Office Equation Editor Security Bug Runs Malicious Code Without User Interaction
Microsoft has patched today a huge security hole in Microsoft Office that could be exploited to run malicious code without user interaction on all Windows versions released in the past 17 years. [...]
https://www.bleepingcomputer.com/news/security/office-equation-editor-security-bug-runs-malicious-code-without-user-interaction/
Microsoft has patched today a huge security hole in Microsoft Office that could be exploited to run malicious code without user interaction on all Windows versions released in the past 17 years. [...]
https://www.bleepingcomputer.com/news/security/office-equation-editor-security-bug-runs-malicious-code-without-user-interaction/
BleepingComputer
Office Equation Editor Security Bug Runs Malicious Code Without User Interaction
Microsoft has patched today a huge security hole in Microsoft Office that could be exploited to run malicious code without user interaction on all Windows versions released in the past 17 years.
Google Play Store Sees Sudden Surge of Malicious Apps
The Google Play Store is seeing a wave of malware-infested apps like never before. Four separate security companies have reported βor are preparing to release reportsβ on malware campaigns currently underway via Android apps available on the Play Store. [...]
https://www.bleepingcomputer.com/news/security/google-play-store-sees-sudden-surge-of-malicious-apps/
The Google Play Store is seeing a wave of malware-infested apps like never before. Four separate security companies have reported βor are preparing to release reportsβ on malware campaigns currently underway via Android apps available on the Play Store. [...]
https://www.bleepingcomputer.com/news/security/google-play-store-sees-sudden-surge-of-malicious-apps/
BleepingComputer
Google Play Store Sees Sudden Surge of Malicious Apps
The Google Play Store is seeing a wave of malware-infested apps like never before. Four separate security companies have reported βor are preparing to release reportsβ on malware campaigns currently underway via Android apps available on the Play Store.
BlueBorne Vulnerability Also Affects 20Mil Amazon Echo and Google Home Devices
Over 20 million Amazon Echo and Google Home devices running on Android and Linux are vulnerable to attacks via the BlueBorne vulnerability, IoT cyber-security firm Armis announced today. [...]
https://www.bleepingcomputer.com/news/security/blueborne-vulnerability-also-affects-20mil-amazon-echo-and-google-home-devices/
Over 20 million Amazon Echo and Google Home devices running on Android and Linux are vulnerable to attacks via the BlueBorne vulnerability, IoT cyber-security firm Armis announced today. [...]
https://www.bleepingcomputer.com/news/security/blueborne-vulnerability-also-affects-20mil-amazon-echo-and-google-home-devices/
BleepingComputer
BlueBorne Vulnerability Also Affects 20Mil Amazon Echo and Google Home Devices
Over 20 million Amazon Echo and Google Home devices running on Android and Linux are vulnerable to attacks via the BlueBorne vulnerability, IoT cyber-security firm Armis announced today.
Blizzard Makes StarCraft 2 Free to Play, Learn How to Get It
Yesterday, the immensely popular real-time strategy game StarCraft II was released as free-to-play. Learn how you can get it and what features are available. [...]
https://www.bleepingcomputer.com/news/security/blizzard-makes-starcraft-2-free-to-play-learn-how-to-get-it/
Yesterday, the immensely popular real-time strategy game StarCraft II was released as free-to-play. Learn how you can get it and what features are available. [...]
https://www.bleepingcomputer.com/news/security/blizzard-makes-starcraft-2-free-to-play-learn-how-to-get-it/
BleepingComputer
Blizzard Makes StarCraft 2 Free to Play, Learn How to Get It
Yesterday, the immensely popular real-time strategy game StarCraft II was released as free-to-play. Learn how you can get it and what features are available.
Second OnePlus Factory App Discovered. This One Dumps Photos, WiFi & GPS Logs
A security researcher has found a second factory app that was included on OnePlus devices delivered to customers, and this one can be abused to dump the user's photos and videos, but also GPS, WiFi, Bluetooth, and various other logs. [...]
https://www.bleepingcomputer.com/news/security/second-oneplus-factory-app-discovered-this-one-dumps-photos-wifi-and-gps-logs/
A security researcher has found a second factory app that was included on OnePlus devices delivered to customers, and this one can be abused to dump the user's photos and videos, but also GPS, WiFi, Bluetooth, and various other logs. [...]
https://www.bleepingcomputer.com/news/security/second-oneplus-factory-app-discovered-this-one-dumps-photos-wifi-and-gps-logs/
BleepingComputer
Second OnePlus Factory App Discovered. This One Dumps Photos, WiFi & GPS Logs
A security researcher has found a second factory app that was included on OnePlus devices delivered to customers, and this one can be abused to dump the user's photos and videos, but also GPS, WiFi, Bluetooth, and various other logs.
Blizzard Makes StarCraft 2 Free to Play, Learn How to Get It
Yesterday, the immensely popular real-time strategy game StarCraft II was released as free-to-play. Learn how you can get it and what features are available. [...]
https://www.bleepingcomputer.com/news/security/blizzard-makes-starcraft-2-free-to-play-learn-how-to-get-it/
Yesterday, the immensely popular real-time strategy game StarCraft II was released as free-to-play. Learn how you can get it and what features are available. [...]
https://www.bleepingcomputer.com/news/security/blizzard-makes-starcraft-2-free-to-play-learn-how-to-get-it/
BleepingComputer
Blizzard Makes StarCraft 2 Free to Play, Learn How to Get It
Yesterday, the immensely popular real-time strategy game StarCraft II was released as free-to-play. Learn how you can get it and what features are available.
Ransomware Targets J. Sterling Morton High School Students
An in-development ransomware has been discovered that is targeting the high school students of the J. Sterling Morton school district in Illinois. [...]
https://www.bleepingcomputer.com/news/security/ransomware-targets-j-sterling-morton-high-school-students/
An in-development ransomware has been discovered that is targeting the high school students of the J. Sterling Morton school district in Illinois. [...]
https://www.bleepingcomputer.com/news/security/ransomware-targets-j-sterling-morton-high-school-students/
BleepingComputer
Ransomware Targets J. Sterling Morton High School Students
An in-development ransomware has been discovered that is targeting the high school students of the J. Sterling Morton school district in Illinois.
New EU Consumer Protection Law Contains a Vague Website Blocking Clause
The European Union (EU) has voted on Tuesday to pass the new Consumer Protection Cooperation regulation, a new EU-wide applicable law that gives extra power to national consumer protection agencies, but which also contains a vaguely worded clause that also grants them the power to block websites without judicial oversight. [...]
https://www.bleepingcomputer.com/news/government/new-eu-consumer-protection-law-contains-a-vague-website-blocking-clause/
The European Union (EU) has voted on Tuesday to pass the new Consumer Protection Cooperation regulation, a new EU-wide applicable law that gives extra power to national consumer protection agencies, but which also contains a vaguely worded clause that also grants them the power to block websites without judicial oversight. [...]
https://www.bleepingcomputer.com/news/government/new-eu-consumer-protection-law-contains-a-vague-website-blocking-clause/
BleepingComputer
New EU Consumer Protection Law Contains a Vague Website Blocking Clause
The European Union (EU) has voted on Tuesday to pass the new Consumer Protection Cooperation regulation, a new EU-wide applicable law that gives extra power to national consumer protection agencies, but which also contains a vaguely worded clause that alsoβ¦
Spam Bots Bombards Victims With Star Wars Quotes and Links to Gambling Apps
In one of the weirdest things you'll hear today, a spam botnet has been randomly selecting text from a Star Wars novel and sending it to victims, alongside with download links to online gambling apps. [...]
https://www.bleepingcomputer.com/news/security/spam-bots-bombards-victims-with-star-wars-quotes-and-links-to-gambling-apps/
In one of the weirdest things you'll hear today, a spam botnet has been randomly selecting text from a Star Wars novel and sending it to victims, alongside with download links to online gambling apps. [...]
https://www.bleepingcomputer.com/news/security/spam-bots-bombards-victims-with-star-wars-quotes-and-links-to-gambling-apps/
BleepingComputer
Spam Bots Bombards Victims With Star Wars Quotes and Links to Gambling Apps
In one of the weirdest things you'll hear today, a spam botnet has been randomly selecting text from a Star Wars novel and sending it to victims, alongside with download links to online gambling apps.
Google Faces Antitrust Investigation in Missouri
Missouri Attorney General Josh Hawley said on Monday in a press conference that his office has issued a subpoena to Google seeking information on the company's business practices. [...]
https://www.bleepingcomputer.com/news/google/google-faces-antitrust-investigation-in-missouri/
Missouri Attorney General Josh Hawley said on Monday in a press conference that his office has issued a subpoena to Google seeking information on the company's business practices. [...]
https://www.bleepingcomputer.com/news/google/google-faces-antitrust-investigation-in-missouri/
BleepingComputer
Google Faces Antitrust Investigation in Missouri
Missouri Attorney General Josh Hawley said on Monday in a press conference that his office has issued a subpoena to Google seeking information on the company's business practices.
Firefox Will Block Navigational Data URIs as Part of an Anti-Phishing Feature
Mozilla will soon block the loading of data URIs in the Firefox navigation bar as part of a crackdown on phishing sites that abuse this protocol. [...]
https://www.bleepingcomputer.com/news/security/firefox-will-block-navigational-data-uris-as-part-of-an-anti-phishing-feature/
Mozilla will soon block the loading of data URIs in the Firefox navigation bar as part of a crackdown on phishing sites that abuse this protocol. [...]
https://www.bleepingcomputer.com/news/security/firefox-will-block-navigational-data-uris-as-part-of-an-anti-phishing-feature/
BleepingComputer
Firefox Will Block Navigational Data URIs as Part of an Anti-Phishing Feature
Mozilla will soon block the loading of data URIs in the Firefox navigation bar as part of a crackdown on phishing sites that abuse this protocol.
Dark Web Shops Are Leaking IPs Left and Right
The takedown of three major Dark Web markets by law enforcement officials over the summer has driven many vendors of illegal products to set up their own shops that, in many cases, are not properly configured and are leaking the underlying server's IP address. [...]
https://www.bleepingcomputer.com/news/security/dark-web-shops-are-leaking-ips-left-and-right/
The takedown of three major Dark Web markets by law enforcement officials over the summer has driven many vendors of illegal products to set up their own shops that, in many cases, are not properly configured and are leaking the underlying server's IP address. [...]
https://www.bleepingcomputer.com/news/security/dark-web-shops-are-leaking-ips-left-and-right/
BleepingComputer
Dark Web Shops Are Leaking IPs Left and Right
The takedown of three major Dark Web markets by law enforcement officials over the summer has driven many vendors of illegal products to set up their own shops that, in many cases, are not properly configured and are leaking the underlying server's IP address.
Malaysian Police Identifies Suspects Behind Massive 46.2 Million Data Breach
Malaysian authorities announced today they had identified the possible authors of a massive data breach that took place a month ago and during which the personal details of 46.2 Malaysians were put up for sale on the Dark Web and various forums. [...]
https://www.bleepingcomputer.com/news/security/malaysian-police-identifies-suspects-behind-massive-46-2-million-data-breach/
Malaysian authorities announced today they had identified the possible authors of a massive data breach that took place a month ago and during which the personal details of 46.2 Malaysians were put up for sale on the Dark Web and various forums. [...]
https://www.bleepingcomputer.com/news/security/malaysian-police-identifies-suspects-behind-massive-46-2-million-data-breach/
BleepingComputer
Malaysian Police Identifies Suspects Behind Massive 46.2 Million Data Breach
Malaysian authorities announced today they had identified the possible authors of a massive data breach that took place a month ago and during which the personal details of 46.2 million Malaysians were put up for sale on the Dark Web and various forums.
Windows 10 Insider Build 17040 for PC Brings New Insert and Join Gestures
Today Microsoft released Insider Preview Build 17035 for PC to insiders on the fast ring and to those who opted to Skip Ahead. The new features in this build revolve around new HDR and Ease of Access settings, keyboard improvements, and handwriting gestures. [...]
https://www.bleepingcomputer.com/news/security/windows-10-insider-build-17040-for-pc-brings-new-insert-and-join-gestures/
Today Microsoft released Insider Preview Build 17035 for PC to insiders on the fast ring and to those who opted to Skip Ahead. The new features in this build revolve around new HDR and Ease of Access settings, keyboard improvements, and handwriting gestures. [...]
https://www.bleepingcomputer.com/news/security/windows-10-insider-build-17040-for-pc-brings-new-insert-and-join-gestures/
BleepingComputer
Windows 10 Insider Build 17040 for PC Brings New Insert and Join Gestures
Today Microsoft released Insider Preview Build 17035 for PC to insiders on the fast ring and to those who opted to Skip Ahead. The new features in this build revolve around new HDR and Ease of Access settings, keyboard improvements, and handwriting gestures.
Senator Asks White House Cyber Chief to Block Malicious Ads on Government Networks
A US senator has asked the White House to look into the threat that malicious ads βalso known as malvertisingβ pose to US government networks and computers. [...]
https://www.bleepingcomputer.com/news/security/senator-asks-white-house-cyber-chief-to-block-malicious-ads-on-government-networks/
A US senator has asked the White House to look into the threat that malicious ads βalso known as malvertisingβ pose to US government networks and computers. [...]
https://www.bleepingcomputer.com/news/security/senator-asks-white-house-cyber-chief-to-block-malicious-ads-on-government-networks/
BleepingComputer
Senator Asks White House Cyber Chief to Block Malicious Ads on Government Networks
A US senator has asked the White House to look into the threat that malicious ads βalso known as malvertisingβ pose to US government networks and computers.
Github Will Warn Developers About Vulnerable Dependencies in Their Projects
GitHub β the Internet largest code hosting service β is rolling out a new security feature through which it hopes to reduce the number of vulnerable projects hosted and distributed through its platform. [...]
https://www.bleepingcomputer.com/news/security/github-will-warn-developers-about-vulnerable-dependencies-in-their-projects/
GitHub β the Internet largest code hosting service β is rolling out a new security feature through which it hopes to reduce the number of vulnerable projects hosted and distributed through its platform. [...]
https://www.bleepingcomputer.com/news/security/github-will-warn-developers-about-vulnerable-dependencies-in-their-projects/
BleepingComputer
Github Will Warn Developers About Vulnerable Dependencies in Their Projects
GitHub β the Internet largest code hosting service β is rolling out a new security feature through which it hopes to reduce the number of vulnerable projects hosted and distributed through its platform.
Oracle Products Affected by Critical JOLDandBLEED Vulnerabilities
Oracle has issued an out-of-band emergency security update to address five vulnerabilities, among which one is rated 10 out of 10 on the CVSSv3 bug severity scale, and a second was rated 9.9 out of 10. [...]
https://www.bleepingcomputer.com/news/security/oracle-products-affected-by-critical-joldandbleed-vulnerabilities/
Oracle has issued an out-of-band emergency security update to address five vulnerabilities, among which one is rated 10 out of 10 on the CVSSv3 bug severity scale, and a second was rated 9.9 out of 10. [...]
https://www.bleepingcomputer.com/news/security/oracle-products-affected-by-critical-joldandbleed-vulnerabilities/
BleepingComputer
Oracle Products Affected by Critical JOLDandBLEED Vulnerabilities
Oracle has issued an out-of-band emergency security update to address five vulnerabilities, among which one is rated 10 out of 10 on the CVSSv3 bug severity scale, and a second was rated 9.9 out of 10.
China Delays Vulnerability Disclosure Process on Important Bugs
The Chinese vulnerability disclosure program is lagging behind when it comes to publishing details about critical flaws and vulnerabilities exploited by Chinese-linked cyber-espionage groups. [...]
https://www.bleepingcomputer.com/news/security/china-delays-vulnerability-disclosure-process-on-important-bugs/
The Chinese vulnerability disclosure program is lagging behind when it comes to publishing details about critical flaws and vulnerabilities exploited by Chinese-linked cyber-espionage groups. [...]
https://www.bleepingcomputer.com/news/security/china-delays-vulnerability-disclosure-process-on-important-bugs/
BleepingComputer
China Delays Vulnerability Disclosure Process on Important Bugs
The Chinese vulnerability disclosure program is lagging behind when it comes to publishing details about critical flaws and vulnerabilities exploited by Chinese-linked cyber-espionage groups.
Germany Bans Kids' Smartwatches, Classifies Them as Illegal Spying Devices
Germany's Federal Network Agency (Bundesnetzagentur), the country's telecommunications agency, has banned the sale of children's smartwatches after it classified such devices as "prohibited listening devices." [...]
https://www.bleepingcomputer.com/news/government/germany-bans-kids-smartwatches-classifies-them-as-illegal-spying-devices/
Germany's Federal Network Agency (Bundesnetzagentur), the country's telecommunications agency, has banned the sale of children's smartwatches after it classified such devices as "prohibited listening devices." [...]
https://www.bleepingcomputer.com/news/government/germany-bans-kids-smartwatches-classifies-them-as-illegal-spying-devices/
BleepingComputer
Germany Bans Kids' Smartwatches, Classifies Them as Illegal Spying Devices
Germany's Federal Network Agency (Bundesnetzagentur), the country's telecommunications agency, has banned the sale of children's smartwatches after it classified such devices as "prohibited listening devices."
#AskACISO Interview with Bob Turner, CISO of the University of Wisconsin-Madison
As part of my goal to becoming a Chief Information Security Office in the future, I have been conducting interviews with CISOs to gain insight and advice based on their experiences in this position. In this edition of the #AskACISO Interviews, I interviewed Bob Turner, the CISO of the University of Wisconsin-Madison. [...]
https://www.bleepingcomputer.com/editorial/security/askaciso-interview-with-bob-turner-ciso-of-the-university-of-wisconsin-madison/
As part of my goal to becoming a Chief Information Security Office in the future, I have been conducting interviews with CISOs to gain insight and advice based on their experiences in this position. In this edition of the #AskACISO Interviews, I interviewed Bob Turner, the CISO of the University of Wisconsin-Madison. [...]
https://www.bleepingcomputer.com/editorial/security/askaciso-interview-with-bob-turner-ciso-of-the-university-of-wisconsin-madison/
BleepingComputer
#AskACISO Interview with Bob Turner, CISO of the University of Wisconsin-Madison
As part of my goal to becoming a Chief Information Security Office in the future, I have been conducting interviews with CISOs to gain insight and advice based on their experiences in this position. In this edition of the #AskACISO Interviews, I interviewedβ¦
Windows 8 and Later Fail to Properly Apply ASLR
Windows 8, Windows 8.1, and subsequent Windows 10 variations fail to properly apply ASLR, rendering this crucial Windows security feature useless. [...]
https://www.bleepingcomputer.com/news/security/windows-8-and-later-fail-to-properly-apply-aslr/
Windows 8, Windows 8.1, and subsequent Windows 10 variations fail to properly apply ASLR, rendering this crucial Windows security feature useless. [...]
https://www.bleepingcomputer.com/news/security/windows-8-and-later-fail-to-properly-apply-aslr/
BleepingComputer
Windows 8 and Later Fail to Properly Apply ASLR
Windows 8, Windows 8.1, and subsequent Windows 10 variations fail to properly apply ASLR, rendering this crucial Windows security feature useless.