Newark's New Mass Surveillance Program Criticized by Civil Liberties Org
A network of surveillance cameras in various locations throughout Newark, NJ will enable people to monitor these locations for criminal activity. The program, the Citizen Virtual Patrol, has been described by local leaders as "a block watch on steroids". [...]
https://www.bleepingcomputer.com/news/legal/newarks-new-mass-surveillance-program-criticized-by-civil-liberties-org/
A network of surveillance cameras in various locations throughout Newark, NJ will enable people to monitor these locations for criminal activity. The program, the Citizen Virtual Patrol, has been described by local leaders as "a block watch on steroids". [...]
https://www.bleepingcomputer.com/news/legal/newarks-new-mass-surveillance-program-criticized-by-civil-liberties-org/
BleepingComputer
Newark's New Mass Surveillance Program Criticized by Civil Liberties Org
A network of surveillance cameras in various locations throughout Newark, NJ will enable people to monitor these locations for criminal activity. The program, the Citizen Virtual Patrol, has been described by local leaders as "a block watch on steroids".
Microsoft Is No Longer Providing Offline MSI Symbol Packages
Microsoft has stated that they are no longer offering offline symbol packages as a downloadable MSI. For those who need to download symbols to debug their applications or Windows, you will now need to connect directly to their symbol server or use the symchk utility to download them. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-no-longer-providing-offline-msi-symbol-packages/
Microsoft has stated that they are no longer offering offline symbol packages as a downloadable MSI. For those who need to download symbols to debug their applications or Windows, you will now need to connect directly to their symbol server or use the symchk utility to download them. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-no-longer-providing-offline-msi-symbol-packages/
BleepingComputer
Microsoft Is No Longer Providing Offline MSI Symbol Packages
Microsoft has stated that they are no longer offering offline symbol packages as a downloadable MSI. For those who need to download symbols to debug their applications or Windows, you will now need to connect directly to their symbol server or use the symchkβ¦
Pretty Serious Security Flaw Fixed in Popular ICS Software
Schneider Electric, one of the largest makers of hardware and software products used across critical industry verticals has patched a vulnerability in two software products βInduSoft Web Studio and InTouch Machine Edition. [...]
https://www.bleepingcomputer.com/news/security/pretty-serious-security-flaw-fixed-in-popular-ics-software/
Schneider Electric, one of the largest makers of hardware and software products used across critical industry verticals has patched a vulnerability in two software products βInduSoft Web Studio and InTouch Machine Edition. [...]
https://www.bleepingcomputer.com/news/security/pretty-serious-security-flaw-fixed-in-popular-ics-software/
BleepingComputer
Pretty Serious Security Flaw Fixed in Popular ICS Software
Schneider Electric, one of the largest makers of hardware and software products used across critical industry verticals has patched a vulnerability in two software products βInduSoft Web Studio and InTouch Machine Edition.
Somebody Tried to Hide a Backdoor in a Popular JavaScript npm Package
The Node Package Manager (npm) team avoided a disaster today when it discovered and blocked the distribution of a cleverly hidden backdoor mechanism inside a popular βalbeit deprecatedβ JavaScript package. [...]
https://www.bleepingcomputer.com/news/security/somebody-tried-to-hide-a-backdoor-in-a-popular-javascript-npm-package/
The Node Package Manager (npm) team avoided a disaster today when it discovered and blocked the distribution of a cleverly hidden backdoor mechanism inside a popular βalbeit deprecatedβ JavaScript package. [...]
https://www.bleepingcomputer.com/news/security/somebody-tried-to-hide-a-backdoor-in-a-popular-javascript-npm-package/
BleepingComputer
Somebody Tried to Hide a Backdoor in a Popular JavaScript npm Package
The Node Package Manager (npm) team avoided a disaster today when it discovered and blocked the distribution of a cleverly hidden backdoor mechanism inside a popular βalbeit deprecatedβ JavaScript package.
GLitch Technique Enrolls Graphics Cards in Rowhammer Attacks on Android Phones
A team of academics from the Vrije University in Amsterdam has developed a new hacking technique that uses embedded graphics processing units (GPUs) and support for WebGL to carry out a Rowhammer attack. [...]
https://www.bleepingcomputer.com/news/security/glitch-technique-enrolls-graphics-cards-in-rowhammer-attacks-on-android-phones/
A team of academics from the Vrije University in Amsterdam has developed a new hacking technique that uses embedded graphics processing units (GPUs) and support for WebGL to carry out a Rowhammer attack. [...]
https://www.bleepingcomputer.com/news/security/glitch-technique-enrolls-graphics-cards-in-rowhammer-attacks-on-android-phones/
BleepingComputer
GLitch Technique Enrolls Graphics Cards in Rowhammer Attacks on Android Phones
A team of academics from the Vrije University in Amsterdam has developed a new hacking technique that uses embedded graphics processing units (GPUs) and support for WebGL to carry out a Rowhammer attack.
Facebook's Phishing Detection Tool Now Recognizes Homograph Attacks
Facebook has updated a phishing detection toolkit it developed two years ago. The update now allows webmasters who sign up for the tool to detect homograph (Unicode-based lookalike) domains created for their websites. [...]
https://www.bleepingcomputer.com/news/security/facebooks-phishing-detection-tool-now-recognizes-homograph-attacks/
Facebook has updated a phishing detection toolkit it developed two years ago. The update now allows webmasters who sign up for the tool to detect homograph (Unicode-based lookalike) domains created for their websites. [...]
https://www.bleepingcomputer.com/news/security/facebooks-phishing-detection-tool-now-recognizes-homograph-attacks/
BleepingComputer
Facebook's Phishing Detection Tool Now Recognizes Homograph Attacks
Facebook has updated a phishing detection toolkit it developed two years ago. The update now allows webmasters who sign up for the tool to detect homograph (Unicode-based lookalike) domains created for their websites.
Twitter Admits Recording Plaintext Passwords in Internal Logs, Just Like GitHub
Following an internal audit, Twitter admitted today that due to a bug in its password storage mechanism it accidentally logged some users' passwords in internal logs. [...]
https://www.bleepingcomputer.com/news/security/twitter-admits-recording-plaintext-passwords-in-internal-logs-just-like-github/
Following an internal audit, Twitter admitted today that due to a bug in its password storage mechanism it accidentally logged some users' passwords in internal logs. [...]
https://www.bleepingcomputer.com/news/security/twitter-admits-recording-plaintext-passwords-in-internal-logs-just-like-github/
BleepingComputer
Twitter Admits Recording Plaintext Passwords in Internal Logs, Just Like GitHub
Following an internal audit, Twitter admitted today that due to a bug in its password storage mechanism it accidentally logged some users' passwords in internal logs.
Microsoft Released Hyper-V Debug Symbols for the Hyper-V Bug Bounty Program
Microsoft has released debugging symbols for many of the core components of Hyper-V. Using these debugging symbols, security researchers can analyze them for vulnerabilities in order to submit them to the Hyper-V bug bounty program. [...]
https://www.bleepingcomputer.com/news/security/microsoft-released-hyper-v-debug-symbols-for-the-hyper-v-bug-bounty-program/
Microsoft has released debugging symbols for many of the core components of Hyper-V. Using these debugging symbols, security researchers can analyze them for vulnerabilities in order to submit them to the Hyper-V bug bounty program. [...]
https://www.bleepingcomputer.com/news/security/microsoft-released-hyper-v-debug-symbols-for-the-hyper-v-bug-bounty-program/
BleepingComputer
Microsoft Released Hyper-V Debug Symbols for the Hyper-V Bug Bounty Program
Microsoft has released debugging symbols for many of the core components of Hyper-V. Using these debugging symbols, security researchers can analyze them for vulnerabilities in order to submit them to the Hyper-V bug bounty program.
Windows Insider Build 17661 Introduces a Modern Screenshot Feature
Today Microsoft released Windows 10 Insider Preview Build 17661 to insiders in the fast and skip-ahead rings. In this build, Microsoft renamed Windows Defender Security Center to Windows Security, introduced a new screenshot feature, and continued with the Sets experiment. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-17661-introduces-a-modern-screenshot-feature/
Today Microsoft released Windows 10 Insider Preview Build 17661 to insiders in the fast and skip-ahead rings. In this build, Microsoft renamed Windows Defender Security Center to Windows Security, introduced a new screenshot feature, and continued with the Sets experiment. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-17661-introduces-a-modern-screenshot-feature/
BleepingComputer
Windows Insider Build 17661 Introduces a Modern Screenshot Feature
Today Microsoft released Windows 10 Insider Preview Build 17661 to insiders in the fast and skip-ahead rings. In this build, Microsoft renamed Windows Defender Security Center to Windows Security, introduced a new screenshot feature, and continued with theβ¦
Chinese Cyberspies Appear to be Preparing Supply-Chain Attacks
Chinese cyberspies are evolving their tactics, focusing on IT staffers, relying more and more on spear-phishing instead of malware, and gathering code signing certificates from hacked software companies in the preparation of future supply-chain attacks. [...]
https://www.bleepingcomputer.com/news/security/chinese-cyberspies-appear-to-be-preparing-supply-chain-attacks/
Chinese cyberspies are evolving their tactics, focusing on IT staffers, relying more and more on spear-phishing instead of malware, and gathering code signing certificates from hacked software companies in the preparation of future supply-chain attacks. [...]
https://www.bleepingcomputer.com/news/security/chinese-cyberspies-appear-to-be-preparing-supply-chain-attacks/
BleepingComputer
Chinese Cyberspies Appear to be Preparing Supply-Chain Attacks
Chinese cyberspies are evolving their tactics, focusing on IT staffers, relying more and more on spear-phishing instead of malware, and gathering code signing certificates from hacked software companies in the preparation of future supply-chain attacks.
Vulnerabilities Affecting Over One Million Dasan GPON Routers Are Now Under Attack
Two vulnerabilities affecting over one million routers, and disclosed earlier this week, are now under attack by botnet herders, who are trying to gather the vulnerable devices under their control. [...]
https://www.bleepingcomputer.com/news/security/vulnerabilities-affecting-over-one-million-dasan-gpon-routers-are-now-under-attack/
Two vulnerabilities affecting over one million routers, and disclosed earlier this week, are now under attack by botnet herders, who are trying to gather the vulnerable devices under their control. [...]
https://www.bleepingcomputer.com/news/security/vulnerabilities-affecting-over-one-million-dasan-gpon-routers-are-now-under-attack/
GandCrab Version 3 Released With Autorun Feature and Desktop Background
GandCrab version 3 was released earlier this week with a few noticeable changes. The most noticeable change is the addition of a desktop background and an autorun that causes the ransomware to start automatically when you reboot the computer. [...]
https://www.bleepingcomputer.com/news/security/gandcrab-version-3-released-with-autorun-feature-and-desktop-background/
GandCrab version 3 was released earlier this week with a few noticeable changes. The most noticeable change is the addition of a desktop background and an autorun that causes the ransomware to start automatically when you reboot the computer. [...]
https://www.bleepingcomputer.com/news/security/gandcrab-version-3-released-with-autorun-feature-and-desktop-background/
BleepingComputer
GandCrab Version 3 Released With Autorun Feature and Desktop Background
GandCrab version 3 was released earlier this week with a few noticeable changes. The most noticeable change is the addition of a desktop background and an autorun that causes the ransomware to start automatically when you reboot the computer.
Kaspersky Details New ZooPark APT Targeting Android Users
Security researchers from Kaspersky Lab published yesterday a report detailing the operations of a new cyber-espionage group that's been active in the Middle East region for the past three years. [...]
https://www.bleepingcomputer.com/news/security/kaspersky-details-new-zoopark-apt-targeting-android-users/
Security researchers from Kaspersky Lab published yesterday a report detailing the operations of a new cyber-espionage group that's been active in the Middle East region for the past three years. [...]
https://www.bleepingcomputer.com/news/security/kaspersky-details-new-zoopark-apt-targeting-android-users/
BleepingComputer
Kaspersky Details New ZooPark APT Targeting Android Users
Security researchers from Kaspersky Lab published yesterday a report detailing the operations of a new cyber-espionage group that's been active in the Middle East region for the past three years.
Google Says Chrome Now Blocks "About Half of Unwanted Autoplays"
Google said this week that Chrome 66 now blocks "about half" of the videos that feature auto-playing sound. Engineers added this feature in Chrome 66, released in mid-April. [...]
https://www.bleepingcomputer.com/news/google/google-says-chrome-now-blocks-about-half-of-unwanted-autoplays/
Google said this week that Chrome 66 now blocks "about half" of the videos that feature auto-playing sound. Engineers added this feature in Chrome 66, released in mid-April. [...]
https://www.bleepingcomputer.com/news/google/google-says-chrome-now-blocks-about-half-of-unwanted-autoplays/
BleepingComputer
Google Says Chrome Now Blocks "About Half of Unwanted Autoplays"
Google said this week that Chrome 66 now blocks "about half" of the videos that feature auto-playing sound. Engineers added this feature in Chrome 66, released in mid-April.
Firefox 60 to Show Sponsored Content for US Users
Mozilla announced this week plans to show sponsored content to US users starting with the release of Firefox 60. The sponsored content will appear as suggested stories inside Firefox New Tab page. The stories will be pulled from Pocket's recommendation list. [...]
https://www.bleepingcomputer.com/news/software/firefox-60-to-show-sponsored-content-for-us-users/
Mozilla announced this week plans to show sponsored content to US users starting with the release of Firefox 60. The sponsored content will appear as suggested stories inside Firefox New Tab page. The stories will be pulled from Pocket's recommendation list. [...]
https://www.bleepingcomputer.com/news/software/firefox-60-to-show-sponsored-content-for-us-users/
BleepingComputer
Firefox 60 to Show Sponsored Content for US Users
Mozilla announced this week plans to show sponsored content to US users starting with the release of Firefox 60. The sponsored content will appear as suggested stories inside Firefox New Tab page. The stories will be pulled from Pocket's recommendation list.
Knox County Tennessee Election Site Hit With DDOS Attack During Primary
On Tuesday the web site used to display the voting results for the Knox County, Tennessee mayoral primary was taken offline by a distributed denial-of-service attack. This prevented voters from being able to access the site and view the results of the primary. [...]
https://www.bleepingcomputer.com/news/security/knox-county-tennessee-election-site-hit-with-ddos-attack-during-primary/
On Tuesday the web site used to display the voting results for the Knox County, Tennessee mayoral primary was taken offline by a distributed denial-of-service attack. This prevented voters from being able to access the site and view the results of the primary. [...]
https://www.bleepingcomputer.com/news/security/knox-county-tennessee-election-site-hit-with-ddos-attack-during-primary/
BleepingComputer
Knox County Tennessee Election Site Hit With DDOS Attack During Primary
On Tuesday the web site used to display the voting results for the Knox County, Tennessee mayoral primary was taken offline by a distributed denial-of-service attack. This prevented voters from being able to access the site and view the results of the primary.
New Service Blocks EU Users So Companies Can Save Thousands on GDPR Compliance
A new service called GDPR Shield is making the rounds this week and for all the wrong reasons. The service, advertised as a piece of JavaScript that webmasters embed on their sites, blocks EU-based users from accessing a website, just so the parent company won't have to deal with GDPR compliance. [...]
https://www.bleepingcomputer.com/news/security/new-service-blocks-eu-users-so-companies-can-save-thousands-on-gdpr-compliance/
A new service called GDPR Shield is making the rounds this week and for all the wrong reasons. The service, advertised as a piece of JavaScript that webmasters embed on their sites, blocks EU-based users from accessing a website, just so the parent company won't have to deal with GDPR compliance. [...]
https://www.bleepingcomputer.com/news/security/new-service-blocks-eu-users-so-companies-can-save-thousands-on-gdpr-compliance/
BleepingComputer
New Service Blocks EU Users So Companies Can Save Thousands on GDPR Compliance
A new service called GDPR Shield is making the rounds this week and for all the wrong reasons. The service, advertised as a piece of JavaScript that webmasters embed on their sites, blocks EU-based users from accessing a website, just so the parent companyβ¦
Chrome Users Reporting Freezes & Timeouts After Windows 10 April Update
Windows 10 users who have installed the April 2018 Update (build 1803) are reporting freezes or connection problems when using Chrome or Chromium based applications. When these freezes occur, it turns the screen black and Windows becomes completely unresponsive until the user reboots the computer or restarts their graphic driver. [...]
https://www.bleepingcomputer.com/news/microsoft/chrome-users-reporting-freezes-and-timeouts-after-windows-10-april-update/
Windows 10 users who have installed the April 2018 Update (build 1803) are reporting freezes or connection problems when using Chrome or Chromium based applications. When these freezes occur, it turns the screen black and Windows becomes completely unresponsive until the user reboots the computer or restarts their graphic driver. [...]
https://www.bleepingcomputer.com/news/microsoft/chrome-users-reporting-freezes-and-timeouts-after-windows-10-april-update/
BleepingComputer
Chrome Users Reporting Freezes & Timeouts After Windows 10 April Update
Windows 10 users who have installed the April 2018 Update (build 1803) are reporting freezes or connection problems when using Chrome or Chromium based applications. When these freezes occur, it turns the screen black and Windows becomes completely unresponsiveβ¦
Russia Blocks 50 VPNs and Proxy Services Providing Access to Telegram
Roskomnadzor, Russia's telecommunications watchdog, blocked last week, on Thursday, May 3, 2018, access to over 50 VPN and proxy services. [...]
https://www.bleepingcomputer.com/news/government/russia-blocks-50-vpns-and-proxy-services-providing-access-to-telegram/
Roskomnadzor, Russia's telecommunications watchdog, blocked last week, on Thursday, May 3, 2018, access to over 50 VPN and proxy services. [...]
https://www.bleepingcomputer.com/news/government/russia-blocks-50-vpns-and-proxy-services-providing-access-to-telegram/
BleepingComputer
Russia Blocks 50 VPNs and Proxy Services Providing Access to Telegram
Roskomnadzor, Russia's telecommunications watchdog, blocked last week, on Thursday, May 3, 2018, access to over 50 VPN and proxy services.
Drupal Sites Fall Victims to Cryptojacking Campaigns
After the publication of two severe security flaws in the Drupal CMS, cybercrime groups have turned their sights on this web technology in the hopes of finding new ground to plant malware on servers and make money through illegal cryptocurrency mining. [...]
https://www.bleepingcomputer.com/news/security/drupal-sites-fall-victims-to-cryptojacking-campaigns/
After the publication of two severe security flaws in the Drupal CMS, cybercrime groups have turned their sights on this web technology in the hopes of finding new ground to plant malware on servers and make money through illegal cryptocurrency mining. [...]
https://www.bleepingcomputer.com/news/security/drupal-sites-fall-victims-to-cryptojacking-campaigns/
BleepingComputer
Drupal Sites Fall Victims to Cryptojacking Campaigns
After the publication of two severe security flaws in the Drupal CMS, cybercrime groups have turned their sights on this web technology in the hopes of finding new ground to plant malware on servers and make money through illegal cryptocurrency mining.
DDoSer Who Terrorized German and UK Firms Gets Off Without Jail Time
A German hacker who launched DDoS attacks and tried to extort ransom payments from German and UK firms was sentenced last month to one year and ten months of probation. [...]
https://www.bleepingcomputer.com/news/security/ddoser-who-terrorized-german-and-uk-firms-gets-off-without-jail-time/
A German hacker who launched DDoS attacks and tried to extort ransom payments from German and UK firms was sentenced last month to one year and ten months of probation. [...]
https://www.bleepingcomputer.com/news/security/ddoser-who-terrorized-german-and-uk-firms-gets-off-without-jail-time/
BleepingComputer
DDoSer Who Terrorized German and UK Firms Gets Off Without Jail Time
A German hacker who launched DDoS attacks and tried to extort ransom payments from German and UK firms was sentenced last month to one year and ten months of probation.