Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies — inaudible to human ears — to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-use-ultrasounds-to-take-control-of-alexa-siri-cortana-others/
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies — inaudible to human ears — to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-use-ultrasounds-to-take-control-of-alexa-siri-cortana-others/
BleepingComputer
Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies — inaudible to human ears — to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even…
Researchers Hack Voting Machines Used in German Elections
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. [...]
https://www.bleepingcomputer.com/news/government/researchers-hack-voting-machines-used-in-german-elections/
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. [...]
https://www.bleepingcomputer.com/news/government/researchers-hack-voting-machines-used-in-german-elections/
BleepingComputer
Researchers Hack Voting Machines Used in German Elections
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort.
Researchers Reveal New Toast Overlay Attack on Android Devices
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service — often used to take over users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/researchers-reveal-new-toast-overlay-attack-on-android-devices/
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service — often used to take over users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/researchers-reveal-new-toast-overlay-attack-on-android-devices/
BleepingComputer
Researchers Reveal New Toast Overlay Attack on Android Devices
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service — often used to take over users' smartphones.
European Union Considering Intrusive Upload Filter as "Link Tax" Alternative
A document leaked at the end of August reveal that Estonia — currently holding the EU Presidency — is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China. [...]
https://www.bleepingcomputer.com/news/legal/european-union-considering-intrusive-upload-filter-as-link-tax-alternative/
A document leaked at the end of August reveal that Estonia — currently holding the EU Presidency — is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China. [...]
https://www.bleepingcomputer.com/news/legal/european-union-considering-intrusive-upload-filter-as-link-tax-alternative/
BleepingComputer
European Union Considering Intrusive Upload Filter as "Link Tax" Alternative
A document leaked at the end of August reveal that Estonia — currently holding the EU Presidency — is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China.
Highly Sensitive Details of 143 Million Users Stolen in Equifax Hack
Equifax — one of the largest providers of consumer credit reporting and other financial services in the US — said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers. [...]
https://www.bleepingcomputer.com/news/security/highly-sensitive-details-of-143-million-users-stolen-in-equifax-hack/
Equifax — one of the largest providers of consumer credit reporting and other financial services in the US — said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers. [...]
https://www.bleepingcomputer.com/news/security/highly-sensitive-details-of-143-million-users-stolen-in-equifax-hack/
BleepingComputer
Highly Sensitive Details of 143 Million Users Stolen in Equifax Hack
Equifax — one of the largest providers of consumer credit reporting and other financial services in the US — said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers.
Android Oreo Bug Bypasses WiFi to Use Mobile Data and Incur Extra Costs
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled. [...]
https://www.bleepingcomputer.com/news/mobile/android-oreo-bug-bypasses-wifi-to-use-mobile-data-and-incur-extra-costs/
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled. [...]
https://www.bleepingcomputer.com/news/mobile/android-oreo-bug-bypasses-wifi-to-use-mobile-data-and-incur-extra-costs/
BleepingComputer
Android Oreo Bug Bypasses WiFi to Use Mobile Data and Incur Extra Costs
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled.
The Week in Ransomware - September 8th 2017 - Locky and Small Releases
We have good news for once, which is a really slow week when it comes to ransomware. While we still had our share of smaller ransomware variants being release, overall there was not a lot of activity. The biggest activity is the continued by Locky distributors to become more widespread through the use of a variety of SPAM campaigns. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-8th-2017-locky-and-small-releases/
We have good news for once, which is a really slow week when it comes to ransomware. While we still had our share of smaller ransomware variants being release, overall there was not a lot of activity. The biggest activity is the continued by Locky distributors to become more widespread through the use of a variety of SPAM campaigns. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-8th-2017-locky-and-small-releases/
BleepingComputer
The Week in Ransomware - September 8th 2017 - Locky and Small Releases
We have good news for once, which is a really slow week when it comes to ransomware. While we still had our share of smaller ransomware variants being release, overall there was not a lot of activity. The biggest activity is the continued by Locky distributors…
Firefox 57 Will Hide Search Bar and Use a Uni-Bar Approach, Like Chrome
[...]
https://www.bleepingcomputer.com/news/software/firefox-57-will-hide-search-bar-and-use-a-uni-bar-approach-like-chrome/
[...]
https://www.bleepingcomputer.com/news/software/firefox-57-will-hide-search-bar-and-use-a-uni-bar-approach-like-chrome/
BleepingComputer
Firefox 57 Will Hide Search Bar and Use a Uni-Bar Approach, Like Chrome
Mozilla will hide an iconic section of its UI — the search bar — and will use one singular input bar atop the browser, similar to the approach of most Chromium browsers.
Malware Group Uses Facebook CDN to Bypass Security Solutions
A malware group is using Facebook's CDN servers to store malicious files that it later uses to infect users with banking trojans. [...]
https://www.bleepingcomputer.com/news/security/malware-group-uses-facebook-cdn-to-bypass-security-solutions/
A malware group is using Facebook's CDN servers to store malicious files that it later uses to infect users with banking trojans. [...]
https://www.bleepingcomputer.com/news/security/malware-group-uses-facebook-cdn-to-bypass-security-solutions/
BleepingComputer
Malware Group Uses Facebook CDN to Bypass Security Solutions
A malware group is using Facebook's CDN servers to store malicious files that it later uses to infect users with banking trojans.
Researcher Publishes Details on Unpatched D-Link Router Flaws
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers. [...]
https://www.bleepingcomputer.com/news/security/researcher-publishes-details-on-unpatched-d-link-router-flaws/
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers. [...]
https://www.bleepingcomputer.com/news/security/researcher-publishes-details-on-unpatched-d-link-router-flaws/
BleepingComputer
Researcher Publishes Details on Unpatched D-Link Router Flaws
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers.
Google Chrome Will Soon Warn You of Software That Performs MitM Attacks
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user's Internet connection. [...]
https://www.bleepingcomputer.com/news/security/google-chrome-will-soon-warn-you-of-software-that-performs-mitm-attacks/
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user's Internet connection. [...]
https://www.bleepingcomputer.com/news/security/google-chrome-will-soon-warn-you-of-software-that-performs-mitm-attacks/
BleepingComputer
Google Chrome Will Soon Warn You of Software That Performs MitM Attacks
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user's Internet connection.
Bitcoin Price Takes a Tumble Amid Rumors of China Banning Cryptocurrency Trading
Bitcoin price took a huge fall on Friday after Caixin, a Chinese financial magazine, reported that Chinese Central Bank officials are working on rules to ban the trading of Bitcoin and all other cryptocurrencies on Chinese exchanges. [...]
https://www.bleepingcomputer.com/news/government/bitcoin-price-takes-a-tumble-amid-rumors-of-china-banning-cryptocurrency-trading/
Bitcoin price took a huge fall on Friday after Caixin, a Chinese financial magazine, reported that Chinese Central Bank officials are working on rules to ban the trading of Bitcoin and all other cryptocurrencies on Chinese exchanges. [...]
https://www.bleepingcomputer.com/news/government/bitcoin-price-takes-a-tumble-amid-rumors-of-china-banning-cryptocurrency-trading/
BleepingComputer
Bitcoin Price Takes a Tumble Amid Rumors of China Banning Cryptocurrency Trading
Bitcoin price took a huge fall on Friday after Caixin, a Chinese financial magazine, reported that Chinese Central Bank officials are working on rules to ban the trading of Bitcoin and all other cryptocurrencies on Chinese exchanges.
Admin Accounts With No Passwords at the Heart of Recent MongoDB Ransom Attacks
The recent wave of ransom attacks on MongoDB databases happened because database owners forgot to set passwords on their administrator accounts, according to Davi Ottenheimer, Senior Director of Product Security at MongoDB, Inc. [...]
https://www.bleepingcomputer.com/news/security/admin-accounts-with-no-passwords-at-the-heart-of-recent-mongodb-ransom-attacks/
The recent wave of ransom attacks on MongoDB databases happened because database owners forgot to set passwords on their administrator accounts, according to Davi Ottenheimer, Senior Director of Product Security at MongoDB, Inc. [...]
https://www.bleepingcomputer.com/news/security/admin-accounts-with-no-passwords-at-the-heart-of-recent-mongodb-ransom-attacks/
BleepingComputer
Admin Accounts With No Passwords at the Heart of Recent MongoDB Ransom Attacks
The recent wave of ransom attacks on MongoDB databases happened because database owners forgot to set passwords on their administrator accounts, according to Davi Ottenheimer, Senior Director of Product Security at MongoDB, Inc.
Intra-Library Collusion Attacks Open the Door for a Whole New Kind of Android Malware
A team of Oxford and Cambridge researchers is the latest to join a chorus of voices sounding the alarm on a new attack vector named Intra-Library Collusion (ILC) that could make identifying Android malware much harder in the upcoming future. [...]
https://www.bleepingcomputer.com/news/security/intra-library-collusion-attacks-open-the-door-for-a-whole-new-kind-of-android-malware/
A team of Oxford and Cambridge researchers is the latest to join a chorus of voices sounding the alarm on a new attack vector named Intra-Library Collusion (ILC) that could make identifying Android malware much harder in the upcoming future. [...]
https://www.bleepingcomputer.com/news/security/intra-library-collusion-attacks-open-the-door-for-a-whole-new-kind-of-android-malware/
BleepingComputer
Intra-Library Collusion Attacks Open the Door for a Whole New Kind of Android Malware
A team of Oxford and Cambridge researchers is the latest to join a chorus of voices sounding the alarm on a new attack vector named Intra-Library Collusion (ILC) that could make identifying Android malware much harder in the upcoming future.
Google Accused of Trying to Patent Public Domain Technology
A Polish academic is accusing Google of trying to patent technology he invented and that he purposely released into the public domain so companies like Google couldn't trap it inside restrictive licenses. [...]
https://www.bleepingcomputer.com/news/google/google-accused-of-trying-to-patent-public-domain-technology/
A Polish academic is accusing Google of trying to patent technology he invented and that he purposely released into the public domain so companies like Google couldn't trap it inside restrictive licenses. [...]
https://www.bleepingcomputer.com/news/google/google-accused-of-trying-to-patent-public-domain-technology/
BleepingComputer
Google Accused of Trying to Patent Public Domain Technology
A Polish academic is accusing Google of trying to patent technology he invented and that he purposely released into the public domain so companies like Google couldn't trap it inside restrictive licenses.
Paradise Ransomware Uses RSA Encryption to Encrypt Your Files
Today, a victim of a new ransomware called Paradise posted in our forums and uploaded a sample so we could take a look at it. While this ransomware is not revolutionary by any means, since it is in active distribution and a Ransomware as a Service (RaaS), I thought I would provide a brief analysis of how this ransomware works. [...]
https://www.bleepingcomputer.com/news/security/paradise-ransomware-uses-rsa-encryption-to-encrypt-your-files/
Today, a victim of a new ransomware called Paradise posted in our forums and uploaded a sample so we could take a look at it. While this ransomware is not revolutionary by any means, since it is in active distribution and a Ransomware as a Service (RaaS), I thought I would provide a brief analysis of how this ransomware works. [...]
https://www.bleepingcomputer.com/news/security/paradise-ransomware-uses-rsa-encryption-to-encrypt-your-files/
BleepingComputer
Paradise Ransomware Uses RSA Encryption to Encrypt Your Files
Today, a victim of a new ransomware called Paradise posted in our forums and uploaded a sample so we could take a look at it. While this ransomware is not revolutionary by any means, since it is in active distribution and a Ransomware as a Service (RaaS)…
Apache Struts Vulnerabilities May Affect Many of Cisco's Products
Cisco has initiated a mass security audit of all its products that incorporate a version of the Apache Struts framework, recently affected by a series of vulnerabilities, one of which is under active exploitation. [...]
https://www.bleepingcomputer.com/news/security/apache-struts-vulnerabilities-may-affect-many-of-ciscos-products/
Cisco has initiated a mass security audit of all its products that incorporate a version of the Apache Struts framework, recently affected by a series of vulnerabilities, one of which is under active exploitation. [...]
https://www.bleepingcomputer.com/news/security/apache-struts-vulnerabilities-may-affect-many-of-ciscos-products/
BleepingComputer
Apache Struts Vulnerabilities May Affect Many of Cisco's Products
Cisco has initiated a mass security audit of all its products that incorporate a version of the Apache Struts framework, recently affected by a series of vulnerabilities, one of which is under active exploitation.
Comodo Caught Breaking New CAA Standard One Day After It Went Into Effect
One day after the CAA (Certificate Authority Authorization) standard became obligatory on September 8, a German security researcher caught Comodo breaking the rules and issuing an SSL certificate it was not supposed to issue. [...]
https://www.bleepingcomputer.com/news/security/comodo-caught-breaking-new-caa-standard-one-day-after-it-went-into-effect/
One day after the CAA (Certificate Authority Authorization) standard became obligatory on September 8, a German security researcher caught Comodo breaking the rules and issuing an SSL certificate it was not supposed to issue. [...]
https://www.bleepingcomputer.com/news/security/comodo-caught-breaking-new-caa-standard-one-day-after-it-went-into-effect/
BleepingComputer
Comodo Caught Breaking New CAA Standard One Day After It Went Into Effect
One day after the CAA (Certificate Authority Authorization) standard became obligatory on September 8, a German security researcher caught Comodo breaking the rules and issuing an SSL certificate it was not supposed to issue.
Bashware: Malware Can Abuse Windows 10's Linux Shell to Bypass Security Software
Bashware is the name of a new technique that allows malware to use a new Windows 10 feature called Subsystem for Linux (WSL) to bypass security software installed on an endpoint. [...]
https://www.bleepingcomputer.com/news/security/bashware-malware-can-abuse-windows-10s-linux-shell-to-bypass-security-software/
Bashware is the name of a new technique that allows malware to use a new Windows 10 feature called Subsystem for Linux (WSL) to bypass security software installed on an endpoint. [...]
https://www.bleepingcomputer.com/news/security/bashware-malware-can-abuse-windows-10s-linux-shell-to-bypass-security-software/
BleepingComputer
Bashware: Malware Can Abuse Windows 10's Linux Shell to Bypass Security Software
Bashware is the name of a new technique that allows malware to use a new Windows 10 feature called Subsystem for Linux (WSL) to bypass security software installed on an endpoint.
Over 1.65 Million Computers Infected With Cryptocurrency Miners in 2017 So Far
Telemetry data collected by Kaspersky Lab shows that in the first nine months of 2017, malware that mines for various types of cryptocurrencies has infected more than 1.65 million endpoints. [...]
https://www.bleepingcomputer.com/news/security/over-1-65-million-computers-infected-with-cryptocurrency-miners-in-2017-so-far/
Telemetry data collected by Kaspersky Lab shows that in the first nine months of 2017, malware that mines for various types of cryptocurrencies has infected more than 1.65 million endpoints. [...]
https://www.bleepingcomputer.com/news/security/over-1-65-million-computers-infected-with-cryptocurrency-miners-in-2017-so-far/
BleepingComputer
Over 1.65 Million Computers Infected With Cryptocurrency Miners in 2017 So Far
Telemetry data collected by Kaspersky Lab shows that in the first nine months of 2017, malware that mines for various types of cryptocurrencies has infected more than 1.65 million endpoints.
BlueBorne Vulnerabilities Impact Over 5 Billion Bluetooth-Enabled Devices
Security researchers have discovered eight vulnerabilities — codenamed collectively as BlueBorne — in the Bluetooth implementations used by over 5.3 billion devices. [...]
https://www.bleepingcomputer.com/news/security/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices/
Security researchers have discovered eight vulnerabilities — codenamed collectively as BlueBorne — in the Bluetooth implementations used by over 5.3 billion devices. [...]
https://www.bleepingcomputer.com/news/security/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices/
BleepingComputer
BlueBorne Vulnerabilities Impact Over 5 Billion Bluetooth-Enabled Devices
Security researchers have discovered eight vulnerabilities — codenamed collectively as BlueBorne — in the Bluetooth implementations used by over 5.3 billion devices.