Stresspaint Malware Steals Facebook Credentials and Session Cookies
Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and appears to be looking for Facebook details in particular, according to a Radware threat alert. [...]
https://www.bleepingcomputer.com/news/security/stresspaint-malware-steals-facebook-credentials-and-session-cookies/
Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and appears to be looking for Facebook details in particular, according to a Radware threat alert. [...]
https://www.bleepingcomputer.com/news/security/stresspaint-malware-steals-facebook-credentials-and-session-cookies/
BleepingComputer
Stresspaint Malware Steals Facebook Credentials and Session Cookies
Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and appears to be looking for Facebook details in particular, according to a Radware threat alert.
Microsoft Ports Anti-Phishing Technology to Google Chrome
Microsoft has released a Chrome extension named "Windows Defender Browser Protection" that ports Windows Defender's βand inherently Edge'sβ anti-phishing technology to Google Chrome. [...]
https://www.bleepingcomputer.com/news/security/microsoft-ports-anti-phishing-technology-to-google-chrome/
Microsoft has released a Chrome extension named "Windows Defender Browser Protection" that ports Windows Defender's βand inherently Edge'sβ anti-phishing technology to Google Chrome. [...]
https://www.bleepingcomputer.com/news/security/microsoft-ports-anti-phishing-technology-to-google-chrome/
BleepingComputer
Microsoft Ports Anti-Phishing Technology to Google Chrome
Microsoft has released a Chrome extension named "Windows Defender Browser Protection" that ports Windows Defender's βand inherently Edge'sβ anti-phishing technology to Google Chrome.
Minecraft & CS:GO Ransomware Strive For Media Attention
When ransomware developers achieve huge media buzz like we saw with the PUBG Ransomware, it is not surprising to see other developers creating copycats. This is the case with two new in-development ransomware programs, if we can even call them that, for both Minecraft and Counter-Strike: Global Offensive (CS: GO). [...]
https://www.bleepingcomputer.com/news/security/minecraft-and-cs-go-ransomware-strive-for-media-attention/
When ransomware developers achieve huge media buzz like we saw with the PUBG Ransomware, it is not surprising to see other developers creating copycats. This is the case with two new in-development ransomware programs, if we can even call them that, for both Minecraft and Counter-Strike: Global Offensive (CS: GO). [...]
https://www.bleepingcomputer.com/news/security/minecraft-and-cs-go-ransomware-strive-for-media-attention/
BleepingComputer
Minecraft & CS:GO Ransomware Strive For Media Attention
When ransomware developers achieve huge media buzz like we saw with the PUBG Ransomware, it is not surprising to see other developers creating copycats. This is the case with two new in-development ransomware programs, if we can even call them that, for bothβ¦
iOS Trustjacking Attack Exposes iPhones to Remote Hacking
Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw βwhich they named Trustjackingβ to take over devices without the phone owner's knowledge. [...]
https://www.bleepingcomputer.com/news/security/ios-trustjacking-attack-exposes-iphones-to-remote-hacking/
Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw βwhich they named Trustjackingβ to take over devices without the phone owner's knowledge. [...]
https://www.bleepingcomputer.com/news/security/ios-trustjacking-attack-exposes-iphones-to-remote-hacking/
BleepingComputer
iOS Trustjacking Attack Exposes iPhones to Remote Hacking
Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw βwhich they named Trustjackingβ to take over devices without the phone owner's knowledge.
JavaScript Trackers Caught Siphoning Data From "Login With Facebook" Feature
JavaScript libraries from various advertising and analytics services are siphoning user data from web pages where the "Login with Facebook" feature is being used. [...]
https://www.bleepingcomputer.com/news/technology/javascript-trackers-caught-siphoning-data-from-login-with-facebook-feature/
JavaScript libraries from various advertising and analytics services are siphoning user data from web pages where the "Login with Facebook" feature is being used. [...]
https://www.bleepingcomputer.com/news/technology/javascript-trackers-caught-siphoning-data-from-login-with-facebook-feature/
BleepingComputer
JavaScript Trackers Caught Siphoning Data From "Login With Facebook" Feature
JavaScript libraries from various advertising and analytics services are siphoning user data from web pages where the "Login with Facebook" feature is being used.
Data Firm Left Profiles of 48 Million Users on a Publicly Accessible AWS Server
LocalBlox, a company that scrapes data from public web profiles, has left the details of over 48 million users on a publicly accessible Amazon Web Services (AWS) S3 bucket, according to an UpGuard security researcher who discovered the data on February 28, this year. [...]
https://www.bleepingcomputer.com/news/security/data-firm-left-profiles-of-48-million-users-on-a-publicly-accessible-aws-server/
LocalBlox, a company that scrapes data from public web profiles, has left the details of over 48 million users on a publicly accessible Amazon Web Services (AWS) S3 bucket, according to an UpGuard security researcher who discovered the data on February 28, this year. [...]
https://www.bleepingcomputer.com/news/security/data-firm-left-profiles-of-48-million-users-on-a-publicly-accessible-aws-server/
BleepingComputer
Data Firm Left Profiles of 48 Million Users on a Publicly Accessible AWS Server
LocalBlox, a company that scrapes data from public web profiles, has left the details of over 48 million users on a publicly accessible Amazon Web Services (AWS) S3 bucket, according to an UpGuard security researcher who discovered the data on February 28β¦
Denial-of-Spending and Inflation Bugs Found in Several Cryptocurrencies
A team of academics has identified an issue with the Zeroicoin protocol scheme, along with two security flaws in libzerocoin, the software library used for building actual cryptocurrencies around protocol. [...]
https://www.bleepingcomputer.com/news/security/denial-of-spending-and-inflation-bugs-found-in-several-cryptocurrencies/
A team of academics has identified an issue with the Zeroicoin protocol scheme, along with two security flaws in libzerocoin, the software library used for building actual cryptocurrencies around protocol. [...]
https://www.bleepingcomputer.com/news/security/denial-of-spending-and-inflation-bugs-found-in-several-cryptocurrencies/
BleepingComputer
Denial-of-Spending and Inflation Bugs Found in Several Cryptocurrencies
A team of academics has identified an issue with the Zeroicoin protocol scheme, along with two security flaws in libzerocoin, the software library used for building actual cryptocurrencies around protocol.
Brainjacking: A Potentially Deadly Type of Hacking
Hacking the brain of someone with an implanted medical device is not a far-fetched illusion. While at one time a concept relegated to hair-raising Hollywood movies, scientists in Belgium have found that a wireless brain implant, known as a neurostimulator, can be hacked using off-the-shelf materials. By utilizing remote exploitation, [...]
https://www.bleepingcomputer.com/news/security/brainjacking-a-potentially-deadly-type-of-hacking/
Hacking the brain of someone with an implanted medical device is not a far-fetched illusion. While at one time a concept relegated to hair-raising Hollywood movies, scientists in Belgium have found that a wireless brain implant, known as a neurostimulator, can be hacked using off-the-shelf materials. By utilizing remote exploitation, [...]
https://www.bleepingcomputer.com/news/security/brainjacking-a-potentially-deadly-type-of-hacking/
BleepingComputer
Brainjacking: A Potentially Deadly Type of Hacking
Hacking the brain of someone with an implanted medical device is not a far-fetched illusion. While at one time a concept relegated to hair-raising Hollywood movies, scientists in Belgium have found that a wireless brain implant, known as a neurostimulatorβ¦
Flash Used on 5% of All Websites, Down From 28.5% Seven Years Ago
Only 4.9 percent of today's websites utilize Flash code, a number that has plummeted from a 28.5 percent market share recorded at the start of 2011. [...]
https://www.bleepingcomputer.com/news/software/flash-used-on-5-percent-of-all-websites-down-from-285-percent-seven-years-ago/
Only 4.9 percent of today's websites utilize Flash code, a number that has plummeted from a 28.5 percent market share recorded at the start of 2011. [...]
https://www.bleepingcomputer.com/news/software/flash-used-on-5-percent-of-all-websites-down-from-285-percent-seven-years-ago/
BleepingComputer
Flash Used on 5% of All Websites, Down From 28.5% Seven Years Ago
Only 4.9 percent of today's websites utilize Flash code, a number that has plummeted from a 28.5 percent market share recorded at the start of 2011.
Finding & Activating Hidden Features in Windows 10 Using Mach2
Windows 10 builds contain many hidden features that are used by Microsoft to debug code or test applications that have not been officially released yet. A new tool has been released that enables you to find and enable these hidden features in Windows 10. [...]
https://www.bleepingcomputer.com/news/microsoft/finding-and-activating-hidden-features-in-windows-10-using-mach2/
Windows 10 builds contain many hidden features that are used by Microsoft to debug code or test applications that have not been officially released yet. A new tool has been released that enables you to find and enable these hidden features in Windows 10. [...]
https://www.bleepingcomputer.com/news/microsoft/finding-and-activating-hidden-features-in-windows-10-using-mach2/
BleepingComputer
Finding & Activating Hidden Features in Windows 10 Using Mach2
Windows 10 builds contain many hidden features that are used by Microsoft to debug code or test applications that have not been officially released yet. A new tool has been released that enables you to find and enable these hidden features in Windows 10.
FDA Wants Medical Devices to Have Mandatory Built-In Update Mechanisms
The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards medical device safety, including on the cybersecurity front. [...]
https://www.bleepingcomputer.com/news/government/fda-wants-medical-devices-to-have-mandatory-built-in-update-mechanisms/
The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards medical device safety, including on the cybersecurity front. [...]
https://www.bleepingcomputer.com/news/government/fda-wants-medical-devices-to-have-mandatory-built-in-update-mechanisms/
BleepingComputer
FDA Wants Medical Devices to Have Mandatory Built-In Update Mechanisms
The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards medical device safety, including on the cybersecurity front.
LinkedIn Fixes AutoFill Button That Allowed Rogue Harvesting of User Data
A prodigious 18-year-old bug hunter from Chicago has discovered and reported a critical vulnerability in a LinkedIn social button that could have been abused to harvest LinkedIn user information, some of which may not have been public. [...]
https://www.bleepingcomputer.com/news/security/linkedin-fixes-autofill-button-that-allowed-rogue-harvesting-of-user-data/
A prodigious 18-year-old bug hunter from Chicago has discovered and reported a critical vulnerability in a LinkedIn social button that could have been abused to harvest LinkedIn user information, some of which may not have been public. [...]
https://www.bleepingcomputer.com/news/security/linkedin-fixes-autofill-button-that-allowed-rogue-harvesting-of-user-data/
BleepingComputer
LinkedIn Fixes AutoFill Button That Allowed Rogue Harvesting of User Data
A prodigious 18-year-old bug hunter from Chicago has discovered and reported a critical vulnerability in a LinkedIn social button that could have been abused to harvest LinkedIn user information, some of which may not have been public.
RansSIRIA Ransomware Takes Advantage of the Syrian Refugee Crisis
A new ransomware called RansSIRIA has been discovered by MalwareHunterTeam that encrypts your files and then states it will donate your ransom payments to Syrian refugees. This ransomware is a variant of the WannaPeace ransomware and is targeting Brazilian victims. [...]
https://www.bleepingcomputer.com/news/security/ranssiria-ransomware-takes-advantage-of-the-syrian-refugee-crisis/
A new ransomware called RansSIRIA has been discovered by MalwareHunterTeam that encrypts your files and then states it will donate your ransom payments to Syrian refugees. This ransomware is a variant of the WannaPeace ransomware and is targeting Brazilian victims. [...]
https://www.bleepingcomputer.com/news/security/ranssiria-ransomware-takes-advantage-of-the-syrian-refugee-crisis/
BleepingComputer
RansSIRIA Ransomware Takes Advantage of the Syrian Refugee Crisis
A new ransomware called RansSIRIA has been discovered by MalwareHunterTeam that encrypts your files and then states it will donate your ransom payments to Syrian refugees. This ransomware is a variant of the WannaPeace ransomware and is targeting Brazilianβ¦
Windows Insider RS5 Build 17650 Brings Firewall Rules for WSL
Yesterday Microsoft released Windows 10 Insider Preview Build 17650 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft focused on Windows Defender with a new design to the Windows Defender Security Center and adding Windows Subsystem for Linux (WSL) support to the Windows Defender Firewall. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-rs5-build-17650-brings-firewall-rules-for-wsl/
Yesterday Microsoft released Windows 10 Insider Preview Build 17650 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft focused on Windows Defender with a new design to the Windows Defender Security Center and adding Windows Subsystem for Linux (WSL) support to the Windows Defender Firewall. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-rs5-build-17650-brings-firewall-rules-for-wsl/
BleepingComputer
Windows Insider RS5 Build 17650 Brings Firewall Rules for WSL
Yesterday Microsoft released Windows 10 Insider Preview Build 17650 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft focused on Windows Defender with a new design to the Windows Defender Security Center and adding Windows Subsystemβ¦
Google Enables Safe Browsing Support in Android's WebView Browser
Google announced earlier this week plans to enable Safe Browsing support for the Android WebView component, a stripped-down browser that comes with all Android versions. [...]
https://www.bleepingcomputer.com/news/security/google-enables-safe-browsing-support-in-androids-webview-browser/
Google announced earlier this week plans to enable Safe Browsing support for the Android WebView component, a stripped-down browser that comes with all Android versions. [...]
https://www.bleepingcomputer.com/news/security/google-enables-safe-browsing-support-in-androids-webview-browser/
BleepingComputer
Google Enables Safe Browsing Support in Android's WebView Browser
Google announced earlier this week plans to enable Safe Browsing support for the Android WebView component, a stripped-down browser that comes with all Android versions.
Loud Sound From Fire Alarm System Shuts Down Nasdaq's Scandinavian Data Center
A loud sound emitted by a fire alarm system has destroyed the hard drives of a Swedish data center, downing Nasdaq operations across Northern Europe. [...]
https://www.bleepingcomputer.com/news/technology/loud-sound-from-fire-alarm-system-shuts-down-nasdaqs-scandinavian-data-center/
A loud sound emitted by a fire alarm system has destroyed the hard drives of a Swedish data center, downing Nasdaq operations across Northern Europe. [...]
https://www.bleepingcomputer.com/news/technology/loud-sound-from-fire-alarm-system-shuts-down-nasdaqs-scandinavian-data-center/
BleepingComputer
Loud Sound From Fire Alarm System Shuts Down Nasdaq's Scandinavian Data Center
A loud sound emitted by a fire suppression system has destroyed the hard drives of a Swedish data center, downing Nasdaq operations across Northern Europe.
Big IoT Botnet Starts Large-Scale Exploitation of Drupalgeddon 2 Vulnerability
A botnet made up of servers and smart devices has begun the mass exploitation of a severe Drupal CMS vulnerability and is using already compromised systems to infect new machines, in a worm-like behavior. [...]
https://www.bleepingcomputer.com/news/security/big-iot-botnet-starts-large-scale-exploitation-of-drupalgeddon-2-vulnerability/
A botnet made up of servers and smart devices has begun the mass exploitation of a severe Drupal CMS vulnerability and is using already compromised systems to infect new machines, in a worm-like behavior. [...]
https://www.bleepingcomputer.com/news/security/big-iot-botnet-starts-large-scale-exploitation-of-drupalgeddon-2-vulnerability/
BleepingComputer
Big IoT Botnet Starts Large-Scale Exploitation of Drupalgeddon 2 Vulnerability
A botnet made up of servers and smart devices has begun the mass exploitation of a severe Drupal CMS vulnerability and is using already compromised systems to infect new machines, in a worm-like behavior.
Internet Explorer Zero-Day Exploited in the Wild by APT Group
An advanced persistent threat (APT), a term sometimes used to describe nation-state-backed cyber-espionage units, is using a zero-day vulnerability in the Internet Explorer kernel code to infect victims with malware. [...]
https://www.bleepingcomputer.com/news/security/internet-explorer-zero-day-exploited-in-the-wild-by-apt-group/
An advanced persistent threat (APT), a term sometimes used to describe nation-state-backed cyber-espionage units, is using a zero-day vulnerability in the Internet Explorer kernel code to infect victims with malware. [...]
https://www.bleepingcomputer.com/news/security/internet-explorer-zero-day-exploited-in-the-wild-by-apt-group/
BleepingComputer
Internet Explorer Zero-Day Exploited in the Wild by APT Group
An advanced persistent threat (APT), a term sometimes used to describe nation-state-backed cyber-espionage units, is using a zero-day vulnerability in the Internet Explorer kernel code to infect victims with malware.
Twitter Bans Kaspersky From Advertising on the Platform Citing DHS Ban
Twitter has banned Kaspersky Lab from advertising on its platform citing the company's alleged ties with Russian intelligence agencies. [...]
https://www.bleepingcomputer.com/news/business/twitter-bans-kaspersky-from-advertising-on-the-platform-citing-dhs-ban/
Twitter has banned Kaspersky Lab from advertising on its platform citing the company's alleged ties with Russian intelligence agencies. [...]
https://www.bleepingcomputer.com/news/business/twitter-bans-kaspersky-from-advertising-on-the-platform-citing-dhs-ban/
BleepingComputer
Twitter Bans Kaspersky From Advertising on the Platform Citing DHS Ban
Twitter has banned Kaspersky Lab from advertising on its platform citing the company's alleged ties with Russian intelligence agencies.
The Week in Ransomware - April 20th 2018 - Reveton Charges, GandCrab, and More
This week was mostly small variants released, but we did have some interesting news. First we had a Microsoft engineer facing federal charges for involvement in the Reveton Ransomware, a decryptor released for Vortex, the Magnitude exploit kit is now pushing GandCrab, and a ransomware is trying to make money off of Syrian refugees. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-20th-2018-reveton-charges-gandcrab-and-more/
This week was mostly small variants released, but we did have some interesting news. First we had a Microsoft engineer facing federal charges for involvement in the Reveton Ransomware, a decryptor released for Vortex, the Magnitude exploit kit is now pushing GandCrab, and a ransomware is trying to make money off of Syrian refugees. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-20th-2018-reveton-charges-gandcrab-and-more/
BleepingComputer
The Week in Ransomware - April 20th 2018 - Reveton Charges, GandCrab, and More
This week was mostly small variants released, but we did have some interesting news. First we had a Microsoft engineer facing federal charges for involvement in the Reveton Ransomware, a decryptor released for Vortex, the Magnitude exploit kit is now pushingβ¦
SunTrust Bank Says Former Employee Stole Details on 1.5 Million Customers
US-based SunTrust Bank said it is working with law enforcement after it discovered that a former employee had stolen private information belonging to nearly 1.5 million customers. [...]
https://www.bleepingcomputer.com/news/security/suntrust-bank-says-former-employee-stole-details-on-15-million-customers/
US-based SunTrust Bank said it is working with law enforcement after it discovered that a former employee had stolen private information belonging to nearly 1.5 million customers. [...]
https://www.bleepingcomputer.com/news/security/suntrust-bank-says-former-employee-stole-details-on-15-million-customers/
BleepingComputer
SunTrust Bank Says Former Employee Stole Details on 1.5 Million Customers
US-based SunTrust Bank said it is working with law enforcement after it discovered that a former employee had stolen private information belonging to nearly 1.5 million customers.