BleepingComputer
10.3K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Latest news and stories from BleepingComputer.com
Turkish Hackers Are Playing a DDoS-for-Points Game
A Turkish hacking crew is running a DDoS-for-Points platform where participants can earn points if they carry out DDoS attacks against a list of predetermined targets, points they can exchange later on for various online click-fraud tools. [...]
Latest news and stories from BleepingComputer.com
Hacker Steals $300,000 from Major Cryptocurrency Investor
An unknown hacker has stolen at least $300,000 in Augur and Ether cryptocurrency from Bo Shen, the founder of venture capital firm Fenbushi Capital, and one of the early adopters of many of today's cryptocurrencies. [...]
Latest news and stories from BleepingComputer.com
Cryptography Expert Matthew Green to Audit OpenVPN Security
OpenVPN, one of the most popular VPN clients today, is to receive a security audit from Dr. Matthew Green, a famous US cryptographer and assistant professor at the Department of Computer Science at the Johns Hopkins University. [...]
Latest news and stories from BleepingComputer.com
Wrongfully Accused Movie Pirate to Receive $17,000 from Overaggressive Filmmaker
A judge in Oregon has ruled that a Nevada movie company must pay over $17,000 in financial compensations to a man it wrongfully accused of copyright infringement and insisted on pursuing the case with "overaggressive litigation tactics," even after it became clear that the accused man was not responsible for the supposed crime. [...]
Latest news and stories from BleepingComputer.com
Crooks Start Deploying New "August" Infostealer
During the month of November 2016, a cyber-crime group has started deploying a new malware family nicknamed "August," used mainly for information gathering and reconnaissance on the infected target's computer. [...]
Latest news and stories from BleepingComputer.com
New Scheme: Spread Popcorn Time Ransomware, get chance of free Decryption Key
A in-development ransomware was discovered called Popcorn Time that intends to give victim's a very unusual way of getting a free decryption key.  With Popcorn Time, not only can a victim pay a ransom to get their files back, but they can also try to infect two other people and have them pay the ransom in order to get a free key. [...]
Latest news and stories from BleepingComputer.com
Researchers Point Out "Theoretical" Security Flaws in AMD's Upcoming Zen CPU
The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, by Felicitas Hetzelt and Robert Buhren, two scientists at the Security in Telecommunications Department at the Technical University of Berlin, Germany. [...]
Latest news and stories from BleepingComputer.com
The Week in Ransomware - December 9th 2016 - Osiris, PornoPoker, Popcorn Time, Locked-In, and More

A bunch of small ransomware variants were released, but we did have a new release of the Locky Osiris variant and the interesting Popcorn Time. To me the most interesting story is Popcorn Time as they offer victims the ability to get a free decryption key if they can get two other people infected and have them pay the ransom. [...]
Latest news and stories from BleepingComputer.com
CERT Warns Users to Stop Using Two Netgear Router Models Due to Security Flaw

The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security (DHS), has published a security alert yesterday, warning owners of Netgear R6400 and R7000 models against using their routers for the time being, because of a severe security flaw. [...]
Latest news and stories from BleepingComputer.com
Five-Year-Old Bait-and-Switch Linux Security Flaw Patched

Maintainers of the Linux Kernel project have fixed three security flaws this week, among which there was a serious bug that lingered in the kernel for the past five years and allowed attackers to bypass some OS security systems and open a root shell. [...]
Latest news and stories from BleepingComputer.com
First Version of Sandboxed Tor Browser Available

Developers at the Tor Project have started working on a sandboxed version of the Tor Browser, currently available as an early alpha version for Linux systems. Currently, this version is in an early alpha stage, and only available for Linux. There are no binaries available, and users must compile it themselves from the source code. [...]