Linux Has a USB Driver Security Problem
USB drivers included in the Linux kernel are rife with security flaws that in some cases can be exploited to run untrusted code and take over users' computers. [...]
https://www.bleepingcomputer.com/news/security/linux-has-a-usb-driver-security-problem/
USB drivers included in the Linux kernel are rife with security flaws that in some cases can be exploited to run untrusted code and take over users' computers. [...]
https://www.bleepingcomputer.com/news/security/linux-has-a-usb-driver-security-problem/
BleepingComputer
Linux Has a USB Driver Security Problem
USB drivers included in the Linux kernel are rife with security flaws that in some cases can be exploited to run untrusted code and take over users' computers.
Amazon Updates AWS Dashboard to Warn Admins When They're Exposing S3 Buckets
Following a long string of data leaks caused by misconfigured S3 servers, Amazon has decided to add a visible warning to the AWS backend dashboard panel that will let server admins know if one of their buckets (storage environments) is publicly accessible and exposing potentially sensitive data on the Internet. [...]
https://www.bleepingcomputer.com/news/security/amazon-updates-aws-dashboard-to-warn-admins-when-theyre-exposing-s3-buckets/
Following a long string of data leaks caused by misconfigured S3 servers, Amazon has decided to add a visible warning to the AWS backend dashboard panel that will let server admins know if one of their buckets (storage environments) is publicly accessible and exposing potentially sensitive data on the Internet. [...]
https://www.bleepingcomputer.com/news/security/amazon-updates-aws-dashboard-to-warn-admins-when-theyre-exposing-s3-buckets/
BleepingComputer
Amazon Updates AWS Dashboard to Warn Admins When They're Exposing S3 Buckets
Following a long string of data leaks caused by misconfigured S3 servers, Amazon has decided to add a visible warning to the AWS backend dashboard panel that will let server admins know if one of their buckets (storage environments) is publicly accessibleβ¦
Intel's Secret CPU-On-Chip Management Engine (ME) Runs on MINIX OS
One of the world's lesser-known operating systems may actually be the most used OS in the world, according to new revelations made by Google's Linux experts. [...]
https://www.bleepingcomputer.com/news/hardware/intels-secret-cpu-on-chip-management-engine-me-runs-on-minix-os/
One of the world's lesser-known operating systems may actually be the most used OS in the world, according to new revelations made by Google's Linux experts. [...]
https://www.bleepingcomputer.com/news/hardware/intels-secret-cpu-on-chip-management-engine-me-runs-on-minix-os/
BleepingComputer
Intel's Secret CPU-On-Chip Management Engine (ME) Runs on MINIX OS
One of the world's lesser-known operating systems may actually be the most used OS in the world, according to new revelations made by Google's Linux experts.
Here's What You Need to Know About Mozilla's New Firefox Browser Coming Next Week
In less than a week, Mozilla will flip the switch on a completely new browser with the release of Firefox 57, a version that's been rebuilt with a new browser engine core, a new user interface, revamped settings panel, and with a new add-ons API. [...]
https://www.bleepingcomputer.com/news/software/heres-what-you-need-to-know-about-mozillas-new-firefox-browser-coming-next-week/
In less than a week, Mozilla will flip the switch on a completely new browser with the release of Firefox 57, a version that's been rebuilt with a new browser engine core, a new user interface, revamped settings panel, and with a new add-ons API. [...]
https://www.bleepingcomputer.com/news/software/heres-what-you-need-to-know-about-mozillas-new-firefox-browser-coming-next-week/
BleepingComputer
Here's What You Need to Know About Mozilla's New Firefox Browser Coming Next Week
In less than a week, Mozilla will flip the switch on a completely new browser with the release of Firefox 57, a version that's been rebuilt with a new browser engine core, a new user interface, revamped settings panel, and with a new add-ons API.
Logitech Will Intentionally Brick All Harmony Link Devices Next Year
Logitech will intentionally brick all Harmony Link universal hubs next year, on March 16, 2018. The company has emailed all Harmony Link customers with the bad news. [...]
https://www.bleepingcomputer.com/news/hardware/logitech-will-intentionally-brick-all-harmony-link-devices-next-year/
Logitech will intentionally brick all Harmony Link universal hubs next year, on March 16, 2018. The company has emailed all Harmony Link customers with the bad news. [...]
https://www.bleepingcomputer.com/news/hardware/logitech-will-intentionally-brick-all-harmony-link-devices-next-year/
BleepingComputer
Logitech Will Intentionally Brick All Harmony Link Devices Next Year
Logitech will intentionally brick all Harmony Link universal hubs next year, on March 16, 2018. The company has emailed all Harmony Link customers with the bad news.
Hacker Wannabes Fooled by Backdoored IP Scanner
Wannabe hackers looking to create their very own Reaper botnet might have gotten more than they asked when they downloaded an IP scanner over the past few weeks. [...]
https://www.bleepingcomputer.com/news/security/hacker-wannabes-fooled-by-backdoored-ip-scanner/
Wannabe hackers looking to create their very own Reaper botnet might have gotten more than they asked when they downloaded an IP scanner over the past few weeks. [...]
https://www.bleepingcomputer.com/news/security/hacker-wannabes-fooled-by-backdoored-ip-scanner/
BleepingComputer
Hacker Wannabes Fooled by Backdoored IP Scanner
Wannabe hackers looking to create their very own Reaper botnet might have gotten more than they asked when they downloaded an IP scanner over the past few weeks.
Cryptojacking Craze: Malwarebytes Says It Blocks 8 Million Requests per Day
The in-browser cryptojacking craze that has taken over the Internet is getting worse by the day and more and more sites are implementing such systems, intentionally or after getting hacked. [...]
https://www.bleepingcomputer.com/news/security/cryptojacking-craze-malwarebytes-says-it-blocks-8-million-requests-per-day/
The in-browser cryptojacking craze that has taken over the Internet is getting worse by the day and more and more sites are implementing such systems, intentionally or after getting hacked. [...]
https://www.bleepingcomputer.com/news/security/cryptojacking-craze-malwarebytes-says-it-blocks-8-million-requests-per-day/
BleepingComputer
Cryptojacking Craze: Malwarebytes Says It Blocks 8 Million Requests per Day
The in-browser cryptojacking craze that has taken over the Internet is getting worse by the day and more and more sites are implementing such systems, intentionally or after getting hacked.
Windows 10 Insider Build 17035 for PC Introduces the Near Share Sharing Feature
Today Microsoft released Insider Preview Build 17035 for PC to insiders on the fast ring and to those who opted to Skip Ahead. This build will not be made available to computers that have an AMD processor due to a known bug that causes these computers to bugcheck during an upgrade. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-17035-for-pc-introduces-the-near-share-sharing-feature/
Today Microsoft released Insider Preview Build 17035 for PC to insiders on the fast ring and to those who opted to Skip Ahead. This build will not be made available to computers that have an AMD processor due to a known bug that causes these computers to bugcheck during an upgrade. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-17035-for-pc-introduces-the-near-share-sharing-feature/
BleepingComputer
Windows 10 Insider Build 17035 for PC Introduces the Near Share Sharing Feature
Today Microsoft released Insider Preview Build 17035 for PC to insiders on the fast ring and to those who opted to Skip Ahead. This build will not be made available to computers that have an AMD processor due to a known bug that causes these computers toβ¦
Google Adds New Features in Chrome to Fight Malvertising
Google announced plans today for three new Chrome security features that will block websites from sneakily redirecting users to new URLs without the user or website owner's consent. One of these features has the potential to stop malvertising attacks. [...]
https://www.bleepingcomputer.com/news/security/google-adds-new-features-in-chrome-to-fight-malvertising/
Google announced plans today for three new Chrome security features that will block websites from sneakily redirecting users to new URLs without the user or website owner's consent. One of these features has the potential to stop malvertising attacks. [...]
https://www.bleepingcomputer.com/news/security/google-adds-new-features-in-chrome-to-fight-malvertising/
BleepingComputer
Google Adds New Features in Chrome to Fight Malvertising
Google announced plans today for three new Chrome security features that will block websites from sneakily redirecting users to new URLs without the user or website owner's consent. One of these features has the potential to stop malvertising attacks.
Stock Trader Accused of Hacking Brokerage Firms and Placing Illegal Trades
The Department of Justice has filed an indictment against Joseph Willner, 42, of Ambler, Pennsylvania, accusing the day trader of hacking into brokerage accounts at various financial companies and placing unauthorized trades. [...]
https://www.bleepingcomputer.com/news/security/stock-trader-accused-of-hacking-brokerage-firms-and-placing-illegal-trades/
The Department of Justice has filed an indictment against Joseph Willner, 42, of Ambler, Pennsylvania, accusing the day trader of hacking into brokerage accounts at various financial companies and placing unauthorized trades. [...]
https://www.bleepingcomputer.com/news/security/stock-trader-accused-of-hacking-brokerage-firms-and-placing-illegal-trades/
BleepingComputer
Stock Trader Accused of Hacking Brokerage Firms and Placing Illegal Trades
The Department of Justice has filed an indictment against Joseph Willner, 42, of Ambler, Pennsylvania, accusing the day trader of hacking into brokerage accounts at various financial companies and placing unauthorized trades.
Ordinypt Ransomware Intentionally Destroys Files, Currently Targeting Germany
A new ransomware strain called Ordinypt is currently active in Germany, but instead of encrypting users' documents, the ransomware rewrites files with random data. [...]
https://www.bleepingcomputer.com/news/security/ordinypt-ransomware-intentionally-destroys-files-currently-targeting-germany/
A new ransomware strain called Ordinypt is currently active in Germany, but instead of encrypting users' documents, the ransomware rewrites files with random data. [...]
https://www.bleepingcomputer.com/news/security/ordinypt-ransomware-intentionally-destroys-files-currently-targeting-germany/
BleepingComputer
Ordinypt Ransomware Intentionally Destroys Files, Currently Targeting Germany
A new ransomware strain called Ordinypt is currently active in Germany, but instead of encrypting users' documents, the ransomware rewrites files with random data.
"Eavesdropper" Vulnerability Exposes Millions of Private Conversations
Security researchers have discovered that tens of developers have left API credentials in hundreds of applications built around the Twilio service. [...]
https://www.bleepingcomputer.com/news/security/-eavesdropper-vulnerability-exposes-millions-of-private-conversations/
Security researchers have discovered that tens of developers have left API credentials in hundreds of applications built around the Twilio service. [...]
https://www.bleepingcomputer.com/news/security/-eavesdropper-vulnerability-exposes-millions-of-private-conversations/
BleepingComputer
"Eavesdropper" Vulnerability Exposes Millions of Private Conversations
Security researchers have discovered that tens of developers have left API credentials in hundreds of applications built around the Twilio service.
WikiLeaks Releases Source Code of CIA Cyber-Weapon
WikiLeaks published the first-ever batch of source code for CIA cyber-weapons. The source code released today is for a toolkit named Hive, a so-called implant framework, a system that allows CIA operatives to control the malware it deploys on infected computers. [...]
https://www.bleepingcomputer.com/news/government/wikileaks-releases-source-code-of-cia-cyber-weapon/
WikiLeaks published the first-ever batch of source code for CIA cyber-weapons. The source code released today is for a toolkit named Hive, a so-called implant framework, a system that allows CIA operatives to control the malware it deploys on infected computers. [...]
https://www.bleepingcomputer.com/news/government/wikileaks-releases-source-code-of-cia-cyber-weapon/
BleepingComputer
WikiLeaks Releases Source Code of CIA Cyber-Weapon
WikiLeaks published the first-ever batch of source code for CIA cyber-weapons. The source code released today is for a toolkit named Hive, a so-called implant framework, a system that allows CIA operatives to control the malware it deploys on infected computers.
Google Ranks Phishing Above Keyloggers & Password Reuse as Bigger Threat to Users
Research carried out by Google engineers and academics from the University of California, Berkeley and the International Computer Science Institute has revealed that phishing attacks pose a more significant threat to users losing access to their Google accounts when compared to keyloggers or password reuse. [...]
https://www.bleepingcomputer.com/news/security/google-ranks-phishing-above-keyloggers-and-password-reuse-as-bigger-threat-to-users/
Research carried out by Google engineers and academics from the University of California, Berkeley and the International Computer Science Institute has revealed that phishing attacks pose a more significant threat to users losing access to their Google accounts when compared to keyloggers or password reuse. [...]
https://www.bleepingcomputer.com/news/security/google-ranks-phishing-above-keyloggers-and-password-reuse-as-bigger-threat-to-users/
BleepingComputer
Google Ranks Phishing Above Keyloggers & Password Reuse as Bigger Threat to Users
Research carried out by Google engineers and academics from the University of California, Berkeley and the International Computer Science Institute has revealed that phishing attacks pose a more significant threat to users losing access to their Google accountsβ¦
Avira Introduces SafeThings to Protect your Network's IOT Devices
Avira has announced a new security solution called SmartThings that aims to protect consumers from the lack of security found in most Internet of Things devices. [...]
https://www.bleepingcomputer.com/news/security/avira-introduces-safethings-to-protect-your-networks-iot-devices/
Avira has announced a new security solution called SmartThings that aims to protect consumers from the lack of security found in most Internet of Things devices. [...]
https://www.bleepingcomputer.com/news/security/avira-introduces-safethings-to-protect-your-networks-iot-devices/
BleepingComputer
Avira Introduces SafeThings to Protect your Network's IOT Devices
Avira has announced a new security solution called SmartThings that aims to protect consumers from the lack of security found in most Internet of Things devices.
LockCrypt Ransomware Crew Started via Satan RaaS, Now Deploying Their Own Strain
Since June this year, a group of cyber-criminals has been breaking into unsecured enterprise servers via RDP brute-force attacks and manually installing a new type of ransomware called LockCrypt. [...]
https://www.bleepingcomputer.com/news/security/lockcrypt-ransomware-crew-started-via-satan-raas-now-deploying-their-own-strain/
Since June this year, a group of cyber-criminals has been breaking into unsecured enterprise servers via RDP brute-force attacks and manually installing a new type of ransomware called LockCrypt. [...]
https://www.bleepingcomputer.com/news/security/lockcrypt-ransomware-crew-started-via-satan-raas-now-deploying-their-own-strain/
BleepingComputer
LockCrypt Ransomware Crew Started via Satan RaaS, Now Deploying Their Own Strain
Since June this year, a group of cyber-criminals has been breaking into unsecured enterprise servers via RDP brute-force attacks and manually installing a new type of ransomware called LockCrypt.
First Android Malware Detected Using New "Toast Overlay" Attack
A theoretical attack described by security researchers at the start of September has been integrated into a live malware distribution campaign for the first time. [...]
https://www.bleepingcomputer.com/news/security/first-android-malware-detected-using-new-toast-overlay-attack/
A theoretical attack described by security researchers at the start of September has been integrated into a live malware distribution campaign for the first time. [...]
https://www.bleepingcomputer.com/news/security/first-android-malware-detected-using-new-toast-overlay-attack/
BleepingComputer
First Android Malware Detected Using New "Toast Overlay" Attack
A theoretical attack described by security researchers at the start of September has been integrated into a live malware distribution campaign for the first time.
Man Uses DDoS-for-Hire Services to Attack Former Employer, Taunts Firm via Email
Court documents obtained by Bleeping Computer reveal that the FBI has charged a Minnesota man for launching hundreds of DDoS attacks on companies all over the world, including his former employers and business partners. [...]
https://www.bleepingcomputer.com/news/security/man-uses-ddos-for-hire-services-to-attack-former-employer-taunts-firm-via-email/
Court documents obtained by Bleeping Computer reveal that the FBI has charged a Minnesota man for launching hundreds of DDoS attacks on companies all over the world, including his former employers and business partners. [...]
https://www.bleepingcomputer.com/news/security/man-uses-ddos-for-hire-services-to-attack-former-employer-taunts-firm-via-email/
BleepingComputer
Man Uses DDoS-for-Hire Services to Attack Former Employer, Taunts Firm via Email
Court documents obtained by Bleeping Computer reveal that the FBI has charged a Minnesota man for launching hundreds of DDoS attacks on companies all over the world, including his former employers and business partners.
New Cobra Crysis Ransomware Variant Released
A new variant of the Crysis ransomware has been discovered that appends the cobra extension to encrypted files. While this ransomware cannot be decrypted for free, this article will take a look at the infection and provide possible methods to try to restore files. [...]
https://www.bleepingcomputer.com/news/security/new-cobra-crysis-ransomware-variant-released/
A new variant of the Crysis ransomware has been discovered that appends the cobra extension to encrypted files. While this ransomware cannot be decrypted for free, this article will take a look at the infection and provide possible methods to try to restore files. [...]
https://www.bleepingcomputer.com/news/security/new-cobra-crysis-ransomware-variant-released/
BleepingComputer
New Cobra Crysis Ransomware Variant Released
A new variant of the Crysis ransomware has been discovered that appends the cobra extension to encrypted files. While this ransomware cannot be decrypted for free, this article will take a look at the infection and provide possible methods to try to restoreβ¦
Antivirus Engine Design Flaw Helps Malware Sink Its Teeth Into Your System
Several antivirus products are affected by a design flaw that allows malware or a local attacker to abuse the "restore from quarantine" feature to send previously detected malware to sensitive areas of the user's operating system, helping the malware gain boot persistence with elevated privileges. [...]
https://www.bleepingcomputer.com/news/security/antivirus-engine-design-flaw-helps-malware-sink-its-teeth-into-your-system/
Several antivirus products are affected by a design flaw that allows malware or a local attacker to abuse the "restore from quarantine" feature to send previously detected malware to sensitive areas of the user's operating system, helping the malware gain boot persistence with elevated privileges. [...]
https://www.bleepingcomputer.com/news/security/antivirus-engine-design-flaw-helps-malware-sink-its-teeth-into-your-system/
BleepingComputer
Antivirus Engine Design Flaw Helps Malware Sink Its Teeth Into Your System
Several antivirus products are affected by a design flaw that allows malware or a local attacker to abuse the "restore from quarantine" feature to send previously detected malware to sensitive areas of the user's operating system, helping the malware gainβ¦
The Week in Ransomware - November 10th 2017 - Ordinypt & LockCrypt
Mostly small silly variants released this week, but we did have a few interesting stories. The bigger stories include a new variant from Crysis released, a wiper disguised as a ransomware targeting companies in Germany, and hackers using RDP to install the LockCrypt ransomware. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-10th-2017-ordinypt-and-lockcrypt/
Mostly small silly variants released this week, but we did have a few interesting stories. The bigger stories include a new variant from Crysis released, a wiper disguised as a ransomware targeting companies in Germany, and hackers using RDP to install the LockCrypt ransomware. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-10th-2017-ordinypt-and-lockcrypt/