Owners of WDTV Media Players Advised to Take Devices Offline Due to Security Bugs
Security researchers from SEC Consult have found eight vulnerabilities in the firmware of Western Digital TV Media Player that allow hackers a multitude of ways to hack and take over the device. [...]
https://www.bleepingcomputer.com/news/security/owners-of-wdtv-media-players-advised-to-take-devices-offline-due-to-security-bugs/
Security researchers from SEC Consult have found eight vulnerabilities in the firmware of Western Digital TV Media Player that allow hackers a multitude of ways to hack and take over the device. [...]
https://www.bleepingcomputer.com/news/security/owners-of-wdtv-media-players-advised-to-take-devices-offline-due-to-security-bugs/
BleepingComputer
Owners of WDTV Media Players Advised to Take Devices Offline Due to Security Bugs
Security researchers from SEC Consult have found eight vulnerabilities in the firmware of Western Digital TV Media Player that allow hackers a multitude of ways to hack and take over the device.
Wallet Ransomware Master Keys Released on BleepingComputer. Avast Releases Free Decryptor
This morning a newly registered member posted the master decryption keys for the Wallet Ransomware in the BleepingComputer.com forums. Once these keys were determined to be valid, Avast updated their decryptor to support the .Wallet extension. Victims can now use this decryptor to decrypt their files for free. [...]
https://www.bleepingcomputer.com/news/security/wallet-ransomware-master-keys-released-on-bleepingcomputer-avast-releases-free-decryptor/
This morning a newly registered member posted the master decryption keys for the Wallet Ransomware in the BleepingComputer.com forums. Once these keys were determined to be valid, Avast updated their decryptor to support the .Wallet extension. Victims can now use this decryptor to decrypt their files for free. [...]
https://www.bleepingcomputer.com/news/security/wallet-ransomware-master-keys-released-on-bleepingcomputer-avast-releases-free-decryptor/
BleepingComputer
Wallet Ransomware Master Keys Released on BleepingComputer. Avast Releases Free Decryptor
This morning a newly registered member posted the master decryption keys for the Wallet Ransomware in the BleepingComputer.com forums. Once these keys were determined to be valid, Avast updated their decryptor to support the .Wallet extension. Victims canβ¦
Chinese Government Contractor Identified as Cyber-Espionage Group APT3
An anonymous group known as Intrusion Truth has published evidence that links an intelligence contractor working with the Chinese government to cyber-attacks that have been carried out by a cyber-espionage group known in the infosec community as APT3. [...]
https://www.bleepingcomputer.com/news/security/chinese-government-contractor-identified-as-cyber-espionage-group-apt3/
An anonymous group known as Intrusion Truth has published evidence that links an intelligence contractor working with the Chinese government to cyber-attacks that have been carried out by a cyber-espionage group known in the infosec community as APT3. [...]
https://www.bleepingcomputer.com/news/security/chinese-government-contractor-identified-as-cyber-espionage-group-apt3/
BleepingComputer
Chinese Government Contractor Identified as Cyber-Espionage Group APT3
An anonymous group known as Intrusion Truth has published evidence that links an intelligence contractor working with the Chinese government to cyber-attacks that have been carried out by a cyber-espionage group known in the infosec community as APT3.
WannaCry Ransomware Infects Actual Medical Devices, Not Just Computers
Reports have surfaced that the WannaCry ransomware has infected actual medical devices, not just computers at medical facilities. [...]
https://www.bleepingcomputer.com/news/security/wannacry-ransomware-infects-actual-medical-devices-not-just-computers/
Reports have surfaced that the WannaCry ransomware has infected actual medical devices, not just computers at medical facilities. [...]
https://www.bleepingcomputer.com/news/security/wannacry-ransomware-infects-actual-medical-devices-not-just-computers/
BleepingComputer
WannaCry Ransomware Infects Actual Medical Devices, Not Just Computers
Reports have surfaced that the WannaCry ransomware has infected actual medical devices, not just computers at medical facilities.
Hacker Demands Ransom After Stealing Source Code From Famous App Maker
Steven Frank, co-founder of Panic, a vendor of Mac and iOS apps, has admitted yesterday that a hacker stole some of his company's source code. [...]
https://www.bleepingcomputer.com/news/security/hacker-demands-ransom-after-stealing-source-code-from-famous-app-maker/
Steven Frank, co-founder of Panic, a vendor of Mac and iOS apps, has admitted yesterday that a hacker stole some of his company's source code. [...]
https://www.bleepingcomputer.com/news/security/hacker-demands-ransom-after-stealing-source-code-from-famous-app-maker/
BleepingComputer
Hacker Demands Ransom After Stealing Source Code From Famous App Maker
Steven Frank, co-founder of Panic, a vendor of Mac and iOS apps, has admitted yesterday that a hacker stole some of his company's source code.
Vault 7: CIA Co-Developed Athena Malware with US Cyber-Security Company
According to leaked documents, which WikiLeaks previously claimed it received from hackers and CIA insiders, Athena is an implant β a CIA technical term for "malware" β that can target and infect any Windows system, from Windows XP to Windows 10, Microsoft's latest OS version. [...]
https://www.bleepingcomputer.com/news/security/vault-7-cia-co-developed-athena-malware-with-us-cyber-security-company/
According to leaked documents, which WikiLeaks previously claimed it received from hackers and CIA insiders, Athena is an implant β a CIA technical term for "malware" β that can target and infect any Windows system, from Windows XP to Windows 10, Microsoft's latest OS version. [...]
https://www.bleepingcomputer.com/news/security/vault-7-cia-co-developed-athena-malware-with-us-cyber-security-company/
BleepingComputer
Vault 7: CIA Co-Developed Athena Malware with US Cyber-Security Company
According to leaked documents, which WikiLeaks previously claimed it received from hackers and CIA insiders, Athena is an implant β a CIA technical term for "malware" β that can target and infect any Windows system, from Windows XP to Windows 10, Microsoft'sβ¦
New SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
Researchers have detected a new worm that is spreading via SMB, but unlike the worm component of the WannaCry ransomware, this one is using seven NSA tools instead of two. [...]
https://www.bleepingcomputer.com/news/security/new-smb-worm-uses-seven-nsa-hacking-tools-wannacry-used-just-two/
Researchers have detected a new worm that is spreading via SMB, but unlike the worm component of the WannaCry ransomware, this one is using seven NSA tools instead of two. [...]
https://www.bleepingcomputer.com/news/security/new-smb-worm-uses-seven-nsa-hacking-tools-wannacry-used-just-two/
BleepingComputer
New SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
Researchers have detected a new worm that is spreading via SMB, but unlike the worm component of the WannaCry ransomware, this one is using seven NSA tools instead of two.
XData Ransomware on a Rampage in Ukraine
A new ransomware strain named XData has wreaked havoc in Ukraine in the last 24 hours, locking computers for hundreds of users. [...]
https://www.bleepingcomputer.com/news/security/xdata-ransomware-on-a-rampage-in-ukraine/
A new ransomware strain named XData has wreaked havoc in Ukraine in the last 24 hours, locking computers for hundreds of users. [...]
https://www.bleepingcomputer.com/news/security/xdata-ransomware-on-a-rampage-in-ukraine/
BleepingComputer
XData Ransomware on a Rampage in Ukraine
A new ransomware strain named XData has wreaked havoc in Ukraine in the last 24 hours, locking computers for hundreds of users.
Over 98% of All WannaCry Victims Were Using Windows 7
Numbers released by Kaspersky Lab on Friday reveal that over 98% of all documented WannaCry infections were running versions of the Windows 7 operating system. [...]
https://www.bleepingcomputer.com/news/security/over-98-percent-of-all-wannacry-victims-were-using-windows-7/
Numbers released by Kaspersky Lab on Friday reveal that over 98% of all documented WannaCry infections were running versions of the Windows 7 operating system. [...]
https://www.bleepingcomputer.com/news/security/over-98-percent-of-all-wannacry-victims-were-using-windows-7/
BleepingComputer
Over 98% of All WannaCry Victims Were Using Windows 7
Numbers released by Kaspersky Lab on Friday reveal that over 98% of all documented WannaCry infections were running versions of the Windows 7 operating system.
The Week in Ransomware - May 19th 2017 - Uiwix, WannaCry Imitators, and Wallet Decrypted
From new ransomware and WannaCry imitations to decryption keys being released, ransomware developers continue to keep us busy.. This article will keep you up-to-date on the latest news and developments in ransomware. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-19th-2017-uiwix-wannacry-imitators-and-wallet-decrypted/
From new ransomware and WannaCry imitations to decryption keys being released, ransomware developers continue to keep us busy.. This article will keep you up-to-date on the latest news and developments in ransomware. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-19th-2017-uiwix-wannacry-imitators-and-wallet-decrypted/
BleepingComputer
The Week in Ransomware - May 19th 2017 - Uiwix, WannaCry Imitators, and Wallet Decrypted
From new ransomware and WannaCry imitations to decryption keys being released, ransomware developers continue to keep us busy.. This article will keep you up-to-date on the latest news and developments in ransomware.
Dark Web Market Shuts Down Claiming Hack, but Users Fear an Exit Scam
Outlaw was a veteran of the Dark Web marketplaces, founded way back in 2013. The site was never the most popular destination for online criminals but had a steady following. [...]
https://www.bleepingcomputer.com/news/security/dark-web-market-shuts-down-claiming-hack-but-users-fear-an-exit-scam/
Outlaw was a veteran of the Dark Web marketplaces, founded way back in 2013. The site was never the most popular destination for online criminals but had a steady following. [...]
https://www.bleepingcomputer.com/news/security/dark-web-market-shuts-down-claiming-hack-but-users-fear-an-exit-scam/
BleepingComputer
Dark Web Market Shuts Down Claiming Hack, but Users Fear an Exit Scam
Outlaw was a veteran of the Dark Web marketplaces, founded way back in 2013. The site was never the most popular destination for online criminals but had a steady following.
SSD Drives Vulnerable to Attacks That Corrupt User Data
NAND flash memory chips, the building blocks of solid-state drives (SSDs), feature what could be called "programming vulnerabilities" that can be exploited to alter data stored on these devices. [...]
https://www.bleepingcomputer.com/news/hardware/ssd-drives-vulnerable-to-attacks-that-corrupt-user-data/
NAND flash memory chips, the building blocks of solid-state drives (SSDs), feature what could be called "programming vulnerabilities" that can be exploited to alter data stored on these devices. [...]
https://www.bleepingcomputer.com/news/hardware/ssd-drives-vulnerable-to-attacks-that-corrupt-user-data/
BleepingComputer
SSD Drives Vulnerable to Attacks That Corrupt User Data
NAND flash memory chips, the building blocks of solid-state drives (SSDs), include what could be called "programming vulnerabilities" that can be exploited to alter stored data or shorten the SSD's lifespan.
Netgear Enables User Data Collection Feature on Popular Router Model
The latest firmware update for Netgear NightHawk R700 routers adds support and enables an "analytics system" that collects user data and sends it to the company's servers. [...]
https://www.bleepingcomputer.com/news/hardware/netgear-enables-user-data-collection-feature-on-popular-router-model/
The latest firmware update for Netgear NightHawk R700 routers adds support and enables an "analytics system" that collects user data and sends it to the company's servers. [...]
https://www.bleepingcomputer.com/news/hardware/netgear-enables-user-data-collection-feature-on-popular-router-model/
BleepingComputer
Netgear Enables User Data Collection Feature on Popular Router Model
The latest firmware update for Netgear NightHawk R7000 routers adds support and enables an "analytics system" that collects user data and sends it to the company's servers.
Former IBM Engineer Admits He Stole Source Code for China
Xu Jiaqiang, 30, a former software engineer for IBM, pleaded guilty on Friday to charges of economic espionage after the FBI had caught him attempting to sell IBM's source code, and later discovered he sold it to parties in China. [...]
https://www.bleepingcomputer.com/news/government/former-ibm-engineer-admits-he-stole-source-code-for-china/
Xu Jiaqiang, 30, a former software engineer for IBM, pleaded guilty on Friday to charges of economic espionage after the FBI had caught him attempting to sell IBM's source code, and later discovered he sold it to parties in China. [...]
https://www.bleepingcomputer.com/news/government/former-ibm-engineer-admits-he-stole-source-code-for-china/
BleepingComputer
Former IBM Engineer Admits He Stole Source Code for China
Xu Jiaqiang, 30, a former software engineer for IBM, pleaded guilty on Friday to charges of economic espionage after the FBI had caught him attempting to sell IBM's source code, and later discovered he sold it to parties in China.
Yahoo Retires Problematic Library After Bug Exposes User Email Content
Yahoo's engineering staff have retired the ImageMagick library from active duty after a security researcher found a bug that would have allowed an attacker to expose server memory, which, due to the library's nature, leaked image data from users' inboxes. [...]
https://www.bleepingcomputer.com/news/security/yahoo-retires-problematic-library-after-bug-exposes-user-email-content/
Yahoo's engineering staff have retired the ImageMagick library from active duty after a security researcher found a bug that would have allowed an attacker to expose server memory, which, due to the library's nature, leaked image data from users' inboxes. [...]
https://www.bleepingcomputer.com/news/security/yahoo-retires-problematic-library-after-bug-exposes-user-email-content/
BleepingComputer
Yahoo Retires Problematic Library After Bug Exposes User Email Content
Yahoo's engineering staff have retired the ImageMagick library from active duty after a security researcher found a bug that would have allowed an attacker to expose server memory, which, due to the library's nature, leaked image data from users' inboxes.
North Korea Denies Involvement in WannaCry Ransomware Outbreak
On Friday, North Korea denied allegations that it was somehow responsible for the WannaCry ransomware outbreak that affected over 240,000 computers in nearly 200 countries across the globe. [...]
https://www.bleepingcomputer.com/news/security/north-korea-denies-involvement-in-wannacry-ransomware-outbreak/
On Friday, North Korea denied allegations that it was somehow responsible for the WannaCry ransomware outbreak that affected over 240,000 computers in nearly 200 countries across the globe. [...]
https://www.bleepingcomputer.com/news/security/north-korea-denies-involvement-in-wannacry-ransomware-outbreak/
BleepingComputer
North Korea Denies Involvement in WannaCry Ransomware Outbreak
On Friday, North Korea denied allegations that it was somehow responsible for the WannaCry ransomware outbreak that affected over 240,000 computers in nearly 200 countries across the globe.
Judge: It's OK If Best Buy's Geek Squad Nerds Search Your PC for Illegal Content
A judge presiding over a child pornography case that was set in motion in 2012 has ruled that users have no legal expectation of privacy when they hand over their computers to Best Buy's Geek Squad IT technicians. [...]
https://www.bleepingcomputer.com/news/legal/judge-its-ok-if-best-buys-geek-squad-nerds-search-your-pc-for-illegal-content/
A judge presiding over a child pornography case that was set in motion in 2012 has ruled that users have no legal expectation of privacy when they hand over their computers to Best Buy's Geek Squad IT technicians. [...]
https://www.bleepingcomputer.com/news/legal/judge-its-ok-if-best-buys-geek-squad-nerds-search-your-pc-for-illegal-content/
BleepingComputer
Judge: It's OK If Best Buy's Geek Squad Nerds Search Your PC for Illegal Content
A judge presiding over a child pornography case that was set in motion in 2012 has ruled that users have no legal expectation of privacy when they hand over their computers to Best Buy's Geek Squad IT technicians.
After Seven Years, Microsoft Is Finally Fixing the "J" Email Bug
Microsoft said last week it's fixing the infamous J bug that affected the company's Outlook service for the past seven years, according to a report from last week. [...]
https://www.bleepingcomputer.com/news/microsoft/after-seven-years-microsoft-is-finally-fixing-the-j-email-bug/
Microsoft said last week it's fixing the infamous J bug that affected the company's Outlook service for the past seven years, according to a report from last week. [...]
https://www.bleepingcomputer.com/news/microsoft/after-seven-years-microsoft-is-finally-fixing-the-j-email-bug/
BleepingComputer
After Seven Years, Microsoft Is Finally Fixing the "J" Email Bug
Microsoft said last week it's fixing the infamous J bug that affected the company's Outlook service for the past seven years, according to a report from last week.
Russian Police Apprehend "Cron" Gang Behind Tiny.z and PonyForx Malware
Russian authorities have arrested the Cron malware gang, responsible for selling the Tiny.z Android banking trojan and the PonyForx Windows infostealer. [...]
https://www.bleepingcomputer.com/news/security/russian-police-apprehend-cron-gang-behind-tiny-z-and-ponyforx-malware/
Russian authorities have arrested the Cron malware gang, responsible for selling the Tiny.z Android banking trojan and the PonyForx Windows infostealer. [...]
https://www.bleepingcomputer.com/news/security/russian-police-apprehend-cron-gang-behind-tiny-z-and-ponyforx-malware/
BleepingComputer
Russian Police Apprehend "Cron" Gang Behind Tiny.z and PonyForx Malware
Russian authorities have arrested the Cron malware gang, responsible for selling the Tiny.z Android banking trojan and the PonyForx Windows infostealer.
Windows 10 UAC Bypass Uses "Apps & Features" Utility
Malware authors have a new UAC bypass technique at their disposal that they can use to install malicious apps on devices running Windows 10. [...]
https://www.bleepingcomputer.com/news/security/windows-10-uac-bypass-uses-apps-and-features-utility/
Malware authors have a new UAC bypass technique at their disposal that they can use to install malicious apps on devices running Windows 10. [...]
https://www.bleepingcomputer.com/news/security/windows-10-uac-bypass-uses-apps-and-features-utility/
BleepingComputer
Windows 10 UAC Bypass Uses "Apps & Features" Utility
Malware authors have a new UAC bypass technique at their disposal that they can use to install malicious apps on devices running Windows 10.
Malicious Movie Subtitles Can Give Hackers Full Control Over Your PC
A vulnerability in how video players load and parse subtitle files allows an attacker to execute code on a target's PC and effectively take over the device. [...]
https://www.bleepingcomputer.com/news/security/malicious-movie-subtitles-can-give-hackers-full-control-over-your-pc/
A vulnerability in how video players load and parse subtitle files allows an attacker to execute code on a target's PC and effectively take over the device. [...]
https://www.bleepingcomputer.com/news/security/malicious-movie-subtitles-can-give-hackers-full-control-over-your-pc/
BleepingComputer
Malicious Movie Subtitles Can Give Hackers Full Control Over Your PC
A vulnerability in how video players load and parse subtitle files allows an attacker to execute code on a target's PC and effectively take over the device.