BleepingComputer
10.3K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Computers, Smartphones Can Be Used as a Sonar-Like Tracking System

New research published this week by researchers from the University of Washington shows how an attacker could track a user's movements using speakers and microphones that come with computers, laptops, tablets, smartphones, and other devices. [...]

https://www.bleepingcomputer.com/news/security/computers-smartphones-can-be-used-as-a-sonar-like-tracking-system/
New ERROR CryptoMix Ransomware Variant Released

Today, BleepingComputer discovered a new variant of the CryptoMix ransomware that is appending the .ERROR extension to encrypted file names. This article will provide a brief summary of what has changed in this new variant. [...]

https://www.bleepingcomputer.com/news/security/new-error-cryptomix-ransomware-variant-released/
Tsunami of DDoS-for-Hire Platforms Coming From the East

Over the past six months, a large number of DDoS-for-hire platforms β€” also known as DDoS booters or DDoS stressors β€” have appeared in China, all sporting the same interface, and seeming to be based on the same source code. [...]

https://www.bleepingcomputer.com/news/security/tsunami-of-ddos-for-hire-platforms-coming-from-the-east/
The Week in Ransomware - August 18th 2017 - SyncCrypt, GlobeImposter, & Locky

While the week was dominated by small little ransomware creations, we did have some interesting news. First, we have had a resurgence of Locky variants, then a constant stream of GlobeImposter variants variants, and finally the SynCrypt ransomware that utilizes an interesting distribution method. [...]

https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-18th-2017-synccrypt-globeimposter-and-locky/
Secret Chips Can Be Hidden in Replacement Parts to Spy and Take Over Smartphones

At a recently concluded security conference, experts from an Israeli university have presented new research that describes a possible attack scenario which leverages replacement parts to carry out attacks on smartphones and other smart devices. [...]

https://www.bleepingcomputer.com/news/security/secret-chips-can-be-hidden-in-replacement-parts-to-spy-and-take-over-smartphones/
Researchers Win $100,000 for New Spear-Phishing Detection Method

Facebook has awarded this year's Internet Defense Prize worth $100,000 to a team of researchers from the University of California, Berkeley, who came up with a new method of detecting spear-phishing attacks in closely monitored enterprise networks. [...]

https://www.bleepingcomputer.com/news/security/researchers-win-100-000-for-new-spear-phishing-detection-method/