Iranian & Russian Networks Attacked Using Cisco's CVE-2018-0171 Vulnerability
Last night, a hacker group going under the name "JHT" attacked foreign network infrastructure, including Russian and Iranian networks, using the Cisco CVE-2018-0171 Smart Install vulnerability. Using this vulnerability the hackers were able to reset the routers back to their default configuration and display a message to the victims. [...]
https://www.bleepingcomputer.com/news/security/iranian-and-russian-networks-attacked-using-ciscos-cve-2018-0171-vulnerability/
Last night, a hacker group going under the name "JHT" attacked foreign network infrastructure, including Russian and Iranian networks, using the Cisco CVE-2018-0171 Smart Install vulnerability. Using this vulnerability the hackers were able to reset the routers back to their default configuration and display a message to the victims. [...]
https://www.bleepingcomputer.com/news/security/iranian-and-russian-networks-attacked-using-ciscos-cve-2018-0171-vulnerability/
BleepingComputer
Iranian & Russian Networks Attacked Using Cisco's CVE-2018-0171 Vulnerability
Last night, a hacker group going under the name "JHT" attacked foreign network infrastructure, including Russian and Iranian networks, using the Cisco CVE-2018-0171 Smart Install vulnerability. Using this vulnerability the hackers were able to reset the routersโฆ
New Matrix Ransomware Variants Installed Via Hacked Remote Desktop Services
Two new Matrix Ransomware variants were discovered this week by MalwareHunterTeam that are being installed through hacked Remote Desktop services. While both of these variants encrypt your computer's files, one is a bit more advanced with more debugging messages and the use of cipher to wipe free space. [...]
https://www.bleepingcomputer.com/news/security/new-matrix-ransomware-variants-installed-via-hacked-remote-desktop-services/
Two new Matrix Ransomware variants were discovered this week by MalwareHunterTeam that are being installed through hacked Remote Desktop services. While both of these variants encrypt your computer's files, one is a bit more advanced with more debugging messages and the use of cipher to wipe free space. [...]
https://www.bleepingcomputer.com/news/security/new-matrix-ransomware-variants-installed-via-hacked-remote-desktop-services/
BleepingComputer
New Matrix Ransomware Variants Installed Via Hacked Remote Desktop Services
Two new Matrix Ransomware variants were discovered this week by MalwareHunterTeam that are being installed through hacked Remote Desktop services. While both of these variants encrypt your computer's files, one is a bit more advanced with more debugging messagesโฆ
Beware of Bing Chrome Download Ads Pushing Adware/PUP Installers
When using a search engine to search for software download links, be sure to go directly to the developer's site rather than clicking on an advertisement as you may not get what you are expecting. Such is the case with an advertisement currently being displayed in Bing for the search phrase "chrome download", which instead of bringin [...]
https://www.bleepingcomputer.com/news/security/beware-of-bing-chrome-download-ads-pushing-adware-pup-installers/
When using a search engine to search for software download links, be sure to go directly to the developer's site rather than clicking on an advertisement as you may not get what you are expecting. Such is the case with an advertisement currently being displayed in Bing for the search phrase "chrome download", which instead of bringin [...]
https://www.bleepingcomputer.com/news/security/beware-of-bing-chrome-download-ads-pushing-adware-pup-installers/
BleepingComputer
Beware of Bing Chrome Download Ads Pushing Adware/PUP Installers
When using a search engine to search for software download links, be sure to go directly to the developer's site rather than clicking on an advertisement as you may not get what you are expecting. Such is the case with an advertisement currently being displayedโฆ
Vivaldi Removing Facebook as a Default Link in Browser's Speed Dial
Vivaldi announced today that they will be removing Facebook as a default link in their browser's Speed Dial feature. Citing concerns about Facebook's mishandling of data and their lack of privacy protection, Vivaldi's CEO has decided that Facebook is not a platform they feel comfortable promoting. [...]
https://www.bleepingcomputer.com/news/software/vivaldi-removing-facebook-as-a-default-link-in-browsers-speed-dial/
Vivaldi announced today that they will be removing Facebook as a default link in their browser's Speed Dial feature. Citing concerns about Facebook's mishandling of data and their lack of privacy protection, Vivaldi's CEO has decided that Facebook is not a platform they feel comfortable promoting. [...]
https://www.bleepingcomputer.com/news/software/vivaldi-removing-facebook-as-a-default-link-in-browsers-speed-dial/
BleepingComputer
Vivaldi Removing Facebook as a Default Link in Browser's Speed Dial
Vivaldi announced today that they will be removing Facebook as a default link in their browser's Speed Dial feature. Citing concerns about Facebook's mishandling of data and their lack of privacy protection, Vivaldi's CEO has decided that Facebook is notโฆ
Nvidia Dropping GPU Driver Support for 32-Bit Operating Systems
At the end of this month, Nvidia will no longer be offering graphic card driver updates for 32-bit operating systems. While this is not surprising considering that all current operating systems have been distributed as 64-bit for quite some time, there are still users who are using older 32-bit versions of Windows and Linux. [...]
https://www.bleepingcomputer.com/news/hardware/nvidia-dropping-gpu-driver-support-for-32-bit-operating-systems/
At the end of this month, Nvidia will no longer be offering graphic card driver updates for 32-bit operating systems. While this is not surprising considering that all current operating systems have been distributed as 64-bit for quite some time, there are still users who are using older 32-bit versions of Windows and Linux. [...]
https://www.bleepingcomputer.com/news/hardware/nvidia-dropping-gpu-driver-support-for-32-bit-operating-systems/
BleepingComputer
Nvidia Dropping GPU Driver Support for 32-Bit Operating Systems
At the end of this month, Nvidia will no longer be offering graphic card driver updates for 32-bit operating systems. While this is not surprising considering that all current operating systems have been distributed as 64-bit for quite some time, there areโฆ
Blast from the Past: File Manager (WinFile.exe) is Open Sourced By Microsoft
If you were born in the late 90s, you probably have never used the Windows File Manager, which was the Window's file management program before Windows Explorer. Originally included with Windows 3.x & then abandoned after Windows ME, you now have the opportunity to give it a try on Windows 7 and Windows 10 as it is now open source. [...]
https://www.bleepingcomputer.com/news/microsoft/blast-from-the-past-file-manager-winfileexe-is-open-sourced-by-microsoft/
If you were born in the late 90s, you probably have never used the Windows File Manager, which was the Window's file management program before Windows Explorer. Originally included with Windows 3.x & then abandoned after Windows ME, you now have the opportunity to give it a try on Windows 7 and Windows 10 as it is now open source. [...]
https://www.bleepingcomputer.com/news/microsoft/blast-from-the-past-file-manager-winfileexe-is-open-sourced-by-microsoft/
BleepingComputer
Blast from the Past: File Manager (WinFile.exe) is Open Sourced By Microsoft
If you were born in the late 90s, you probably have never used the Windows File Manager, which was the Window's file management program before Windows Explorer. Originally included with Windows 3.x & then abandoned after Windows ME, you now have the opportunityโฆ
PUBG Ransomware Decrypts Your Files If You Play PlayerUnknown's Battlegrounds
In what could only be a joke, a new ransomware has been discovered called "PUBG Ransomware" that will decrypt your files if you play the game called PlayerUnknown's Battlegrounds. [...]
https://www.bleepingcomputer.com/news/security/pubg-ransomware-decrypts-your-files-if-you-play-playerunknowns-battlegrounds/
In what could only be a joke, a new ransomware has been discovered called "PUBG Ransomware" that will decrypt your files if you play the game called PlayerUnknown's Battlegrounds. [...]
https://www.bleepingcomputer.com/news/security/pubg-ransomware-decrypts-your-files-if-you-play-playerunknowns-battlegrounds/
BleepingComputer
PUBG Ransomware Decrypts Your Files If You Play PlayerUnknown's Battlegrounds
In what could only be a joke, a new ransomware has been discovered called "PUBG Ransomware" that will decrypt your files if you play the game called PlayerUnknown's Battlegrounds.
Google Chrome Testing Emojis in the Right-Click Menu
Google engineers are testing a shortcut in the Chrome right-click context menu that will simplify the process of inserting an emoji inside a page's form fields. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-testing-emojis-in-the-right-click-menu/
Google engineers are testing a shortcut in the Chrome right-click context menu that will simplify the process of inserting an emoji inside a page's form fields. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-testing-emojis-in-the-right-click-menu/
BleepingComputer
Google Chrome Testing Emojis in the Right-Click Menu
Google engineers are testing a shortcut in the Chrome right-click context menu that will simplify the process of inserting an emoji inside a page's form fields.
New Screen Clip Screenshot Feature Being Developed For Windows 10
Even though Windows already has quite a few ways to create screenshots, Windows sleuths discovered a new feature called "Screen Clip" being developed in Windows 10 Redstone 5. Screen Clip allows a Windows 10 user to drag a selection of the screen and create a screenshot from it. [...]
https://www.bleepingcomputer.com/news/microsoft/new-screen-clip-screenshot-feature-being-developed-for-windows-10/
Even though Windows already has quite a few ways to create screenshots, Windows sleuths discovered a new feature called "Screen Clip" being developed in Windows 10 Redstone 5. Screen Clip allows a Windows 10 user to drag a selection of the screen and create a screenshot from it. [...]
https://www.bleepingcomputer.com/news/microsoft/new-screen-clip-screenshot-feature-being-developed-for-windows-10/
BleepingComputer
New Screen Clip Screenshot Feature Being Developed For Windows 10
Even though Windows already has quite a few ways to create screenshots, Windows sleuths discovered a new feature called "Screen Clip" being developed in Windows 10 Redstone 5. Screen Clip allows a Windows 10 user to drag a selection of the screen and createโฆ
Linux: Beep Command Can Be Used to Probe for the Presence of Sensitive Files
A vulnerability in the "beep" package that comes pre-installed with Debian and Ubuntu distros allows an attacker to probe for the presence of files on a computer, even those owned by root users, which are supposed to be secret and inaccesible. [...]
https://www.bleepingcomputer.com/news/security/linux-beep-command-can-be-used-to-probe-for-the-presence-of-sensitive-files/
A vulnerability in the "beep" package that comes pre-installed with Debian and Ubuntu distros allows an attacker to probe for the presence of files on a computer, even those owned by root users, which are supposed to be secret and inaccesible. [...]
https://www.bleepingcomputer.com/news/security/linux-beep-command-can-be-used-to-probe-for-the-presence-of-sensitive-files/
BleepingComputer
Linux: Beep Command Can Be Used to Probe for the Presence of Sensitive Files
A vulnerability in the "beep" package that comes pre-installed with Debian and Ubuntu distros allows an attacker to probe for the presence of files on a computer, even those owned by root users, which are supposed to be secret and inaccesible.
HTTP Injector Apps Are Becoming a Popular Method to Obtain Free Internet Access
"HTTP injector" apps traded in public Telegram channels are becoming a popular method of gaining free Internet access on mobile devices. [...]
https://www.bleepingcomputer.com/news/mobile/http-injector-apps-are-becoming-a-popular-method-to-obtain-free-internet-access/
"HTTP injector" apps traded in public Telegram channels are becoming a popular method of gaining free Internet access on mobile devices. [...]
https://www.bleepingcomputer.com/news/mobile/http-injector-apps-are-becoming-a-popular-method-to-obtain-free-internet-access/
BleepingComputer
HTTP Injector Apps Are Becoming a Popular Method to Obtain Free Internet Access
"HTTP injector" apps traded in public Telegram channels are becoming a popular method of gaining free Internet access on mobile devices.
Firefox Follows Chrome and Blocks the Loading of Most FTP Resources
Mozilla will follow in the steps of Google Chrome and start blocking the loading of FTP subresources inside HTTP and HTTPS pages. [...]
https://www.bleepingcomputer.com/news/software/firefox-follows-chrome-and-blocks-the-loading-of-most-ftp-resources/
Mozilla will follow in the steps of Google Chrome and start blocking the loading of FTP subresources inside HTTP and HTTPS pages. [...]
https://www.bleepingcomputer.com/news/software/firefox-follows-chrome-and-blocks-the-loading-of-most-ftp-resources/
BleepingComputer
Firefox Follows Chrome and Blocks the Loading of Most FTP Resources
Mozilla will follow in the steps of Google Chrome and start blocking the loading of FTP subresources inside HTTP and HTTPS pages.
WannaCry Ransomware Sinkhole Data Now Available to Organizations
Kryptos Logic, the cyber-security firm running the main WannaCry sinkhole, announced today plans to allow organizations access to some of the WannaCry sinkhole data. [...]
https://www.bleepingcomputer.com/news/security/wannacry-ransomware-sinkhole-data-now-available-to-organizations/
Kryptos Logic, the cyber-security firm running the main WannaCry sinkhole, announced today plans to allow organizations access to some of the WannaCry sinkhole data. [...]
https://www.bleepingcomputer.com/news/security/wannacry-ransomware-sinkhole-data-now-available-to-organizations/
BleepingComputer
WannaCry Ransomware Sinkhole Data Now Available to Organizations
Kryptos Logic, the cyber-security firm running the main WannaCry sinkhole, announced today plans to allow organizations access to some of the WannaCry sinkhole data.
SirenJack Attack Lets Hackers Take Control Over Emergency Alert Sirens
Hackers can easily spoof and hijack communications targeting sirens part of emergency alert systems to trigger false alerts and cause panic among a local population. [...]
https://www.bleepingcomputer.com/news/security/sirenjack-attack-lets-hackers-take-control-over-emergency-alert-sirens/
Hackers can easily spoof and hijack communications targeting sirens part of emergency alert systems to trigger false alerts and cause panic among a local population. [...]
https://www.bleepingcomputer.com/news/security/sirenjack-attack-lets-hackers-take-control-over-emergency-alert-sirens/
BleepingComputer
SirenJack Attack Lets Hackers Take Control Over Emergency Alert Sirens
Hackers can easily spoof and hijack communications targeting sirens part of emergency alert systems to trigger false alerts and cause panic among a local population.
Apple Is Now 100% Globally Powered by Renewable Energy
Through the use of clean energy projects around the world, Apple is now globally powered by 100% renewable energy. This includes all their retail stores, offices, data centers, and co-located facilities in 43 countries, which includes the United States, the United Kingdom, China and India. [...]
https://www.bleepingcomputer.com/news/apple/apple-is-now-100-percent-globally-powered-by-renewable-energy/
Through the use of clean energy projects around the world, Apple is now globally powered by 100% renewable energy. This includes all their retail stores, offices, data centers, and co-located facilities in 43 countries, which includes the United States, the United Kingdom, China and India. [...]
https://www.bleepingcomputer.com/news/apple/apple-is-now-100-percent-globally-powered-by-renewable-energy/
BleepingComputer
Apple Is Now 100% Globally Powered by Renewable Energy
Through the use of clean energy projects around the world, Apple is now globally powered by 100% renewable energy. This includes all their retail stores, offices, data centers, and co-located facilities in 43 countries, which includes the United States, theโฆ
Adobe Patches Six Flash Player Security Bugs, Three Critical
Adobe has published its monthly security bulletin, and for the month of April 2018, the company has addressed security bugs in five products โAdobe Flash Player, Adobe Experience Manager (enterprise CMS), Adobe InDesign (publishing software), Adobe Digital Editions (e-book reader), and Adobe PhoneGap Push Plugin (development library) [...]
https://www.bleepingcomputer.com/news/security/adobe-patches-six-flash-player-security-bugs-three-critical/
Adobe has published its monthly security bulletin, and for the month of April 2018, the company has addressed security bugs in five products โAdobe Flash Player, Adobe Experience Manager (enterprise CMS), Adobe InDesign (publishing software), Adobe Digital Editions (e-book reader), and Adobe PhoneGap Push Plugin (development library) [...]
https://www.bleepingcomputer.com/news/security/adobe-patches-six-flash-player-security-bugs-three-critical/
BleepingComputer
Adobe Patches Six Flash Player Security Bugs, Three Critical
Adobe has published its monthly security bulletin, and for the month of April 2018, the company has addressed security bugs in five products โAdobe Flash Player, Adobe Experience Manager (enterprise CMS), Adobe InDesign (publishing software), Adobe Digitalโฆ
Microsoft April Patch Tuesday Fixes 66 Security Issues
Earlier today, Microsoft released its monthly roll-up of security patches known as Patch Tuesday, and this month, the Redmond-based OS maker has fixed 66 security issues. [...]
https://www.bleepingcomputer.com/news/security/microsoft-april-patch-tuesday-fixes-66-security-issues/
Earlier today, Microsoft released its monthly roll-up of security patches known as Patch Tuesday, and this month, the Redmond-based OS maker has fixed 66 security issues. [...]
https://www.bleepingcomputer.com/news/security/microsoft-april-patch-tuesday-fixes-66-security-issues/
BleepingComputer
Microsoft April Patch Tuesday Fixes 66 Security Issues
Earlier today, Microsoft released its monthly roll-up of security patches known as Patch Tuesday, and this month, the Redmond-based OS maker has fixed 66 security issues.
Google, Microsoft, and Mozilla Put Their Backing Behind New WebAuthn API
Three major browser makers โGoogle, Microsoft, and Mozillaโhave put their official backing behind a new W3C API called Web Authentication (WebAuthn) that is advertised as a reliable alternative to passwordless online authentication. [...]
https://www.bleepingcomputer.com/news/security/google-microsoft-and-mozilla-put-their-backing-behind-new-webauthn-api/
Three major browser makers โGoogle, Microsoft, and Mozillaโhave put their official backing behind a new W3C API called Web Authentication (WebAuthn) that is advertised as a reliable alternative to passwordless online authentication. [...]
https://www.bleepingcomputer.com/news/security/google-microsoft-and-mozilla-put-their-backing-behind-new-webauthn-api/
BleepingComputer
Google, Microsoft, and Mozilla Put Their Backing Behind New WebAuthn API
Three major browser makers โGoogle, Microsoft, and Mozillaโhave put their official backing behind a new W3C API called Web Authentication (WebAuthn) that is advertised as a reliable alternative to passwordless online authentication.
OpenSnitch Is a Host-Based Firewall for Linux Desktops
Simone Margaritelli, the VP of Research at Zimperium, has created a Linux port of Little Snitch, a popular macOS firewall application. Named OpenSnitch, the Linux port works on the same principles of the Mac version, being a host-based firewall that notifies users when apps attempt to initiate new outgoing network connections. [...]
https://www.bleepingcomputer.com/news/linux/opensnitch-is-a-host-based-firewall-for-linux-desktops/
Simone Margaritelli, the VP of Research at Zimperium, has created a Linux port of Little Snitch, a popular macOS firewall application. Named OpenSnitch, the Linux port works on the same principles of the Mac version, being a host-based firewall that notifies users when apps attempt to initiate new outgoing network connections. [...]
https://www.bleepingcomputer.com/news/linux/opensnitch-is-a-host-based-firewall-for-linux-desktops/
BleepingComputer
OpenSnitch Is a Host-Based Firewall for Linux Desktops
Simone Margaritelli, the VP of Research at Zimperium, has created a Linux port of Little Snitch, a popular macOS firewall application. Named OpenSnitch, the Linux port works on the same principles of the Mac version, being a host-based firewall that notifiesโฆ
Fortnite 3.5 out Tomorrow With Port-a-Fort Hinted As Included
Tomorrow, April 11th at 4AM ET, the 3.5 update for Fortnite is being released. While it has not been officially announced what will be included in the update, a Tweet by the official Fortnite Twitter account hinted that we will at least be getting the Port-a-Fort. [...]
https://www.bleepingcomputer.com/news/gaming/fortnite-35-out-tomorrow-with-port-a-fort-hinted-as-included/
Tomorrow, April 11th at 4AM ET, the 3.5 update for Fortnite is being released. While it has not been officially announced what will be included in the update, a Tweet by the official Fortnite Twitter account hinted that we will at least be getting the Port-a-Fort. [...]
https://www.bleepingcomputer.com/news/gaming/fortnite-35-out-tomorrow-with-port-a-fort-hinted-as-included/
BleepingComputer
Fortnite 3.5 out Tomorrow With Port-a-Fort Hinted As Included
Tomorrow, April 11th at 4AM ET, the 3.5 update for Fortnite is being released. While it has not been officially announced what will be included in the update, a Tweet by the official Fortnite Twitter account hinted that we will at least be getting the Portโฆ
Microsoft Half-Patches Old Outlook Vulnerability
Microsoft has published a patch for an Outlook vulnerability first reported in late 2016, but the patch has been deemed incomplete and additional workarounds are needed, according to the security researcher who discovered it. [...]
https://www.bleepingcomputer.com/news/security/microsoft-half-patches-old-outlook-vulnerability/
Microsoft has published a patch for an Outlook vulnerability first reported in late 2016, but the patch has been deemed incomplete and additional workarounds are needed, according to the security researcher who discovered it. [...]
https://www.bleepingcomputer.com/news/security/microsoft-half-patches-old-outlook-vulnerability/
BleepingComputer
Microsoft Half-Patches Old Outlook Vulnerability
Microsoft has published a patch for an Outlook vulnerability first reported in late 2016, but the patch has been deemed incomplete and additional workarounds are needed, according to the security researcher who discovered it.