Latest news and stories from BleepingComputer.com
Apple macOS Sierra release Squashes over 60 Vulnerabilities
Today apple released macOS Sierra, which along with new features also fixed over 60 security vulnerabilities. Also released today were security updates for iCloud for Windows 6.0, macOS Server 5.2, and Safari 10. Many of the updates resolve remote code execution vulnerabilities that allow attackers to possibly issue commands or downl [...]
Apple macOS Sierra release Squashes over 60 Vulnerabilities
Today apple released macOS Sierra, which along with new features also fixed over 60 security vulnerabilities. Also released today were security updates for iCloud for Windows 6.0, macOS Server 5.2, and Safari 10. Many of the updates resolve remote code execution vulnerabilities that allow attackers to possibly issue commands or downl [...]
BleepingComputer
Apple macOS Sierra release Squashes over 60 Vulnerabilities
Today apple released macOS Sierra, which along with new features also fixed over 60 security vulnerabilities. Also released today were security updates for iCloud for Windows 6.0, macOS Server 5.2, and Safari 10. Many of the updates resolve remote code execution…
Latest news and stories from BleepingComputer.com
Researchers demonstrate how they can remotely attack Tesla Cars
As more and more devices and machines become connected, the world becomes a scarier place. This was shown yesterday, when the Keen Security Lab of Tencent posted a blog post on how they figured out a way to remotely attack Tesla cars. [...]
Researchers demonstrate how they can remotely attack Tesla Cars
As more and more devices and machines become connected, the world becomes a scarier place. This was shown yesterday, when the Keen Security Lab of Tencent posted a blog post on how they figured out a way to remotely attack Tesla cars. [...]
BleepingComputer
Researchers demonstrate how they can remotely attack Tesla Cars
As more and more devices and machines become connected, the world becomes a scarier place. This was shown yesterday, when the Keen Security Lab of Tencent posted a blog post on how they figured out a way to remotely attack Tesla cars.
Latest news and stories from BleepingComputer.com
Fantom Ransomware derives Ransom Amount and Address from Filename
A new variant of the Fantom Ransomware was discovered last week that added some new features. These features include network share encryption, random desktop wallpapers, and offline encryption. By far the most interesting feature is the ransomware's ability to set a ransom amount and a payment address based upon the name of the file. [...]
Fantom Ransomware derives Ransom Amount and Address from Filename
A new variant of the Fantom Ransomware was discovered last week that added some new features. These features include network share encryption, random desktop wallpapers, and offline encryption. By far the most interesting feature is the ransomware's ability to set a ransom amount and a payment address based upon the name of the file. [...]
BleepingComputer
Fantom Ransomware derives Ransom Amount and Address from Filename
A new variant of the Fantom Ransomware was discovered last week that added some new features. These features include network share encryption, random desktop wallpapers, and offline encryption. By far the most interesting feature is the ransomware's ability…
Latest news and stories from BleepingComputer.com
Windows 10 Insider Preview Build 14931 for PC Released
Microsoft has released Windows 10 Insider Preview Build 14931 only for the PC to Insiders on the fast ring. This build does not contain any new features, but Microsoft wanted to point out new features in certain apps that were upgrade last week and this week. [...]
Windows 10 Insider Preview Build 14931 for PC Released
Microsoft has released Windows 10 Insider Preview Build 14931 only for the PC to Insiders on the fast ring. This build does not contain any new features, but Microsoft wanted to point out new features in certain apps that were upgrade last week and this week. [...]
BleepingComputer
Windows 10 Insider Preview Build 14931 for PC Released
Microsoft has released Windows 10 Insider Preview Build 14931 only for the PC to Insiders on the fast ring. This build does not contain any new features, but Microsoft wanted to point out new features in certain apps that were upgrade last week and this week.
Latest news and stories from BleepingComputer.com
Yahoo hit with a Massive 500 Million Account Data Breach
In what could be the largest data breach in history, Yahoo announced today that attackers infiltrated their servers and walked away with account information for at least 500 million users. This stolen information may include names, email addresses, telephone numbers, encrypted passwords, and more. [...]
Yahoo hit with a Massive 500 Million Account Data Breach
In what could be the largest data breach in history, Yahoo announced today that attackers infiltrated their servers and walked away with account information for at least 500 million users. This stolen information may include names, email addresses, telephone numbers, encrypted passwords, and more. [...]
BleepingComputer
Yahoo hit with a Massive 500 Million Account Data Breach
In what could be the largest data breach in history, Yahoo announced today that attackers infiltrated their servers and walked away with account information for at least 500 million users. This stolen information may include names, email addresses, telephone…
Latest news and stories from BleepingComputer.com
Apple releases iOS 10.0.2 to fix Lightning Headphone Dongle Issues
Apple has released iOS 10.0.2 to fix a couple of bugs within the new OS. The main fix is to resolve a bug that caused headphone controls to become unresponsive when plugged into the lightning dongle. [...]
Apple releases iOS 10.0.2 to fix Lightning Headphone Dongle Issues
Apple has released iOS 10.0.2 to fix a couple of bugs within the new OS. The main fix is to resolve a bug that caused headphone controls to become unresponsive when plugged into the lightning dongle. [...]
BleepingComputer
Apple releases iOS 10.0.2 to fix Lightning Headphone Dongle Issues
Apple has released iOS 10.0.2 to fix a couple of bugs within the new OS. The main fix is to resolve a bug that caused headphone controls to become unresponsive when plugged into the lightning dongle.
Latest news and stories from BleepingComputer.com
The Week in Ransomware - September 23 2016 - Cerber, Stampado, Fabiansomware, FenixLocker, and More
This has been the slowest ransomware week in a long time! Thank you devs for giving me some time to do other things! For this week we have some smaller ransomware releases as well as new updates to existing ransomware. We also have the continuing saga of Fabian smacking the Stampado and Apocalypse devs around with new decryptors. [...]
The Week in Ransomware - September 23 2016 - Cerber, Stampado, Fabiansomware, FenixLocker, and More
This has been the slowest ransomware week in a long time! Thank you devs for giving me some time to do other things! For this week we have some smaller ransomware releases as well as new updates to existing ransomware. We also have the continuing saga of Fabian smacking the Stampado and Apocalypse devs around with new decryptors. [...]
BleepingComputer
The Week in Ransomware - September 23 2016 - Cerber, Stampado, Fabiansomware, FenixLocker, and More
This has been the slowest ransomware week in a long time! Thank you devs for giving me some time to do other things! For this week we have some smaller ransomware releases as well as new updates to existing ransomware. We also have the continuing saga of…
Latest news and stories from BleepingComputer.com
The Nagini Ransomware sics Voldemort On Your Files
The Nagini Ransomware was discovered that takes its name from pet snake belonging to the the Harry Potter villain Voldemort. The addition of pop culture themes into ransomware infections has become a popular theme over the past month. [...]
The Nagini Ransomware sics Voldemort On Your Files
The Nagini Ransomware was discovered that takes its name from pet snake belonging to the the Harry Potter villain Voldemort. The addition of pop culture themes into ransomware infections has become a popular theme over the past month. [...]
BleepingComputer
The Nagini Ransomware sics Voldemort On Your Files
The Nagini Ransomware was discovered that takes its name from pet snake belonging to the the Harry Potter villain Voldemort. The addition of pop culture themes into ransomware infections has become a popular theme over the past month.
Latest news and stories from BleepingComputer.com
The Donald Trump Ransomware tries to Build Walls around your Files
With all the buzz around tonight's Presidential Debate between Hillary Clinton and Donald Trump, I decided to see if I could find any malware based around these polarizing candidates. Though I did not find anything related to Hillary Clinton, I did stumble upon a development version of the Donald Trump Ransomware. [...]
The Donald Trump Ransomware tries to Build Walls around your Files
With all the buzz around tonight's Presidential Debate between Hillary Clinton and Donald Trump, I decided to see if I could find any malware based around these polarizing candidates. Though I did not find anything related to Hillary Clinton, I did stumble upon a development version of the Donald Trump Ransomware. [...]
BleepingComputer
The Donald Trump Ransomware tries to Build Walls around your Files
With all the buzz around tonight's Presidential Debate between Hillary Clinton and Donald Trump, I decided to see if I could find any malware based around these polarizing candidates. Though I did not find anything related to Hillary Clinton, I did stumble…
Latest news and stories from BleepingComputer.com
Locky Ransomware now uses the .ODIN extension for Encrypted Files
Today a new Locky Ransomware variant was discovered by @dvk01uk that now uses the .ODIN extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Odin Ransomware. You are instead infected by Locky, which is using the .ODIN extension. There is a difference. [...]
Locky Ransomware now uses the .ODIN extension for Encrypted Files
Today a new Locky Ransomware variant was discovered by @dvk01uk that now uses the .ODIN extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Odin Ransomware. You are instead infected by Locky, which is using the .ODIN extension. There is a difference. [...]
BleepingComputer
Locky Ransomware now uses the .ODIN extension for Encrypted Files
Today a new Locky Ransomware variant was discovered by @dvk01uk that now uses the .ODIN extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Odin Ransomware. You are instead infected…
Latest news and stories from BleepingComputer.com
Tech Support Scam allows Developers to Remotely Execute Commands
A new tech support scam Trojan is actively being distributed that allows the malware developers to remotely execute commands on an infected computer. [...]
Tech Support Scam allows Developers to Remotely Execute Commands
A new tech support scam Trojan is actively being distributed that allows the malware developers to remotely execute commands on an infected computer. [...]
BleepingComputer
Tech Support Scam allows Developers to Remotely Execute Commands
A new tech support scam Trojan is actively being distributed that allows the malware developers to remotely execute commands on an infected computer.
Latest news and stories from BleepingComputer.com
Windows 10 Insider Preview Build 14936 for PC & Mobile Released
Microsoft has released Windows 10 Insider Preview Build 14936 for PC and Mobile to Insiders on the fast ring. This build contains a preview of the Turn Off the Lights, Tampermonkey, and Microsoft Personal Shopping Assistant extensions for Edge, changes to the Windows Subsystem for Linux, and information on issues caused by MS16-110. [...]
Windows 10 Insider Preview Build 14936 for PC & Mobile Released
Microsoft has released Windows 10 Insider Preview Build 14936 for PC and Mobile to Insiders on the fast ring. This build contains a preview of the Turn Off the Lights, Tampermonkey, and Microsoft Personal Shopping Assistant extensions for Edge, changes to the Windows Subsystem for Linux, and information on issues caused by MS16-110. [...]
BleepingComputer
Windows 10 Insider Preview Build 14936 for PC & Mobile Released
Microsoft has released Windows 10 Insider Preview Build 14936 for PC and Mobile to Insiders on the fast ring. This build contains a preview of the Turn Off the Lights, Tampermonkey, and Microsoft Personal Shopping Assistant extensions for Edge, changes to…
Latest news and stories from BleepingComputer.com
Introducing Her Royal Highness, the Princess Locker Ransomware
Today we bring you Princess Locker; the ransomware only royalty could love. First discovered by Michael Gillespie, Princess Locker encrypts a victim's data and then demands a hefty ransom amount of 3 bitcoins, or approximately $1,800 USD, to purchase a decryptor. [...]
Introducing Her Royal Highness, the Princess Locker Ransomware
Today we bring you Princess Locker; the ransomware only royalty could love. First discovered by Michael Gillespie, Princess Locker encrypts a victim's data and then demands a hefty ransom amount of 3 bitcoins, or approximately $1,800 USD, to purchase a decryptor. [...]
BleepingComputer
Introducing Her Royal Highness, the Princess Locker Ransomware
Today we bring you Princess Locker; the ransomware only royalty could love. First discovered by Michael Gillespie, Princess Locker encrypts a victim's data and then demands a hefty ransom amount of 3 bitcoins, or approximately $1,800 USD, to purchase a decryptor.
Latest news and stories from BleepingComputer.com
Kaspersky decrypts Ransomware from TeamXRat
Kaspersky posted a great article about their TeamXrat Ransomware analysis and how they were able to create a decryptor for its victims. Reported back in mid September in our forums, I and other security researchers were never able to find an actual sample of the malware. [...]
Kaspersky decrypts Ransomware from TeamXRat
Kaspersky posted a great article about their TeamXrat Ransomware analysis and how they were able to create a decryptor for its victims. Reported back in mid September in our forums, I and other security researchers were never able to find an actual sample of the malware. [...]
BleepingComputer
Kaspersky decrypts Ransomware from TeamXRat
Kaspersky posted a great article about their TeamXrat Ransomware analysis and how they were able to create a decryptor for its victims. Reported back in mid September in our forums, I and other security researchers were never able to find an actual sample…
Latest news and stories from BleepingComputer.com
The Week in Ransomware - September 30 2016 - Princess Locker, Locky switching to ODIN, Decryptors, and More!
This week really picked up when it comes to ransomware news. Lots of new variants, new decryptors, and new ransomware. Of particular interest this week is Locky switching to using the ODIN extension and for security companies releasing a lot of decryptors this week. [...]
The Week in Ransomware - September 30 2016 - Princess Locker, Locky switching to ODIN, Decryptors, and More!
This week really picked up when it comes to ransomware news. Lots of new variants, new decryptors, and new ransomware. Of particular interest this week is Locky switching to using the ODIN extension and for security companies releasing a lot of decryptors this week. [...]
BleepingComputer
The Week in Ransomware - September 30 2016 - Princess Locker, Locky switching to ODIN, Decryptors, and More!
This week really picked up when it comes to ransomware news. Lots of new variants, new decryptors, and new ransomware. Of particular interest this week is Locky switching to using the ODIN extension and for security companies releasing a lot of decryptors…
Latest news and stories from BleepingComputer.com
Google Chrome 53.0.2785.143 m fixes Remote Code Execution Vulnerabilities
Version 53.0.2785.143 m of Google Chrome was released today that fixes for 2 remote code execution vulnerabilities that were submitted to Pwnium. Remote code execution vulnerabilities are considered critical as it could allow attackers and malicious web sites to remotely execute any command they wish on an affected computer. [...]
Google Chrome 53.0.2785.143 m fixes Remote Code Execution Vulnerabilities
Version 53.0.2785.143 m of Google Chrome was released today that fixes for 2 remote code execution vulnerabilities that were submitted to Pwnium. Remote code execution vulnerabilities are considered critical as it could allow attackers and malicious web sites to remotely execute any command they wish on an affected computer. [...]
BleepingComputer
Google Chrome 53.0.2785.143 m fixes Remote Code Execution Vulnerabilities
Version 53.0.2785.143 m of Google Chrome was released today that fixes for 2 remote code execution vulnerabilities that were submitted to Pwnium. Remote code execution vulnerabilities are considered critical as it could allow attackers and malicious web sites…
Latest news and stories from BleepingComputer.com
Hacked Steam accounts spreading Remote Access Trojan
A Remote Access Trojan is being distributed through hacked Steam Accounts sending SPAM that contain download links to the Trojan. Once the Trojan is installed, it will allow the attacker to gain full access to the computer and all the files contained on it. [...]
Hacked Steam accounts spreading Remote Access Trojan
A Remote Access Trojan is being distributed through hacked Steam Accounts sending SPAM that contain download links to the Trojan. Once the Trojan is installed, it will allow the attacker to gain full access to the computer and all the files contained on it. [...]
BleepingComputer
Hacked Steam accounts spreading Remote Access Trojan
A Remote Access Trojan is being distributed through hacked Steam Accounts sending SPAM that contain download links to the Trojan. Once the Trojan is installed, it will allow the attacker to gain full access to the computer and all the files contained on it.
Latest news and stories from BleepingComputer.com
Cerber Ransomware switches to a Random Extension and Ends Database Processes
Late last week, a new version of Cerber Ransomware was released that included some new features. The most notable change is the switch from the static .Cerber3 extension for encrypted files to a random 4 character extension, the use of a HTA file as the ransom note, and the termination of various database processes before encryption. [...]
Cerber Ransomware switches to a Random Extension and Ends Database Processes
Late last week, a new version of Cerber Ransomware was released that included some new features. The most notable change is the switch from the static .Cerber3 extension for encrypted files to a random 4 character extension, the use of a HTA file as the ransom note, and the termination of various database processes before encryption. [...]
BleepingComputer
Cerber Ransomware switches to a Random Extension and Ends Database Processes
Late last week, a new version of Cerber Ransomware was released that included some new features. The most notable change is the switch from the static .Cerber3 extension for encrypted files to a random 4 character extension, the use of a HTA file as the ransom…
Latest news and stories from BleepingComputer.com
WildFire rises from the grave as the rebranded Hades Locker
The WildFire Locker ransomware has risen from the dead and rebranded itself using the name of Hades Locker. Its previous incarnation was shutdown after authorities seized the command & control servers. Unfortunately, the ransomware developers were not apprehended and have been biding their time before releasing a new ransomware. [...]
WildFire rises from the grave as the rebranded Hades Locker
The WildFire Locker ransomware has risen from the dead and rebranded itself using the name of Hades Locker. Its previous incarnation was shutdown after authorities seized the command & control servers. Unfortunately, the ransomware developers were not apprehended and have been biding their time before releasing a new ransomware. [...]
BleepingComputer
WildFire rises from the grave as the rebranded Hades Locker
The WildFire Locker ransomware has risen from the dead and rebranded itself using the name of Hades Locker. Its previous incarnation was shutdown after authorities seized the command & control servers. Unfortunately, the ransomware developers were not apprehended…
Latest news and stories from BleepingComputer.com
Malwarebytes going to battle with PUPs and Adware
Today, Marcin Kleczynski, the Chief Executive Officer of Malwarebytes, announced in a blog post that Malwarebytes is going to battle with PUPs (Potentially Unwanted Programs) and thus the companies that make them. [...]
Malwarebytes going to battle with PUPs and Adware
Today, Marcin Kleczynski, the Chief Executive Officer of Malwarebytes, announced in a blog post that Malwarebytes is going to battle with PUPs (Potentially Unwanted Programs) and thus the companies that make them. [...]
BleepingComputer
Malwarebytes going to battle with PUPs and Adware
Today, Marcin Kleczynski, the Chief Executive Officer of Malwarebytes, announced in a blog post that Malwarebytes is going to battle with PUPs (Potentially Unwanted Programs) and thus the companies that make them.
Latest news and stories from BleepingComputer.com
Tech Support Scams use new Tricks to Hold Browsers Hostage
With malvertising and shady advertisers, it is becoming all to common to run into browser based tech support scams that try to trick you into calling a remote support number. These scams continue to evolve and use new and innovative approaches to prevent users from closing their browsers. [...]
Tech Support Scams use new Tricks to Hold Browsers Hostage
With malvertising and shady advertisers, it is becoming all to common to run into browser based tech support scams that try to trick you into calling a remote support number. These scams continue to evolve and use new and innovative approaches to prevent users from closing their browsers. [...]
BleepingComputer
Tech Support Scams use new Tricks to Hold Browsers Hostage
With malvertising and shady advertisers, it is becoming all to common to run into browser based tech support scams that try to trick you into calling a remote support number. These scams continue to evolve and use new and innovative approaches to prevent…