype, Mail, and People. [...]
https://www.bleepingcomputer.com/news/microsoft/my-people-comes-to-windows-10-insider-build-16184-for-pc/
Today Microsoft released Insider Preview Build 16184 for PC and Insider Preview Build 15208 for Mobile to insiders on the fast ring. With build 16184, Microsoft introduces My People to Windows 10, which allows users to pin people to the taskbar and communicate with them by installing apps such as Skype, Mail, and People. [...]
https://www.bleepingcomputer.com/news/microsoft/my-people-comes-to-windows-10-insider-build-16184-for-pc/
BleepingComputer
My People comes to Windows 10 Insider Build 16184 For PC
Today Microsoft released Insider Preview Build 16184 for PC and Insider Preview Build 15208 for Mobile to insiders on the fast ring. With build 16184, Microsoft introduces My People to Windows 10, which allows users to pin people to the taskbar and communicateβ¦
Malware Blocks Virginia State Police From Updating Sex Offender Registry
A malware infection affecting servers belonging to the Virginia State Police (VSP) has shut down the department's email system, along with its ability to update the Virginia Sex Offender and Crimes Against Children Registry (SOR). [...]
https://www.bleepingcomputer.com/news/security/malware-blocks-virginia-state-police-from-updating-sex-offender-registry/
A malware infection affecting servers belonging to the Virginia State Police (VSP) has shut down the department's email system, along with its ability to update the Virginia Sex Offender and Crimes Against Children Registry (SOR). [...]
https://www.bleepingcomputer.com/news/security/malware-blocks-virginia-state-police-from-updating-sex-offender-registry/
BleepingComputer
Malware Blocks Virginia State Police From Updating Sex Offender Registry
A malware infection affecting servers belonging to the Virginia State Police (VSP) has shut down the department's email system, along with its ability to update the Virginia Sex Offender and Crimes Against Children Registry (SOR).
New Dok Mac Malware Uses Nag Screens, Intercepts Encrypted Web Traffic
Security researchers from Check Point have discovered a new Mac malware family that uses nag screens to obtain admin privileges, Tor to hide traffic diverted to a remote proxy, and a rogue certificate to intercept encrypted browser traffic. [...]
https://www.bleepingcomputer.com/news/security/new-dok-mac-malware-uses-nag-screens-intercepts-encrypted-web-traffic/
Security researchers from Check Point have discovered a new Mac malware family that uses nag screens to obtain admin privileges, Tor to hide traffic diverted to a remote proxy, and a rogue certificate to intercept encrypted browser traffic. [...]
https://www.bleepingcomputer.com/news/security/new-dok-mac-malware-uses-nag-screens-intercepts-encrypted-web-traffic/
BleepingComputer
New Dok Mac Malware Uses Nag Screens, Intercepts Encrypted Web Traffic
Security researchers from Check Point have discovered a new Mac malware family that uses nag screens to obtain admin privileges, Tor to hide traffic diverted to a remote proxy, and a rogue certificate to intercept encrypted browser traffic.
Hacker Leaks "Orange Is the New Black" Season 5 Episodes After Netflix Extortion Attempt Fails
A hacker (or hacker group) known as The Dark Overlord (TDO) has leaked the first ten episodes of season 5 of the "Orange Is The New Black" show after two failed blackmail attempts, against Larson Studios and Netflix. [...]
https://www.bleepingcomputer.com/news/security/hacker-leaks-orange-is-the-new-black-season-5-episodes-after-netflix-extortion-attempt-fails/
A hacker (or hacker group) known as The Dark Overlord (TDO) has leaked the first ten episodes of season 5 of the "Orange Is The New Black" show after two failed blackmail attempts, against Larson Studios and Netflix. [...]
https://www.bleepingcomputer.com/news/security/hacker-leaks-orange-is-the-new-black-season-5-episodes-after-netflix-extortion-attempt-fails/
BleepingComputer
Hacker Leaks "Orange Is the New Black" Season 5 Episodes After Netflix Extortion Attempt Fails
A hacker (or hacker group) known as The Dark Overlord (TDO) has leaked the first ten episodes of season 5 of the "Orange Is The New Black" show after two failed blackmail attempts, against Larson Studios and Netflix.
Lawsuit Brewing Over Unfixed Bug in Intel Puma 6 CPUs
An unpatched bug in the firmware of Intel Puma 6 chipsets β used within several models of gigabit cable modems β is causing latency issues, and may also be used to knock devices offline via a gentle packet stream. [...]
https://www.bleepingcomputer.com/news/hardware/lawsuit-brewing-over-unfixed-bug-in-intel-puma-6-cpus/
An unpatched bug in the firmware of Intel Puma 6 chipsets β used within several models of gigabit cable modems β is causing latency issues, and may also be used to knock devices offline via a gentle packet stream. [...]
https://www.bleepingcomputer.com/news/hardware/lawsuit-brewing-over-unfixed-bug-in-intel-puma-6-cpus/
BleepingComputer
Lawsuit Brewing Over Unfixed Bug in Intel Puma 6 CPUs
An unpatched bug in the firmware of Intel Puma 6 chipsets β used within several models of gigabit cable modems β is causing latency issues, and may also be used to knock devices offline via a gentle packet stream.
Leaked Documents Reveal Facebook Targets Emotionally Insecure Teens
Facebook's marketing department is using algorithms to identify emotionally vulnerable and insecure youth as young as 14, The Australian reported today after reporters managed to get their hands on a 23-page report from Facebook's Australian office. [...]
https://www.bleepingcomputer.com/news/technology/leaked-documents-reveal-facebook-targets-emotionally-insecure-teens/
Facebook's marketing department is using algorithms to identify emotionally vulnerable and insecure youth as young as 14, The Australian reported today after reporters managed to get their hands on a 23-page report from Facebook's Australian office. [...]
https://www.bleepingcomputer.com/news/technology/leaked-documents-reveal-facebook-targets-emotionally-insecure-teens/
BleepingComputer
Leaked Documents Reveal Facebook Targets Emotionally Insecure Teens
Facebook's marketing department is using algorithms to identify emotionally vulnerable and insecure youth as young as 14, The Australian reported today after reporters managed to get their hands on a 23-page report from Facebook's Australian office.
Malware Author Inflates Backdoor Trojan With Junk Data Hoping to Avoid Detection
A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or delay investigations of infosec professionals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-inflates-backdoor-trojan-with-junk-data-hoping-to-avoid-detection/
A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or delay investigations of infosec professionals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-inflates-backdoor-trojan-with-junk-data-hoping-to-avoid-detection/
BleepingComputer
Malware Author Inflates Backdoor Trojan With Junk Data Hoping to Avoid Detection
A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or delay investigations of infosec professionals.
Security Researcher and Alleged Spam Operator to Square Off in Court in Ugly Lawsuit
River City Media, an email marketing company that was exposed last month as one of the world's largest spam operators, has filed a lawsuit against the security researcher who made the revelations. [...]
https://www.bleepingcomputer.com/news/legal/security-researcher-and-alleged-spam-operator-to-square-off-in-court-in-ugly-lawsuit/
River City Media, an email marketing company that was exposed last month as one of the world's largest spam operators, has filed a lawsuit against the security researcher who made the revelations. [...]
https://www.bleepingcomputer.com/news/legal/security-researcher-and-alleged-spam-operator-to-square-off-in-court-in-ugly-lawsuit/
BleepingComputer
Security Researcher and Alleged Spam Operator to Square Off in Court in Ugly Lawsuit
River City Media, an email marketing company that was reported last month as allegedly one of the world's largest spam operators, has filed a lawsuit against the security researcher who made the revelations.
Hyundai Patches Mobile App Flaws That Allow Hackers to Steal Cars
Hyundai has patched a security flaw in the Blue Link mobile application that exposed sensitive information, which hackers could have used to track down, unlock, and start Hyundai cars. [...]
https://www.bleepingcomputer.com/news/security/hyundai-patches-mobile-app-flaws-that-allow-hackers-to-steal-cars/
Hyundai has patched a security flaw in the Blue Link mobile application that exposed sensitive information, which hackers could have used to track down, unlock, and start Hyundai cars. [...]
https://www.bleepingcomputer.com/news/security/hyundai-patches-mobile-app-flaws-that-allow-hackers-to-steal-cars/
BleepingComputer
Hyundai Patches Mobile App Flaws That Allow Hackers to Steal Cars
Hyundai has patched a security flaw in the Blue Link mobile application that exposed sensitive information, which hackers could have used to track down, unlock, and start Hyundai cars.
New version of the CryptoMix Ransomware Using the Wallet Extension
A new variant of the CryptoMix ransomware was discovered that appends the email addresses shield0@usa.com & admin@hoist.desi along with the .Wallet extension. This makes it the third ransomware using .wallet, with the first being Dharma and then Sanctions. Unfortunately, the reuse of an extension is only going to confuse victims. [...]
https://www.bleepingcomputer.com/news/security/new-version-of-the-cryptomix-ransomware-using-the-wallet-extension/
A new variant of the CryptoMix ransomware was discovered that appends the email addresses shield0@usa.com & admin@hoist.desi along with the .Wallet extension. This makes it the third ransomware using .wallet, with the first being Dharma and then Sanctions. Unfortunately, the reuse of an extension is only going to confuse victims. [...]
https://www.bleepingcomputer.com/news/security/new-version-of-the-cryptomix-ransomware-using-the-wallet-extension/
BleepingComputer
New version of the CryptoMix Ransomware Using the Wallet Extension
A new variant of the CryptoMix ransomware was discovered that appends the email addresses shield0@usa.com & admin@hoist.desi along with the .Wallet extension. This makes it the third ransomware using .wallet, with the first being Dharma and then Sanctions.β¦
Hacked South Korean Bitcoin Exchange Loses $5.5 Million
Yapizon, a South Korean Bitcoin exchange, announced last week it lost 3816.2028 Bitcoin (over $5.5 million) after an unknown hacker breached its system and stole funds from its server. [...]
https://www.bleepingcomputer.com/news/security/hacked-south-korean-bitcoin-exchange-loses-5-5-million/
Yapizon, a South Korean Bitcoin exchange, announced last week it lost 3816.2028 Bitcoin (over $5.5 million) after an unknown hacker breached its system and stole funds from its server. [...]
https://www.bleepingcomputer.com/news/security/hacked-south-korean-bitcoin-exchange-loses-5-5-million/
BleepingComputer
Hacked South Korean Bitcoin Exchange Loses $5.5 Million
Yapizon, a South Korean Bitcoin exchange, announced last week it lost 3816.2028 Bitcoin (over $5.5 million) after an unknown hacker breached its system and stole funds from its server.
Intel Fixes 9-Year-Old CPU Flaw That Allows Remote Code Execution
Intel's security team released a series of patches yesterday that fix a remote code execution (RCE) bug found in the Intel Management Engine (ME). [...]
https://www.bleepingcomputer.com/news/hardware/intel-fixes-9-year-old-cpu-flaw-that-allows-remote-code-execution/
Intel's security team released a series of patches yesterday that fix a remote code execution (RCE) bug found in the Intel Management Engine (ME). [...]
https://www.bleepingcomputer.com/news/hardware/intel-fixes-9-year-old-cpu-flaw-that-allows-remote-code-execution/
BleepingComputer
Intel Fixes 9-Year-Old CPU Flaw That Allows Remote Code Execution
Intel's security team released a series of patches yesterday that fix a remote code execution (RCE) bug found in the Intel Management Engine (ME).
IBM Warns Customers That Some of Its USB Flash Drives May Contain Malware
IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code. [...]
https://www.bleepingcomputer.com/news/security/ibm-warns-customers-that-some-of-its-usb-flash-drives-may-contain-malware/
IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code. [...]
https://www.bleepingcomputer.com/news/security/ibm-warns-customers-that-some-of-its-usb-flash-drives-may-contain-malware/
BleepingComputer
IBM Warns Customers That Some of Its USB Flash Drives May Contain Malware
IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code.
New Shodan Tool Can Find Malware Command and Control (C&C) Servers
Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices. [...]
https://www.bleepingcomputer.com/news/security/new-shodan-tool-can-find-malware-command-and-control-candc-servers/
Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices. [...]
https://www.bleepingcomputer.com/news/security/new-shodan-tool-can-find-malware-command-and-control-candc-servers/
BleepingComputer
New Shodan Tool Can Find Malware Command and Control (C&C) Servers
Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices.