Six-Year-Old "Loop Bug" Re-Discovered to Affect Almost All Major PDF Viewers
A bug discovered in an obscure PDF parsing library back in 2011 is also present in most of today's top PDF viewers, according to German software developer Hanno BΓΆck. [...]
https://www.bleepingcomputer.com/news/software/six-year-old-loop-bug-re-discovered-to-affect-almost-all-major-pdf-viewers/
A bug discovered in an obscure PDF parsing library back in 2011 is also present in most of today's top PDF viewers, according to German software developer Hanno BΓΆck. [...]
https://www.bleepingcomputer.com/news/software/six-year-old-loop-bug-re-discovered-to-affect-almost-all-major-pdf-viewers/
BleepingComputer
Six-Year-Old "Loop Bug" Re-Discovered to Affect Almost All Major PDF Viewers
A bug discovered in an obscure PDF parsing library back in 2011 is also present in most of today's top PDF viewers, according to German software developer Hanno BΓΆck.
YouTube-MP3.Org Will Shut Down Following RIAA Lawsuit
YouTube-MP3.org β the largest YouTube ripping service on the Internet β has agreed to shut down permanently as part of a settlement it reached with the Recording Industry Association of America (RIAA) in a lawsuit the organization filed last year. [...]
https://www.bleepingcomputer.com/news/technology/youtube-mp3-org-will-shut-down-following-riaa-lawsuit/
YouTube-MP3.org β the largest YouTube ripping service on the Internet β has agreed to shut down permanently as part of a settlement it reached with the Recording Industry Association of America (RIAA) in a lawsuit the organization filed last year. [...]
https://www.bleepingcomputer.com/news/technology/youtube-mp3-org-will-shut-down-following-riaa-lawsuit/
BleepingComputer
YouTube-MP3.Org Will Shut Down Following RIAA Lawsuit
YouTube-MP3.org β the largest YouTube ripping service on the Internet β has agreed to shut down permanently as part of a settlement it reached with the Recording Industry Association of America (RIAA) in a lawsuit the organization filed last year.
Chinese Man Sentenced to Nine Months in Prison for Selling VPN Software
Chinese authorities have sentenced a young man to nine months in prison for setting up a website for selling VPN software to Chinese users. [...]
https://www.bleepingcomputer.com/news/government/chinese-man-sentenced-to-nine-months-in-prison-for-selling-vpn-software/
Chinese authorities have sentenced a young man to nine months in prison for setting up a website for selling VPN software to Chinese users. [...]
https://www.bleepingcomputer.com/news/government/chinese-man-sentenced-to-nine-months-in-prison-for-selling-vpn-software/
BleepingComputer
Chinese Man Sentenced to Nine Months in Prison for Selling VPN Software
Chinese authorities have sentenced a young man to nine months in prison for setting up a website for selling VPN software to Chinese users.
Opera and Vivaldi Founder Believes Google Should Be Regulated
Jon von Tetzchner, the founder of both Opera and Vivaldi, believes that Google has gotten too big and "is now in a position where regulation is needed." [...]
https://www.bleepingcomputer.com/news/google/opera-and-vivaldi-founder-believes-google-should-be-regulated/
Jon von Tetzchner, the founder of both Opera and Vivaldi, believes that Google has gotten too big and "is now in a position where regulation is needed." [...]
https://www.bleepingcomputer.com/news/google/opera-and-vivaldi-founder-believes-google-should-be-regulated/
BleepingComputer
Opera and Vivaldi Founder Believes Google Should Be Regulated
Jon von Tetzchner, the founder of both Opera and Vivaldi, believes that Google has gotten too big and "is now in a position where regulation is needed."
TrustZone Downgrade Attack Opens Android Devices to Old Vulnerabilities
An attacker can downgrade components of the Android TrustZone technology to older versions that feature known vulnerabilities and use older exploits against smartphones running an up-to-date operating system. [...]
https://www.bleepingcomputer.com/news/security/trustzone-downgrade-attack-opens-android-devices-to-old-vulnerabilities/
An attacker can downgrade components of the Android TrustZone technology to older versions that feature known vulnerabilities and use older exploits against smartphones running an up-to-date operating system. [...]
https://www.bleepingcomputer.com/news/security/trustzone-downgrade-attack-opens-android-devices-to-old-vulnerabilities/
BleepingComputer
TrustZone Downgrade Attack Opens Android Devices to Old Vulnerabilities
An attacker can downgrade components of the Android TrustZone technology to older versions that feature known vulnerabilities and use older exploits against smartphones running an up-to-date operating system.
Companies Must Tell Employees When Monitoring Their PC Activity, EU Court Rules
EU companies must notify employees in advance if they plan to monitor work accounts, the European Court of Human Rights ruled this week. [...]
https://www.bleepingcomputer.com/news/legal/companies-must-tell-employees-when-monitoring-their-pc-activity-eu-court-rules/
EU companies must notify employees in advance if they plan to monitor work accounts, the European Court of Human Rights ruled this week. [...]
https://www.bleepingcomputer.com/news/legal/companies-must-tell-employees-when-monitoring-their-pc-activity-eu-court-rules/
BleepingComputer
Companies Must Tell Employees When Monitoring Their PC Activity, EU Court Rules
EU companies must notify employees in advance if they plan to monitor work accounts, the European Court of Human Rights ruled this week.
SynAck Ransomware Sees Huge Spike in Activity
Over the past two days, there was an increase in activity from a relatively unknown ransomware strain named SynAck, according to submissions to the ID-Ransomware service and users who complained on the Bleeping Computer ransomware support forums. [...]
https://www.bleepingcomputer.com/news/security/synack-ransomware-sees-huge-spike-in-activity/
Over the past two days, there was an increase in activity from a relatively unknown ransomware strain named SynAck, according to submissions to the ID-Ransomware service and users who complained on the Bleeping Computer ransomware support forums. [...]
https://www.bleepingcomputer.com/news/security/synack-ransomware-sees-huge-spike-in-activity/
BleepingComputer
SynAck Ransomware Sees Huge Spike in Activity
Over the past two days, there was an increase in activity from a relatively unknown ransomware strain named SynAck, according to submissions to the ID-Ransomware service and users who complained on the Bleeping Computer ransomware support forums.
Google Chrome 61 Released for Linux, Mac, and Windows
Today Google launched version 61 of the Chrome browser for Windows, Mac, and Linux. With this release, we have 21 security updates, numerous improvements and bug fixes, and three APIs that allow developers to further enhance their sites and apps. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-61-released-for-linux-mac-and-windows/
Today Google launched version 61 of the Chrome browser for Windows, Mac, and Linux. With this release, we have 21 security updates, numerous improvements and bug fixes, and three APIs that allow developers to further enhance their sites and apps. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-61-released-for-linux-mac-and-windows/
BleepingComputer
Google Chrome 61 Released for Linux, Mac, and Windows
Today Google launched version 61 of the Chrome browser for Windows, Mac, and Linux. With this release, we have 21 security updates, numerous improvements and bug fixes, and three APIs that allow developers to further enhance their sites and apps.
Last Windows Server Insider Build Released Before Ignite Conference
Today Microsoft released Windows Server Insider Preview Build 16278 to Windows Insiders. This build is the last Server build that will be released before the Ignite conference at the end of September, where the official Windows Server Version 1709 will be released. While there are no new features released as part of this build. [...]
https://www.bleepingcomputer.com/news/microsoft/last-windows-server-insider-build-released-before-ignite-conference/
Today Microsoft released Windows Server Insider Preview Build 16278 to Windows Insiders. This build is the last Server build that will be released before the Ignite conference at the end of September, where the official Windows Server Version 1709 will be released. While there are no new features released as part of this build. [...]
https://www.bleepingcomputer.com/news/microsoft/last-windows-server-insider-build-released-before-ignite-conference/
BleepingComputer
Last Windows Server Insider Build Released Before Ignite Conference
Today Microsoft released Windows Server Insider Preview Build 16278 to Windows Insiders. This build is the last Server build that will be released before the Ignite conference at the end of September, where the official Windows Server Version 1709 will beβ¦
New Apache Struts Vulnerability Puts Many Fortune Companies at Risk
An estimated 65% of Fortune 100 companies could be vulnerable to a security bug discovered in Apache Struts, a popular Java MVC framework used in the development of many top-grade enterprise applications. [...]
https://www.bleepingcomputer.com/news/security/new-apache-struts-vulnerability-puts-many-fortune-companies-at-risk/
An estimated 65% of Fortune 100 companies could be vulnerable to a security bug discovered in Apache Struts, a popular Java MVC framework used in the development of many top-grade enterprise applications. [...]
https://www.bleepingcomputer.com/news/security/new-apache-struts-vulnerability-puts-many-fortune-companies-at-risk/
BleepingComputer
New Apache Struts Vulnerability Puts Many Fortune Companies at Risk
An estimated 65% of Fortune 100 companies could be vulnerable to a security bug discovered in Apache Struts, a popular Java MVC framework used in the development of many top-grade enterprise applications.
Lenovo Gets a Slap on the Wrist for Superfish Adware Scandal
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015. [...]
https://www.bleepingcomputer.com/news/technology/lenovo-gets-a-slap-on-the-wrist-for-superfish-adware-scandal/
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015. [...]
https://www.bleepingcomputer.com/news/technology/lenovo-gets-a-slap-on-the-wrist-for-superfish-adware-scandal/
BleepingComputer
Lenovo Gets a Slap on the Wrist for Superfish Adware Scandal
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015.
UK's Facial Recognition System Dumber Than a Box of Rocks, Privacy Group Argues
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurate and painfully crude." [...]
https://www.bleepingcomputer.com/news/security/uks-facial-recognition-system-dumber-than-a-box-of-rocks-privacy-group-argues/
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurate and painfully crude." [...]
https://www.bleepingcomputer.com/news/security/uks-facial-recognition-system-dumber-than-a-box-of-rocks-privacy-group-argues/
BleepingComputer
UK's Facial Recognition System Dumber Than a Box of Rocks, Privacy Group Argues
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurateβ¦
Sabotage Warning Issued on Hackers Hiding Deep Inside Energy Sector
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wished to. [...]
https://www.bleepingcomputer.com/news/security/sabotage-warning-issued-on-hackers-hiding-deep-inside-energy-sector/
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wished to. [...]
https://www.bleepingcomputer.com/news/security/sabotage-warning-issued-on-hackers-hiding-deep-inside-energy-sector/
BleepingComputer
Sabotage Warning Issued on Hackers Hiding Deep Inside Energy Sector
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wishedβ¦
Malware Author Uses Same Skype ID to Run IoT Botnet and Apply for Jobs
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-uses-same-skype-id-to-run-iot-botnet-and-apply-for-jobs/
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-uses-same-skype-id-to-run-iot-botnet-and-apply-for-jobs/
BleepingComputer
Malware Author Uses Same Skype ID to Run IoT Botnet and Apply for Jobs
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals.
CodeFork Group Uses Fileless Malware to Deploy Monero Miners
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions. [...]
https://www.bleepingcomputer.com/news/security/codefork-group-uses-fileless-malware-to-deploy-monero-miners/
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions. [...]
https://www.bleepingcomputer.com/news/security/codefork-group-uses-fileless-malware-to-deploy-monero-miners/
BleepingComputer
CodeFork Group Uses Fileless Malware to Deploy Monero Miners
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions.
Bug in Windows Kernel Could Prevent Security Software From Identifying Malware
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime. [...]
https://www.bleepingcomputer.com/news/security/bug-in-windows-kernel-could-prevent-security-software-from-identifying-malware/
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime. [...]
https://www.bleepingcomputer.com/news/security/bug-in-windows-kernel-could-prevent-security-software-from-identifying-malware/
BleepingComputer
Bug in Windows Kernel Could Prevent Security Software From Identifying Malware
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime.
Apple and Google Fix Browser Bug. Microsoft Does Not.
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively. [...]
https://www.bleepingcomputer.com/news/security/apple-and-google-fix-browser-bug-microsoft-does-not-/
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively. [...]
https://www.bleepingcomputer.com/news/security/apple-and-google-fix-browser-bug-microsoft-does-not-/
BleepingComputer
Apple and Google Fix Browser Bug. Microsoft Does Not.
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively.
13-Year-Old Detained for Selling "Prank" Screen Locker
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device. [...]
https://www.bleepingcomputer.com/news/security/13-year-old-detained-for-selling-prank-screen-locker/
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device. [...]
https://www.bleepingcomputer.com/news/security/13-year-old-detained-for-selling-prank-screen-locker/
BleepingComputer
13-Year-Old Detained for Selling "Prank" Screen Locker
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device.
Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-use-ultrasounds-to-take-control-of-alexa-siri-cortana-others/
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-use-ultrasounds-to-take-control-of-alexa-siri-cortana-others/
BleepingComputer
Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or evenβ¦
Researchers Hack Voting Machines Used in German Elections
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. [...]
https://www.bleepingcomputer.com/news/government/researchers-hack-voting-machines-used-in-german-elections/
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. [...]
https://www.bleepingcomputer.com/news/government/researchers-hack-voting-machines-used-in-german-elections/
BleepingComputer
Researchers Hack Voting Machines Used in German Elections
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort.
Researchers Reveal New Toast Overlay Attack on Android Devices
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/researchers-reveal-new-toast-overlay-attack-on-android-devices/
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/researchers-reveal-new-toast-overlay-attack-on-android-devices/
BleepingComputer
Researchers Reveal New Toast Overlay Attack on Android Devices
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones.