Intel to Allow Antivirus Engines to Use Integrated GPUs for Malware Scanning
Intel announced yesterday at the RSA 2018 security conference several new security-focused technologies, among which is a feature that will let security products offload virus scanning operations to integrated graphics processors embedded with some Intel CPUs. [...]
https://www.bleepingcomputer.com/news/security/intel-to-allow-antivirus-engines-to-use-integrated-gpus-for-malware-scanning/
Intel announced yesterday at the RSA 2018 security conference several new security-focused technologies, among which is a feature that will let security products offload virus scanning operations to integrated graphics processors embedded with some Intel CPUs. [...]
https://www.bleepingcomputer.com/news/security/intel-to-allow-antivirus-engines-to-use-integrated-gpus-for-malware-scanning/
BleepingComputer
Intel to Allow Antivirus Engines to Use Integrated GPUs for Malware Scanning
Intel announced yesterday at the RSA 2018 security conference several new security-focused technologies, among which is a feature that will let security products offload virus scanning operations to integrated graphics processors embedded with some Intelโฆ
XiaoBa Ransomware Retooled as Coinminer But Manages to Ruin Your Files Anyway
The authors of the XiaoBa ransomware have retooled their malware's code into a cryptocurrency miner (coinminer). Unfortunately, despite not encrypting files anymore, the XiaoBa coinminer still destroys users' data thanks to a series of bugs that primarily corrupt a user's executable files. [...]
https://www.bleepingcomputer.com/news/security/xiaoba-ransomware-retooled-as-coinminer-but-manages-to-ruin-your-files-anyway/
The authors of the XiaoBa ransomware have retooled their malware's code into a cryptocurrency miner (coinminer). Unfortunately, despite not encrypting files anymore, the XiaoBa coinminer still destroys users' data thanks to a series of bugs that primarily corrupt a user's executable files. [...]
https://www.bleepingcomputer.com/news/security/xiaoba-ransomware-retooled-as-coinminer-but-manages-to-ruin-your-files-anyway/
BleepingComputer
XiaoBa Ransomware Retooled as Coinminer But Manages to Ruin Your Files Anyway
The authors of the XiaoBa ransomware have retooled their malware's code into a cryptocurrency miner (coinminer). Unfortunately, despite not encrypting files anymore, the XiaoBa coinminer still destroys users' data thanks to a series of bugs that primarilyโฆ
34 Tech Firms Sign Accord Not to Assist Government Hacking Operations
An industry group of 34 high-tech companies led by Microsoft, have signed today a tech accord, agreeing to defend customers at all costs from cybercriminal and nation-state cyber-attacks, but also not to provide any technical aid to governments looking to launch cyber-attacks on other countries, companies, or individual users. [...]
https://www.bleepingcomputer.com/news/government/34-tech-firms-sign-accord-not-to-assist-government-hacking-operations/
An industry group of 34 high-tech companies led by Microsoft, have signed today a tech accord, agreeing to defend customers at all costs from cybercriminal and nation-state cyber-attacks, but also not to provide any technical aid to governments looking to launch cyber-attacks on other countries, companies, or individual users. [...]
https://www.bleepingcomputer.com/news/government/34-tech-firms-sign-accord-not-to-assist-government-hacking-operations/
BleepingComputer
34 Tech Firms Sign Accord Not to Assist Government Hacking Operations
An industry group of 34 high-tech companies led by Microsoft, have signed today a tech accord, agreeing to defend customers at all costs from cybercriminal and nation-state cyber-attacks, but also not to provide any technical aid to governments looking toโฆ
Teenager Charged For Nova Scotia Freedom of Information Web Portal Breach
A 19 year old teenager was charged with 'unauthorized use of a computer' after downloading over 7,000 records from the Nova Scotia Freedom-of-Information web portal. The teenager whose name has not been released, has been accused of stealing documents from the portal, with many of them being publicly accessible and redacted. [...]
https://www.bleepingcomputer.com/news/security/teenager-charged-for-nova-scotia-freedom-of-information-web-portal-breach/
A 19 year old teenager was charged with 'unauthorized use of a computer' after downloading over 7,000 records from the Nova Scotia Freedom-of-Information web portal. The teenager whose name has not been released, has been accused of stealing documents from the portal, with many of them being publicly accessible and redacted. [...]
https://www.bleepingcomputer.com/news/security/teenager-charged-for-nova-scotia-freedom-of-information-web-portal-breach/
BleepingComputer
Teenager Charged For Nova Scotia Freedom of Information Web Portal Breach
A 19 year old teenager was charged with 'unauthorized use of a computer' after downloading over 7,000 records from the Nova Scotia Freedom-of-Information web portal. The teenager whose name has not been released, has been accused of stealing documents fromโฆ
Guild Wars 2 Monitored All Running Process in Order To Ban Users
While nobody likes a cheater in online games, sometimes how a company monitors and bans cheaters can go wrong. Such is the case with a recent ban fest unleashed by ArenaNet for their Guild Wars 2 game, which used a program that monitored all processes running on a computer for blacklisted programs. [...]
https://www.bleepingcomputer.com/news/security/guild-wars-2-monitored-all-running-process-in-order-to-ban-users/
While nobody likes a cheater in online games, sometimes how a company monitors and bans cheaters can go wrong. Such is the case with a recent ban fest unleashed by ArenaNet for their Guild Wars 2 game, which used a program that monitored all processes running on a computer for blacklisted programs. [...]
https://www.bleepingcomputer.com/news/security/guild-wars-2-monitored-all-running-process-in-order-to-ban-users/
BleepingComputer
Guild Wars 2 Monitored All Running Process in Order To Ban Users
While nobody likes a cheater in online games, sometimes how a company monitors and bans cheaters can go wrong. Such is the case with a recent ban fest unleashed by ArenaNet for their Guild Wars 2 game, which used a program that monitored all processes runningโฆ
Drupalgeddon 2 Vulnerability Used to Infect Servers With Backdoors & Coinminers
Hackers haven't wasted their time in deciding what to do with the proof-of-concept (PoC) code that was published online last week for a major Drupal security flaw. [...]
https://www.bleepingcomputer.com/news/security/drupalgeddon-2-vulnerability-used-to-infect-servers-with-backdoors-and-coinminers/
Hackers haven't wasted their time in deciding what to do with the proof-of-concept (PoC) code that was published online last week for a major Drupal security flaw. [...]
https://www.bleepingcomputer.com/news/security/drupalgeddon-2-vulnerability-used-to-infect-servers-with-backdoors-and-coinminers/
BleepingComputer
Drupalgeddon 2 Vulnerability Used to Infect Servers With Backdoors & Coinminers
Hackers haven't wasted their time in deciding what to do with the proof-of-concept (PoC) code that was published online last week for a major Drupal security flaw.
Google Chrome 66 Released Today Focuses on Security
Google has moved Chrome 66 to the stable channel and starting earlier today has begun updating users to the browser's new major version โ Chrome 66.0.3359.117. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/
Google has moved Chrome 66 to the stable channel and starting earlier today has begun updating users to the browser's new major version โ Chrome 66.0.3359.117. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/
BleepingComputer
Google Chrome 66 Released Today Focuses on Security
Google has moved Chrome 66 to the stable channel and starting earlier today has begun updating users to the browser's new major version โ Chrome 66.0.3359.117.
Stresspaint Malware Steals Facebook Credentials and Session Cookies
Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and appears to be looking for Facebook details in particular, according to a Radware threat alert. [...]
https://www.bleepingcomputer.com/news/security/stresspaint-malware-steals-facebook-credentials-and-session-cookies/
Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and appears to be looking for Facebook details in particular, according to a Radware threat alert. [...]
https://www.bleepingcomputer.com/news/security/stresspaint-malware-steals-facebook-credentials-and-session-cookies/
BleepingComputer
Stresspaint Malware Steals Facebook Credentials and Session Cookies
Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and appears to be looking for Facebook details in particular, according to a Radware threat alert.
Microsoft Ports Anti-Phishing Technology to Google Chrome
Microsoft has released a Chrome extension named "Windows Defender Browser Protection" that ports Windows Defender's โand inherently Edge'sโ anti-phishing technology to Google Chrome. [...]
https://www.bleepingcomputer.com/news/security/microsoft-ports-anti-phishing-technology-to-google-chrome/
Microsoft has released a Chrome extension named "Windows Defender Browser Protection" that ports Windows Defender's โand inherently Edge'sโ anti-phishing technology to Google Chrome. [...]
https://www.bleepingcomputer.com/news/security/microsoft-ports-anti-phishing-technology-to-google-chrome/
BleepingComputer
Microsoft Ports Anti-Phishing Technology to Google Chrome
Microsoft has released a Chrome extension named "Windows Defender Browser Protection" that ports Windows Defender's โand inherently Edge'sโ anti-phishing technology to Google Chrome.
Minecraft & CS:GO Ransomware Strive For Media Attention
When ransomware developers achieve huge media buzz like we saw with the PUBG Ransomware, it is not surprising to see other developers creating copycats. This is the case with two new in-development ransomware programs, if we can even call them that, for both Minecraft and Counter-Strike: Global Offensive (CS: GO). [...]
https://www.bleepingcomputer.com/news/security/minecraft-and-cs-go-ransomware-strive-for-media-attention/
When ransomware developers achieve huge media buzz like we saw with the PUBG Ransomware, it is not surprising to see other developers creating copycats. This is the case with two new in-development ransomware programs, if we can even call them that, for both Minecraft and Counter-Strike: Global Offensive (CS: GO). [...]
https://www.bleepingcomputer.com/news/security/minecraft-and-cs-go-ransomware-strive-for-media-attention/
BleepingComputer
Minecraft & CS:GO Ransomware Strive For Media Attention
When ransomware developers achieve huge media buzz like we saw with the PUBG Ransomware, it is not surprising to see other developers creating copycats. This is the case with two new in-development ransomware programs, if we can even call them that, for bothโฆ
iOS Trustjacking Attack Exposes iPhones to Remote Hacking
Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw โwhich they named Trustjackingโ to take over devices without the phone owner's knowledge. [...]
https://www.bleepingcomputer.com/news/security/ios-trustjacking-attack-exposes-iphones-to-remote-hacking/
Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw โwhich they named Trustjackingโ to take over devices without the phone owner's knowledge. [...]
https://www.bleepingcomputer.com/news/security/ios-trustjacking-attack-exposes-iphones-to-remote-hacking/
BleepingComputer
iOS Trustjacking Attack Exposes iPhones to Remote Hacking
Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw โwhich they named Trustjackingโ to take over devices without the phone owner's knowledge.
JavaScript Trackers Caught Siphoning Data From "Login With Facebook" Feature
JavaScript libraries from various advertising and analytics services are siphoning user data from web pages where the "Login with Facebook" feature is being used. [...]
https://www.bleepingcomputer.com/news/technology/javascript-trackers-caught-siphoning-data-from-login-with-facebook-feature/
JavaScript libraries from various advertising and analytics services are siphoning user data from web pages where the "Login with Facebook" feature is being used. [...]
https://www.bleepingcomputer.com/news/technology/javascript-trackers-caught-siphoning-data-from-login-with-facebook-feature/
BleepingComputer
JavaScript Trackers Caught Siphoning Data From "Login With Facebook" Feature
JavaScript libraries from various advertising and analytics services are siphoning user data from web pages where the "Login with Facebook" feature is being used.
Data Firm Left Profiles of 48 Million Users on a Publicly Accessible AWS Server
LocalBlox, a company that scrapes data from public web profiles, has left the details of over 48 million users on a publicly accessible Amazon Web Services (AWS) S3 bucket, according to an UpGuard security researcher who discovered the data on February 28, this year. [...]
https://www.bleepingcomputer.com/news/security/data-firm-left-profiles-of-48-million-users-on-a-publicly-accessible-aws-server/
LocalBlox, a company that scrapes data from public web profiles, has left the details of over 48 million users on a publicly accessible Amazon Web Services (AWS) S3 bucket, according to an UpGuard security researcher who discovered the data on February 28, this year. [...]
https://www.bleepingcomputer.com/news/security/data-firm-left-profiles-of-48-million-users-on-a-publicly-accessible-aws-server/
BleepingComputer
Data Firm Left Profiles of 48 Million Users on a Publicly Accessible AWS Server
LocalBlox, a company that scrapes data from public web profiles, has left the details of over 48 million users on a publicly accessible Amazon Web Services (AWS) S3 bucket, according to an UpGuard security researcher who discovered the data on February 28โฆ
Denial-of-Spending and Inflation Bugs Found in Several Cryptocurrencies
A team of academics has identified an issue with the Zeroicoin protocol scheme, along with two security flaws in libzerocoin, the software library used for building actual cryptocurrencies around protocol. [...]
https://www.bleepingcomputer.com/news/security/denial-of-spending-and-inflation-bugs-found-in-several-cryptocurrencies/
A team of academics has identified an issue with the Zeroicoin protocol scheme, along with two security flaws in libzerocoin, the software library used for building actual cryptocurrencies around protocol. [...]
https://www.bleepingcomputer.com/news/security/denial-of-spending-and-inflation-bugs-found-in-several-cryptocurrencies/
BleepingComputer
Denial-of-Spending and Inflation Bugs Found in Several Cryptocurrencies
A team of academics has identified an issue with the Zeroicoin protocol scheme, along with two security flaws in libzerocoin, the software library used for building actual cryptocurrencies around protocol.
Brainjacking: A Potentially Deadly Type of Hacking
Hacking the brain of someone with an implanted medical device is not a far-fetched illusion. While at one time a concept relegated to hair-raising Hollywood movies, scientists in Belgium have found that a wireless brain implant, known as a neurostimulator, can be hacked using off-the-shelf materials. By utilizing remote exploitation, [...]
https://www.bleepingcomputer.com/news/security/brainjacking-a-potentially-deadly-type-of-hacking/
Hacking the brain of someone with an implanted medical device is not a far-fetched illusion. While at one time a concept relegated to hair-raising Hollywood movies, scientists in Belgium have found that a wireless brain implant, known as a neurostimulator, can be hacked using off-the-shelf materials. By utilizing remote exploitation, [...]
https://www.bleepingcomputer.com/news/security/brainjacking-a-potentially-deadly-type-of-hacking/
BleepingComputer
Brainjacking: A Potentially Deadly Type of Hacking
Hacking the brain of someone with an implanted medical device is not a far-fetched illusion. While at one time a concept relegated to hair-raising Hollywood movies, scientists in Belgium have found that a wireless brain implant, known as a neurostimulatorโฆ
Flash Used on 5% of All Websites, Down From 28.5% Seven Years Ago
Only 4.9 percent of today's websites utilize Flash code, a number that has plummeted from a 28.5 percent market share recorded at the start of 2011. [...]
https://www.bleepingcomputer.com/news/software/flash-used-on-5-percent-of-all-websites-down-from-285-percent-seven-years-ago/
Only 4.9 percent of today's websites utilize Flash code, a number that has plummeted from a 28.5 percent market share recorded at the start of 2011. [...]
https://www.bleepingcomputer.com/news/software/flash-used-on-5-percent-of-all-websites-down-from-285-percent-seven-years-ago/
BleepingComputer
Flash Used on 5% of All Websites, Down From 28.5% Seven Years Ago
Only 4.9 percent of today's websites utilize Flash code, a number that has plummeted from a 28.5 percent market share recorded at the start of 2011.
Finding & Activating Hidden Features in Windows 10 Using Mach2
Windows 10 builds contain many hidden features that are used by Microsoft to debug code or test applications that have not been officially released yet. A new tool has been released that enables you to find and enable these hidden features in Windows 10. [...]
https://www.bleepingcomputer.com/news/microsoft/finding-and-activating-hidden-features-in-windows-10-using-mach2/
Windows 10 builds contain many hidden features that are used by Microsoft to debug code or test applications that have not been officially released yet. A new tool has been released that enables you to find and enable these hidden features in Windows 10. [...]
https://www.bleepingcomputer.com/news/microsoft/finding-and-activating-hidden-features-in-windows-10-using-mach2/
BleepingComputer
Finding & Activating Hidden Features in Windows 10 Using Mach2
Windows 10 builds contain many hidden features that are used by Microsoft to debug code or test applications that have not been officially released yet. A new tool has been released that enables you to find and enable these hidden features in Windows 10.
FDA Wants Medical Devices to Have Mandatory Built-In Update Mechanisms
The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards medical device safety, including on the cybersecurity front. [...]
https://www.bleepingcomputer.com/news/government/fda-wants-medical-devices-to-have-mandatory-built-in-update-mechanisms/
The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards medical device safety, including on the cybersecurity front. [...]
https://www.bleepingcomputer.com/news/government/fda-wants-medical-devices-to-have-mandatory-built-in-update-mechanisms/
BleepingComputer
FDA Wants Medical Devices to Have Mandatory Built-In Update Mechanisms
The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards medical device safety, including on the cybersecurity front.
LinkedIn Fixes AutoFill Button That Allowed Rogue Harvesting of User Data
A prodigious 18-year-old bug hunter from Chicago has discovered and reported a critical vulnerability in a LinkedIn social button that could have been abused to harvest LinkedIn user information, some of which may not have been public. [...]
https://www.bleepingcomputer.com/news/security/linkedin-fixes-autofill-button-that-allowed-rogue-harvesting-of-user-data/
A prodigious 18-year-old bug hunter from Chicago has discovered and reported a critical vulnerability in a LinkedIn social button that could have been abused to harvest LinkedIn user information, some of which may not have been public. [...]
https://www.bleepingcomputer.com/news/security/linkedin-fixes-autofill-button-that-allowed-rogue-harvesting-of-user-data/
BleepingComputer
LinkedIn Fixes AutoFill Button That Allowed Rogue Harvesting of User Data
A prodigious 18-year-old bug hunter from Chicago has discovered and reported a critical vulnerability in a LinkedIn social button that could have been abused to harvest LinkedIn user information, some of which may not have been public.
RansSIRIA Ransomware Takes Advantage of the Syrian Refugee Crisis
A new ransomware called RansSIRIA has been discovered by MalwareHunterTeam that encrypts your files and then states it will donate your ransom payments to Syrian refugees. This ransomware is a variant of the WannaPeace ransomware and is targeting Brazilian victims. [...]
https://www.bleepingcomputer.com/news/security/ranssiria-ransomware-takes-advantage-of-the-syrian-refugee-crisis/
A new ransomware called RansSIRIA has been discovered by MalwareHunterTeam that encrypts your files and then states it will donate your ransom payments to Syrian refugees. This ransomware is a variant of the WannaPeace ransomware and is targeting Brazilian victims. [...]
https://www.bleepingcomputer.com/news/security/ranssiria-ransomware-takes-advantage-of-the-syrian-refugee-crisis/
BleepingComputer
RansSIRIA Ransomware Takes Advantage of the Syrian Refugee Crisis
A new ransomware called RansSIRIA has been discovered by MalwareHunterTeam that encrypts your files and then states it will donate your ransom payments to Syrian refugees. This ransomware is a variant of the WannaPeace ransomware and is targeting Brazilianโฆ
Windows Insider RS5 Build 17650 Brings Firewall Rules for WSL
Yesterday Microsoft released Windows 10 Insider Preview Build 17650 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft focused on Windows Defender with a new design to the Windows Defender Security Center and adding Windows Subsystem for Linux (WSL) support to the Windows Defender Firewall. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-rs5-build-17650-brings-firewall-rules-for-wsl/
Yesterday Microsoft released Windows 10 Insider Preview Build 17650 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft focused on Windows Defender with a new design to the Windows Defender Security Center and adding Windows Subsystem for Linux (WSL) support to the Windows Defender Firewall. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-rs5-build-17650-brings-firewall-rules-for-wsl/
BleepingComputer
Windows Insider RS5 Build 17650 Brings Firewall Rules for WSL
Yesterday Microsoft released Windows 10 Insider Preview Build 17650 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft focused on Windows Defender with a new design to the Windows Defender Security Center and adding Windows Subsystemโฆ