Lenovo Gets a Slap on the Wrist for Superfish Adware Scandal
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015. [...]
https://www.bleepingcomputer.com/news/technology/lenovo-gets-a-slap-on-the-wrist-for-superfish-adware-scandal/
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015. [...]
https://www.bleepingcomputer.com/news/technology/lenovo-gets-a-slap-on-the-wrist-for-superfish-adware-scandal/
BleepingComputer
Lenovo Gets a Slap on the Wrist for Superfish Adware Scandal
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015.
UK's Facial Recognition System Dumber Than a Box of Rocks, Privacy Group Argues
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurate and painfully crude." [...]
https://www.bleepingcomputer.com/news/security/uks-facial-recognition-system-dumber-than-a-box-of-rocks-privacy-group-argues/
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurate and painfully crude." [...]
https://www.bleepingcomputer.com/news/security/uks-facial-recognition-system-dumber-than-a-box-of-rocks-privacy-group-argues/
BleepingComputer
UK's Facial Recognition System Dumber Than a Box of Rocks, Privacy Group Argues
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurateβ¦
Sabotage Warning Issued on Hackers Hiding Deep Inside Energy Sector
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wished to. [...]
https://www.bleepingcomputer.com/news/security/sabotage-warning-issued-on-hackers-hiding-deep-inside-energy-sector/
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wished to. [...]
https://www.bleepingcomputer.com/news/security/sabotage-warning-issued-on-hackers-hiding-deep-inside-energy-sector/
BleepingComputer
Sabotage Warning Issued on Hackers Hiding Deep Inside Energy Sector
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wishedβ¦
Malware Author Uses Same Skype ID to Run IoT Botnet and Apply for Jobs
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-uses-same-skype-id-to-run-iot-botnet-and-apply-for-jobs/
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-uses-same-skype-id-to-run-iot-botnet-and-apply-for-jobs/
BleepingComputer
Malware Author Uses Same Skype ID to Run IoT Botnet and Apply for Jobs
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals.
CodeFork Group Uses Fileless Malware to Deploy Monero Miners
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions. [...]
https://www.bleepingcomputer.com/news/security/codefork-group-uses-fileless-malware-to-deploy-monero-miners/
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions. [...]
https://www.bleepingcomputer.com/news/security/codefork-group-uses-fileless-malware-to-deploy-monero-miners/
BleepingComputer
CodeFork Group Uses Fileless Malware to Deploy Monero Miners
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions.
Bug in Windows Kernel Could Prevent Security Software From Identifying Malware
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime. [...]
https://www.bleepingcomputer.com/news/security/bug-in-windows-kernel-could-prevent-security-software-from-identifying-malware/
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime. [...]
https://www.bleepingcomputer.com/news/security/bug-in-windows-kernel-could-prevent-security-software-from-identifying-malware/
BleepingComputer
Bug in Windows Kernel Could Prevent Security Software From Identifying Malware
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime.
Apple and Google Fix Browser Bug. Microsoft Does Not.
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively. [...]
https://www.bleepingcomputer.com/news/security/apple-and-google-fix-browser-bug-microsoft-does-not-/
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively. [...]
https://www.bleepingcomputer.com/news/security/apple-and-google-fix-browser-bug-microsoft-does-not-/
BleepingComputer
Apple and Google Fix Browser Bug. Microsoft Does Not.
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively.
13-Year-Old Detained for Selling "Prank" Screen Locker
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device. [...]
https://www.bleepingcomputer.com/news/security/13-year-old-detained-for-selling-prank-screen-locker/
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device. [...]
https://www.bleepingcomputer.com/news/security/13-year-old-detained-for-selling-prank-screen-locker/
BleepingComputer
13-Year-Old Detained for Selling "Prank" Screen Locker
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device.
Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-use-ultrasounds-to-take-control-of-alexa-siri-cortana-others/
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-use-ultrasounds-to-take-control-of-alexa-siri-cortana-others/
BleepingComputer
Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or evenβ¦
Researchers Hack Voting Machines Used in German Elections
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. [...]
https://www.bleepingcomputer.com/news/government/researchers-hack-voting-machines-used-in-german-elections/
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. [...]
https://www.bleepingcomputer.com/news/government/researchers-hack-voting-machines-used-in-german-elections/
BleepingComputer
Researchers Hack Voting Machines Used in German Elections
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort.
Researchers Reveal New Toast Overlay Attack on Android Devices
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/researchers-reveal-new-toast-overlay-attack-on-android-devices/
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/researchers-reveal-new-toast-overlay-attack-on-android-devices/
BleepingComputer
Researchers Reveal New Toast Overlay Attack on Android Devices
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones.
European Union Considering Intrusive Upload Filter as "Link Tax" Alternative
A document leaked at the end of August reveal that Estonia β currently holding the EU Presidency β is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China. [...]
https://www.bleepingcomputer.com/news/legal/european-union-considering-intrusive-upload-filter-as-link-tax-alternative/
A document leaked at the end of August reveal that Estonia β currently holding the EU Presidency β is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China. [...]
https://www.bleepingcomputer.com/news/legal/european-union-considering-intrusive-upload-filter-as-link-tax-alternative/
BleepingComputer
European Union Considering Intrusive Upload Filter as "Link Tax" Alternative
A document leaked at the end of August reveal that Estonia β currently holding the EU Presidency β is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China.
Highly Sensitive Details of 143 Million Users Stolen in Equifax Hack
Equifax β one of the largest providers of consumer credit reporting and other financial services in the US β said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers. [...]
https://www.bleepingcomputer.com/news/security/highly-sensitive-details-of-143-million-users-stolen-in-equifax-hack/
Equifax β one of the largest providers of consumer credit reporting and other financial services in the US β said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers. [...]
https://www.bleepingcomputer.com/news/security/highly-sensitive-details-of-143-million-users-stolen-in-equifax-hack/
BleepingComputer
Highly Sensitive Details of 143 Million Users Stolen in Equifax Hack
Equifax β one of the largest providers of consumer credit reporting and other financial services in the US β said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers.
Android Oreo Bug Bypasses WiFi to Use Mobile Data and Incur Extra Costs
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled. [...]
https://www.bleepingcomputer.com/news/mobile/android-oreo-bug-bypasses-wifi-to-use-mobile-data-and-incur-extra-costs/
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled. [...]
https://www.bleepingcomputer.com/news/mobile/android-oreo-bug-bypasses-wifi-to-use-mobile-data-and-incur-extra-costs/
BleepingComputer
Android Oreo Bug Bypasses WiFi to Use Mobile Data and Incur Extra Costs
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled.
The Week in Ransomware - September 8th 2017 - Locky and Small Releases
We have good news for once, which is a really slow week when it comes to ransomware. While we still had our share of smaller ransomware variants being release, overall there was not a lot of activity. The biggest activity is the continued by Locky distributors to become more widespread through the use of a variety of SPAM campaigns. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-8th-2017-locky-and-small-releases/
We have good news for once, which is a really slow week when it comes to ransomware. While we still had our share of smaller ransomware variants being release, overall there was not a lot of activity. The biggest activity is the continued by Locky distributors to become more widespread through the use of a variety of SPAM campaigns. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-8th-2017-locky-and-small-releases/
BleepingComputer
The Week in Ransomware - September 8th 2017 - Locky and Small Releases
We have good news for once, which is a really slow week when it comes to ransomware. While we still had our share of smaller ransomware variants being release, overall there was not a lot of activity. The biggest activity is the continued by Locky distributorsβ¦
Firefox 57 Will Hide Search Bar and Use a Uni-Bar Approach, Like Chrome
[...]
https://www.bleepingcomputer.com/news/software/firefox-57-will-hide-search-bar-and-use-a-uni-bar-approach-like-chrome/
[...]
https://www.bleepingcomputer.com/news/software/firefox-57-will-hide-search-bar-and-use-a-uni-bar-approach-like-chrome/
BleepingComputer
Firefox 57 Will Hide Search Bar and Use a Uni-Bar Approach, Like Chrome
Mozilla will hide an iconic section of its UI β the search bar β and will use one singular input bar atop the browser, similar to the approach of most Chromium browsers.
Malware Group Uses Facebook CDN to Bypass Security Solutions
A malware group is using Facebook's CDN servers to store malicious files that it later uses to infect users with banking trojans. [...]
https://www.bleepingcomputer.com/news/security/malware-group-uses-facebook-cdn-to-bypass-security-solutions/
A malware group is using Facebook's CDN servers to store malicious files that it later uses to infect users with banking trojans. [...]
https://www.bleepingcomputer.com/news/security/malware-group-uses-facebook-cdn-to-bypass-security-solutions/
BleepingComputer
Malware Group Uses Facebook CDN to Bypass Security Solutions
A malware group is using Facebook's CDN servers to store malicious files that it later uses to infect users with banking trojans.
Researcher Publishes Details on Unpatched D-Link Router Flaws
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers. [...]
https://www.bleepingcomputer.com/news/security/researcher-publishes-details-on-unpatched-d-link-router-flaws/
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers. [...]
https://www.bleepingcomputer.com/news/security/researcher-publishes-details-on-unpatched-d-link-router-flaws/
BleepingComputer
Researcher Publishes Details on Unpatched D-Link Router Flaws
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers.
Google Chrome Will Soon Warn You of Software That Performs MitM Attacks
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user's Internet connection. [...]
https://www.bleepingcomputer.com/news/security/google-chrome-will-soon-warn-you-of-software-that-performs-mitm-attacks/
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user's Internet connection. [...]
https://www.bleepingcomputer.com/news/security/google-chrome-will-soon-warn-you-of-software-that-performs-mitm-attacks/
BleepingComputer
Google Chrome Will Soon Warn You of Software That Performs MitM Attacks
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user's Internet connection.
Bitcoin Price Takes a Tumble Amid Rumors of China Banning Cryptocurrency Trading
Bitcoin price took a huge fall on Friday after Caixin, a Chinese financial magazine, reported that Chinese Central Bank officials are working on rules to ban the trading of Bitcoin and all other cryptocurrencies on Chinese exchanges. [...]
https://www.bleepingcomputer.com/news/government/bitcoin-price-takes-a-tumble-amid-rumors-of-china-banning-cryptocurrency-trading/
Bitcoin price took a huge fall on Friday after Caixin, a Chinese financial magazine, reported that Chinese Central Bank officials are working on rules to ban the trading of Bitcoin and all other cryptocurrencies on Chinese exchanges. [...]
https://www.bleepingcomputer.com/news/government/bitcoin-price-takes-a-tumble-amid-rumors-of-china-banning-cryptocurrency-trading/
BleepingComputer
Bitcoin Price Takes a Tumble Amid Rumors of China Banning Cryptocurrency Trading
Bitcoin price took a huge fall on Friday after Caixin, a Chinese financial magazine, reported that Chinese Central Bank officials are working on rules to ban the trading of Bitcoin and all other cryptocurrencies on Chinese exchanges.
Admin Accounts With No Passwords at the Heart of Recent MongoDB Ransom Attacks
The recent wave of ransom attacks on MongoDB databases happened because database owners forgot to set passwords on their administrator accounts, according to Davi Ottenheimer, Senior Director of Product Security at MongoDB, Inc. [...]
https://www.bleepingcomputer.com/news/security/admin-accounts-with-no-passwords-at-the-heart-of-recent-mongodb-ransom-attacks/
The recent wave of ransom attacks on MongoDB databases happened because database owners forgot to set passwords on their administrator accounts, according to Davi Ottenheimer, Senior Director of Product Security at MongoDB, Inc. [...]
https://www.bleepingcomputer.com/news/security/admin-accounts-with-no-passwords-at-the-heart-of-recent-mongodb-ransom-attacks/
BleepingComputer
Admin Accounts With No Passwords at the Heart of Recent MongoDB Ransom Attacks
The recent wave of ransom attacks on MongoDB databases happened because database owners forgot to set passwords on their administrator accounts, according to Davi Ottenheimer, Senior Director of Product Security at MongoDB, Inc.