SEC Fines Yahoo $35 Million for Data Breach That Affected 500 Million Users
The United States Securities and Exchange Commission has fined Yahoo (or what's left of the company) $35 million for failing to disclose a massive security breach that took place in 2014. [...]
https://www.bleepingcomputer.com/news/business/sec-fines-yahoo-35-million-for-data-breach-that-affected-500-million-users/
The United States Securities and Exchange Commission has fined Yahoo (or what's left of the company) $35 million for failing to disclose a massive security breach that took place in 2014. [...]
https://www.bleepingcomputer.com/news/business/sec-fines-yahoo-35-million-for-data-breach-that-affected-500-million-users/
BleepingComputer
SEC Fines Yahoo $35 Million for Data Breach That Affected 500 Million Users
The United States Securities and Exchange Commission has fined Yahoo (or what's left of the company) $35 million for failing to disclose a massive security breach that took place in 2014.
Apple Releases Security Updates for MacOS, iOS, and Safari
Apple has released earlier today a quick batch of updates meant to fix security-related bugs in macOS, iOS, and the Safari browser. [...]
https://www.bleepingcomputer.com/news/apple/apple-releases-security-updates-for-macos-ios-and-safari/
Apple has released earlier today a quick batch of updates meant to fix security-related bugs in macOS, iOS, and the Safari browser. [...]
https://www.bleepingcomputer.com/news/apple/apple-releases-security-updates-for-macos-ios-and-safari/
BleepingComputer
Apple Releases Security Updates for MacOS, iOS, and Safari
Apple has released earlier today a quick batch of updates meant to fix security-related bugs in macOS, iOS, and the Safari browser.
macOS App Can Detect Evil Maid Attacks
Former NSA hacker and current macOS security expert Patrick Wardle has released this week an app named Do Not Disturb that can be used to detect "evil maid" attacks βa term used to describe unknown persons that leverage physical access to hack and steal data from a device. [...]
https://www.bleepingcomputer.com/news/apple/macos-app-can-detect-evil-maid-attacks/
Former NSA hacker and current macOS security expert Patrick Wardle has released this week an app named Do Not Disturb that can be used to detect "evil maid" attacks βa term used to describe unknown persons that leverage physical access to hack and steal data from a device. [...]
https://www.bleepingcomputer.com/news/apple/macos-app-can-detect-evil-maid-attacks/
BleepingComputer
macOS App Can Detect Evil Maid Attacks
Former NSA hacker and current macOS security expert Patrick Wardle has released this week an app named Do Not Disturb that can be used to detect "evil maid" attacks βa term used to describe unknown persons that leverage physical access to hack and steal dataβ¦
Europol Shuts Down World's Largest DDoS-for-Hire Service
Europol officials have shut down WebStresser, a website where users could register and launch DDoS attacks after paying for a monthly plan, with prices starting as low as β¬15 ($18.25). [...]
https://www.bleepingcomputer.com/news/security/europol-shuts-down-worlds-largest-ddos-for-hire-service/
Europol officials have shut down WebStresser, a website where users could register and launch DDoS attacks after paying for a monthly plan, with prices starting as low as β¬15 ($18.25). [...]
https://www.bleepingcomputer.com/news/security/europol-shuts-down-worlds-largest-ddos-for-hire-service/
BleepingComputer
Europol Shuts Down World's Largest DDoS-for-Hire Service
Europol officials have shut down WebStresser, a website where users could register and launch DDoS attacks after paying for a monthly plan, with prices starting as low as β¬15 ($18.25).
Microsoft Releases Two New Windows Updates Containing New Spectre 2 Mitigations
Microsoft released yesterday two new Windows Update packages meant to fix the Spectre v2 vulnerability. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-two-new-windows-updates-containing-new-spectre-2-mitigations/
Microsoft released yesterday two new Windows Update packages meant to fix the Spectre v2 vulnerability. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-two-new-windows-updates-containing-new-spectre-2-mitigations/
BleepingComputer
Microsoft Releases Two New Windows Updates Containing New Spectre 2 Mitigations
Microsoft released yesterday two new Windows Update packages meant to fix the Spectre v2 vulnerability.
6 Alternative Browsers That Aren't Chrome or Firefox
Although Chrome and Firefox are very popular, it doesn't mean you have to use them. Depending on your needs and browsing habits, there may very well be another browser that's a better fit. In this article we take a look at six alternative browsers that have different strengths & features. [...]
https://www.bleepingcomputer.com/tips/web-browsers/6-alternative-browsers-that-arent-chrome-or-firefox/
Although Chrome and Firefox are very popular, it doesn't mean you have to use them. Depending on your needs and browsing habits, there may very well be another browser that's a better fit. In this article we take a look at six alternative browsers that have different strengths & features. [...]
https://www.bleepingcomputer.com/tips/web-browsers/6-alternative-browsers-that-arent-chrome-or-firefox/
BleepingComputer
6 Alternative Browsers That Aren't Chrome or Firefox
Although Chrome and Firefox are very popular, it doesn't mean you have to use them. Depending on your needs and browsing habits, there may very well be another browser that's a better fit. In this article we take a look at six alternative browsers that haveβ¦
Device Can Generate Master Keys From Valid or Expired Hotel Keys
Two security researchers from F-Secure have created a device that can read any valid or expired hotel key card and generate a master key that can open any room door or grant attackers access to secure hotel areas. [...]
https://www.bleepingcomputer.com/news/security/device-can-generate-master-keys-from-valid-or-expired-hotel-keys/
Two security researchers from F-Secure have created a device that can read any valid or expired hotel key card and generate a master key that can open any room door or grant attackers access to secure hotel areas. [...]
https://www.bleepingcomputer.com/news/security/device-can-generate-master-keys-from-valid-or-expired-hotel-keys/
BleepingComputer
Device Can Generate Master Keys From Valid or Expired Hotel Keys
Two security researchers from F-Secure have created a device that can read any valid or expired hotel key card and generate a master key that can open any room door or grant attackers access to secure hotel areas.
Hello! We want to tell you about few new awesome channels you must like.
HYPREME β everything about street wear fashion and style, new drops releases dates and super-cool photos.
Γ©poque β the most atmospheric channel ever, old movies, music and vintage photography.
Life Pro Tips β tips that improve your life in one way or another (it's true, really).
The Spectator β focused on politics, economics, history, military affairs, sports, science and technology (for the serious guys).
Also check out PosterBot β bot who can delivery posts from your favourite social networks to your channels (even when you sleep). It's realy cool thing.
Thanks and have a good day!
HYPREME β everything about street wear fashion and style, new drops releases dates and super-cool photos.
Γ©poque β the most atmospheric channel ever, old movies, music and vintage photography.
Life Pro Tips β tips that improve your life in one way or another (it's true, really).
The Spectator β focused on politics, economics, history, military affairs, sports, science and technology (for the serious guys).
Also check out PosterBot β bot who can delivery posts from your favourite social networks to your channels (even when you sleep). It's realy cool thing.
Thanks and have a good day!
Ransomware Hits HPE iLO Remote Management Interfaces
Attackers are targeting Internet accessible HPE iLO 4 remote management interfaces, supposedly encrypting the drives, and then demanding Bitcoins to get access to the data again. While it has not been 100% confirmed if the hard drives are actually being encrypted, we do know that multiple victims have been affected by this attack. [...]
https://www.bleepingcomputer.com/news/security/ransomware-hits-hpe-ilo-remote-management-interfaces/
Attackers are targeting Internet accessible HPE iLO 4 remote management interfaces, supposedly encrypting the drives, and then demanding Bitcoins to get access to the data again. While it has not been 100% confirmed if the hard drives are actually being encrypted, we do know that multiple victims have been affected by this attack. [...]
https://www.bleepingcomputer.com/news/security/ransomware-hits-hpe-ilo-remote-management-interfaces/
BleepingComputer
Ransomware Hits HPE iLO Remote Management Interfaces
Attackers are targeting Internet accessible HPE iLO 4 remote management interfaces, supposedly encrypting the drives, and then demanding Bitcoins to get access to the data again. While it has not been 100% confirmed if the hard drives are actually being encryptedβ¦
Researchers Turn Amazon Echo Into an Eavesdropping Device
Researchers at cybersecurity firm Checkmarx have found a way to turn an Amazon Echo (Alexa-powered) smart speaker into an eavesdropping device. [...]
https://www.bleepingcomputer.com/news/security/researchers-turn-amazon-echo-into-an-eavesdropping-device/
Researchers at cybersecurity firm Checkmarx have found a way to turn an Amazon Echo (Alexa-powered) smart speaker into an eavesdropping device. [...]
https://www.bleepingcomputer.com/news/security/researchers-turn-amazon-echo-into-an-eavesdropping-device/
BleepingComputer
Researchers Turn Amazon Echo Into an Eavesdropping Device
Researchers at cybersecurity firm Checkmarx have found a way to turn an Amazon Echo (Alexa-powered) smart speaker into an eavesdropping device.
Windows Insider RS5 Build 17655 Starts Transition to the Net Adapter Framework
Today Microsoft released Windows 10 Insider Build 17655 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft begins its first step of transitioning the Windows network stack to use the Net Adapter framework. The first network component to take advantage of this framework is a new driver for mobile broadband. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-rs5-build-17655-starts-transition-to-the-net-adapter-framework/
Today Microsoft released Windows 10 Insider Build 17655 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft begins its first step of transitioning the Windows network stack to use the Net Adapter framework. The first network component to take advantage of this framework is a new driver for mobile broadband. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-rs5-build-17655-starts-transition-to-the-net-adapter-framework/
BleepingComputer
Windows Insider RS5 Build 17655 Starts Transition to the Net Adapter Framework
Today Microsoft released Windows 10 Insider Build 17655 to insiders on the Redstone 5 Skip Ahead ring. In this build, Microsoft begins its first step of transitioning the Windows network stack to use the Net Adapter framework. The first network componentβ¦
Hackers Don't Give Site Owners Time to Patch, Start Exploiting New Drupal Flaw Within Hours
Five hours after the Drupal team published a security update for the Drupal CMS, hackers have found a way to weaponize the patched vulnerability, and are actively exploiting it in the wild. [...]
https://www.bleepingcomputer.com/news/security/hackers-dont-give-site-owners-time-to-patch-start-exploiting-new-drupal-flaw-within-hours/
Five hours after the Drupal team published a security update for the Drupal CMS, hackers have found a way to weaponize the patched vulnerability, and are actively exploiting it in the wild. [...]
https://www.bleepingcomputer.com/news/security/hackers-dont-give-site-owners-time-to-patch-start-exploiting-new-drupal-flaw-within-hours/
BleepingComputer
Hackers Don't Give Site Owners Time to Patch, Start Exploiting New Drupal Flaw Within Hours
Five hours after the Drupal team published a security update for the Drupal CMS, hackers have found a way to weaponize the patched vulnerability, and are actively exploiting it in the wild.
Ski Lift in Austria Left Control Panel Open on the Internet
Officials from the city of Innsbruck in Austria have shut down a local ski lift after two security researchers found its control panel open wide on the Internet, and allowing anyone to take control of the ski lift's operational settings. [...]
https://www.bleepingcomputer.com/news/security/ski-lift-in-austria-left-control-panel-open-on-the-internet/
Officials from the city of Innsbruck in Austria have shut down a local ski lift after two security researchers found its control panel open wide on the Internet, and allowing anyone to take control of the ski lift's operational settings. [...]
https://www.bleepingcomputer.com/news/security/ski-lift-in-austria-left-control-panel-open-on-the-internet/
BleepingComputer
Ski Lift in Austria Left Control Panel Open on the Internet
Officials from the city of Innsbruck in Austria have shut down a local ski lift after two security researchers found its control panel open wide on the Internet, and allowing anyone to take control of the ski lift's operational settings.
Police Shut Down Anon-IB, an Infamous Revenge Porn Forum
Dutch police announced today that they had seized the servers of Anon-IB, a notorious online portal where users would share pictures of revenge porn and child pornography. [...]
https://www.bleepingcomputer.com/news/security/police-shut-down-anon-ib-an-infamous-revenge-porn-forum/
Dutch police announced today that they had seized the servers of Anon-IB, a notorious online portal where users would share pictures of revenge porn and child pornography. [...]
https://www.bleepingcomputer.com/news/security/police-shut-down-anon-ib-an-infamous-revenge-porn-forum/
BleepingComputer
Police Shut Down Anon-IB, an Infamous Revenge Porn Forum
Dutch police announced today that they had seized the servers of Anon-IB, a notorious online portal where users would share pictures of revenge porn and child pornography.
New C# Ransomware Compiles itself at Runtime
A new in-development ransomware was discovered that has an interesting characteristic. Instead of the distributed executable performing the ransomware functionality, the executables compiles an embedded encrypted C# program at runtime and launches it directly into memory. [...]
https://www.bleepingcomputer.com/news/security/new-c-ransomware-compiles-itself-at-runtime/
A new in-development ransomware was discovered that has an interesting characteristic. Instead of the distributed executable performing the ransomware functionality, the executables compiles an embedded encrypted C# program at runtime and launches it directly into memory. [...]
https://www.bleepingcomputer.com/news/security/new-c-ransomware-compiles-itself-at-runtime/
BleepingComputer
New C# Ransomware Compiles itself at Runtime
A new in-development ransomware was discovered that has an interesting characteristic. Instead of the distributed executable performing the ransomware functionality, the executables compiles an embedded encrypted C# program at runtime and launches it directlyβ¦
Exposed MongoDB Server Exposes Details of Cryptocurrency Users
Security researchers have stumbled across a MongoDB database containing the personal details of over 25,000 users who invested in or received Bezop (BEZ) cryptocurrency. [...]
https://www.bleepingcomputer.com/news/security/exposed-mongodb-server-exposes-details-of-cryptocurrency-users/
Security researchers have stumbled across a MongoDB database containing the personal details of over 25,000 users who invested in or received Bezop (BEZ) cryptocurrency. [...]
https://www.bleepingcomputer.com/news/security/exposed-mongodb-server-exposes-details-of-cryptocurrency-users/
BleepingComputer
Exposed MongoDB Server Exposes Details of Cryptocurrency Users
Security researchers have stumbled across a MongoDB database containing the personal details of over 25,000 users who invested in or received Bezop (BEZ) cryptocurrency.
North Korea's Elites Are Ditching Facebook for Chinese Social Networks
Following the publication of a report in July 2017, North Korea's elites, some of the country's few citizens allowed on the Internet, have greatly altered their online behavior, and are now obfuscating their browsing activity, and have ditched US websites like Facebook or Instagram for alternative Chinese social networks. [...]
https://www.bleepingcomputer.com/news/technology/north-koreas-elites-are-ditching-facebook-for-chinese-social-networks/
Following the publication of a report in July 2017, North Korea's elites, some of the country's few citizens allowed on the Internet, have greatly altered their online behavior, and are now obfuscating their browsing activity, and have ditched US websites like Facebook or Instagram for alternative Chinese social networks. [...]
https://www.bleepingcomputer.com/news/technology/north-koreas-elites-are-ditching-facebook-for-chinese-social-networks/
BleepingComputer
North Korea's Elites Are Ditching Facebook for Chinese Social Networks
Following the publication of a report in July 2017, North Korea's elites, some of the country's few citizens allowed on the Internet, have greatly altered their online behavior, and are now obfuscating their browsing activity, and have ditched US websitesβ¦
World's Largest Spam Botnet Finds a New Way to Avoid Detection... For Now
Necurs, the world's largest spam botnet, with millions of infected computers under its control, has updated its arsenal and is currently utilizing a new technique to infect victims. [...]
https://www.bleepingcomputer.com/news/security/worlds-largest-spam-botnet-finds-a-new-way-to-avoid-detection-for-now/
Necurs, the world's largest spam botnet, with millions of infected computers under its control, has updated its arsenal and is currently utilizing a new technique to infect victims. [...]
https://www.bleepingcomputer.com/news/security/worlds-largest-spam-botnet-finds-a-new-way-to-avoid-detection-for-now/
BleepingComputer
World's Largest Spam Botnet Finds a New Way to Avoid Detection... For Now
Necurs, the world's largest spam botnet, with millions of infected computers under its control, has updated its arsenal and is currently utilizing a new technique to infect victims.
North Korean Hackers Are up to No Good Again
For a month leading up to today's historic meet between North and South Korea's presidents, a North Korean hacking group has amplified operations and has targeted a wide variety of business sectors in at least 17 countries. The purpose of this campaign was to infect organizations, perform reconnaissance, and steal sensitive data. [...]
https://www.bleepingcomputer.com/news/security/north-korean-hackers-are-up-to-no-good-again/
For a month leading up to today's historic meet between North and South Korea's presidents, a North Korean hacking group has amplified operations and has targeted a wide variety of business sectors in at least 17 countries. The purpose of this campaign was to infect organizations, perform reconnaissance, and steal sensitive data. [...]
https://www.bleepingcomputer.com/news/security/north-korean-hackers-are-up-to-no-good-again/
BleepingComputer
North Korean Hackers Are up to No Good Again
For a month leading up to today's historic meet between North and South Korea's presidents, a North Korean hacking group has amplified operations and has targeted a wide variety of business sectors in at least 17 countries. The purpose of this campaign wasβ¦
PDF Files Can Be Abused to Steal Windows Credentials
PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security researcher with cyber-security Check Point. [...]
https://www.bleepingcomputer.com/news/security/pdf-files-can-be-abused-to-steal-windows-credentials/
PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security researcher with cyber-security Check Point. [...]
https://www.bleepingcomputer.com/news/security/pdf-files-can-be-abused-to-steal-windows-credentials/
BleepingComputer
PDF Files Can Be Abused to Steal Windows Credentials
PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security researcher with cyber-security Check Point.
Microsoft's Windows 10 "April 2018 Update" Being Released on Monday
Microsoft announced today that the next Windows 10 feature update will be called "April 2018 Update" and will be released this Monday. With this update Microsoft is focusing on helping people making the most of their time by introducing new features that make it easier and faster to finish tasks. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-windows-10-april-2018-update-being-released-on-monday/
Microsoft announced today that the next Windows 10 feature update will be called "April 2018 Update" and will be released this Monday. With this update Microsoft is focusing on helping people making the most of their time by introducing new features that make it easier and faster to finish tasks. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-windows-10-april-2018-update-being-released-on-monday/
BleepingComputer
Microsoft's Windows 10 "April 2018 Update" Being Released on Monday
Microsoft announced today that the next Windows 10 feature update will be called "April 2018 Update" and will be released this Monday. With this update Microsoft is focusing on helping people making the most of their time by introducing new features thatβ¦