Revenge Hacks Cost Former Employee 34 Months in Prison, $1.1 Million in Damages
Brian P. Johnson, 44, of Baton Rouge, Louisiana, will have to spend the next 34 months in federal prison and pay $1,134,828 in damages after hacking his former employer shortly after being fired. [...]
https://www.bleepingcomputer.com/news/security/revenge-hacks-cost-former-employee-34-months-in-prison-1-1-million-in-damages/
Brian P. Johnson, 44, of Baton Rouge, Louisiana, will have to spend the next 34 months in federal prison and pay $1,134,828 in damages after hacking his former employer shortly after being fired. [...]
https://www.bleepingcomputer.com/news/security/revenge-hacks-cost-former-employee-34-months-in-prison-1-1-million-in-damages/
BleepingComputer
Revenge Hacks Cost Former Employee 34 Months in Prison, $1.1 Million in Damages
Brian P. Johnson, 44, of Baton Rouge, Louisiana, will have to spend the next 34 months in federal prison and pay $1,134,828 in damages after hacking his former employer shortly after being fired.
'Android for Work' Security Containers Bypassed with Relative Ease
Mobile security experts from Skycure have found two methods for bypassing the security containers put around "Android for Work," allowing attackers to access business data saved in this seemingly secure environment. [...]
https://www.bleepingcomputer.com/news/mobile/android-for-work-security-containers-bypassed-with-relative-ease/
Mobile security experts from Skycure have found two methods for bypassing the security containers put around "Android for Work," allowing attackers to access business data saved in this seemingly secure environment. [...]
https://www.bleepingcomputer.com/news/mobile/android-for-work-security-containers-bypassed-with-relative-ease/
BleepingComputer
'Android for Work' Security Containers Bypassed with Relative Ease
Mobile security experts from Skycure have found two methods for bypassing the security containers put around "Android for Work," allowing attackers to access business data saved in this seemingly secure environment.
The Week in Ransomware - February 17th 2017 - Live Hermes Reversing & SCADA POC Ransomware
It was a very slow week when it comes to ransomware, which is a great thing. Hopefully it will stay that way.The biggest news this week is the POC ransomware targeting ICS/SCADA that was demonstrated at RSA this week and the live streaming by Fabian Wosar of him reversing and cracking a a new ransomware called Hermes. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-february-17th-2017-live-hermes-reversing-and-scada-poc-ransomware/
It was a very slow week when it comes to ransomware, which is a great thing. Hopefully it will stay that way.The biggest news this week is the POC ransomware targeting ICS/SCADA that was demonstrated at RSA this week and the live streaming by Fabian Wosar of him reversing and cracking a a new ransomware called Hermes. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-february-17th-2017-live-hermes-reversing-and-scada-poc-ransomware/
BleepingComputer
The Week in Ransomware - February 17th 2017 - Live Hermes Reversing, & SCADA POC Ransomware
It was a very slow week when it comes to ransomware, which is a great thing. Hopefully it will stay that way.The biggest news this week is the POC ransomware targeting ICS/SCADA that was demonstrated at RSA this week and the live streaming by Fabian Wosarβ¦
A Corporate Inbox Receives 4.3 Times More Malware Than a Regular Inbox
Corporate email addresses are 4.3 more likely to receive malware compared to personal accounts, 6.2 times more likely to receive phishing lures, and 0.4 times less likely to receive spam. [...]
https://www.bleepingcomputer.com/news/security/a-corporate-inbox-receives-4-3-times-more-malware-than-a-regular-inbox/
Corporate email addresses are 4.3 more likely to receive malware compared to personal accounts, 6.2 times more likely to receive phishing lures, and 0.4 times less likely to receive spam. [...]
https://www.bleepingcomputer.com/news/security/a-corporate-inbox-receives-4-3-times-more-malware-than-a-regular-inbox/
BleepingComputer
A Corporate Inbox Receives 4.3 Times More Malware Than a Regular Inbox
Corporate email addresses are 4.3 more likely to receive malware compared to personal accounts, 6.2 times more likely to receive phishing lures, and 0.4 times less likely to receive spam.
Users Continue to Install Malware on Their Phone 5 Years After Adobe Discontinued Flash for Android
It is unbelievable that almost five years after Adobe announced it would stop developing Flash Player for Android, users are still installing a non-existent piece of software, which in almost all cases is just malware in disguise. [...]
https://www.bleepingcomputer.com/news/security/users-continue-to-install-malware-on-their-phone-5-years-after-adobe-discontinued-flash-for-android/
It is unbelievable that almost five years after Adobe announced it would stop developing Flash Player for Android, users are still installing a non-existent piece of software, which in almost all cases is just malware in disguise. [...]
https://www.bleepingcomputer.com/news/security/users-continue-to-install-malware-on-their-phone-5-years-after-adobe-discontinued-flash-for-android/
BleepingComputer
Users Continue to Install Malware on Their Phone 5 Years After Adobe Discontinued Flash for Android
It is unbelievable that almost five years after Adobe announced it would stop developing Flash Player for Android, users are still installing a non-existent piece of software, which in almost all cases is just malware in disguise.
A Source Code Typo Allowed an Attacker to Steal 370,000 Zerocoin ($592,000)
The Zcoin project announced yesterday that a typo in the Zerocoin source code allowed an attacker to steal 370,000 Zerocoin, which is about $592,000 at today's price. [...]
https://www.bleepingcomputer.com/news/security/a-source-code-typo-allowed-an-attacker-to-steal-370-000-zerocoin-592-000-/
The Zcoin project announced yesterday that a typo in the Zerocoin source code allowed an attacker to steal 370,000 Zerocoin, which is about $592,000 at today's price. [...]
https://www.bleepingcomputer.com/news/security/a-source-code-typo-allowed-an-attacker-to-steal-370-000-zerocoin-592-000-/
BleepingComputer
A Source Code Typo Allowed an Attacker to Steal 370,000 Zerocoin ($592,000)
The Zcoin project announced yesterday that a typo in the Zerocoin source code allowed an attacker to steal 370,000 Zerocoin, which is about $592,000 at today's price.
After Microsoft Delayed Patch Tuesday, Google Discloses Windows Bug
For the second time in three months, Google engineers have disclosed a bug in the Windows OS without Microsoft having released a fix before Google's announcement. [...]
https://www.bleepingcomputer.com/news/microsoft/after-microsoft-delayed-patch-tuesday-google-discloses-windows-bug/
For the second time in three months, Google engineers have disclosed a bug in the Windows OS without Microsoft having released a fix before Google's announcement. [...]
https://www.bleepingcomputer.com/news/microsoft/after-microsoft-delayed-patch-tuesday-google-discloses-windows-bug/
BleepingComputer
After Microsoft Delayed Patch Tuesday, Google Discloses Windows Bug
For the second time in three months, Google engineers have disclosed a bug in the Windows OS without Microsoft having released a fix before Google's announcement.
Germany Bans "My Friend Cayla" Toys Over Hacking Fears and Data Collection
Germany's telecommunications regulator has issued a ban against a line of smart toys called "My Friend Cayla," calling the toy an espionage device, and recommending that parents destroy all toy instances at once. [...]
https://www.bleepingcomputer.com/news/security/germany-bans-my-friend-cayla-toys-over-hacking-fears-and-data-collection/
Germany's telecommunications regulator has issued a ban against a line of smart toys called "My Friend Cayla," calling the toy an espionage device, and recommending that parents destroy all toy instances at once. [...]
https://www.bleepingcomputer.com/news/security/germany-bans-my-friend-cayla-toys-over-hacking-fears-and-data-collection/
BleepingComputer
Germany Bans "My Friend Cayla" Toys Over Hacking Fears and Data Collection
Germany's telecommunications regulator has issued a ban against a line of smart toys called "My Friend Cayla," calling the toy an espionage device, and recommending that parents destroy all toy instances at once.
Malware Operator Who Tried to Send Heroin to Brian Krebs Gets 41 Months in Prison
A malware operator and administrator of two online hacking forums was sentenced last week to 41 months in prison for his role in the distribution of the Zeus malware and for selling online the personal data he stole from infected victims. [...]
https://www.bleepingcomputer.com/news/security/malware-operator-who-tried-to-send-heroin-to-brian-krebs-gets-41-months-in-prison/
A malware operator and administrator of two online hacking forums was sentenced last week to 41 months in prison for his role in the distribution of the Zeus malware and for selling online the personal data he stole from infected victims. [...]
https://www.bleepingcomputer.com/news/security/malware-operator-who-tried-to-send-heroin-to-brian-krebs-gets-41-months-in-prison/
BleepingComputer
Malware Operator Who Tried to Send Heroin to Brian Krebs Gets 41 Months in Prison
A malware operator and administrator of two online hacking forums was sentenced last week to 41 months in prison for his role in the distribution of the Zeus malware and for selling online the personal data he stole from infected victims.
UGNazi Hacker Who Doxed Trump, Clinton, Obama, and Others Gets No Prison Time
Eric Taylor, known online under the nickname of Cosmo the God, was sentenced on Friday last week to three years probation for a series of hacks the teenager committed in 2011 and 2012. [...]
https://www.bleepingcomputer.com/news/security/ugnazi-hacker-who-doxed-trump-clinton-obama-and-others-gets-no-prison-time/
Eric Taylor, known online under the nickname of Cosmo the God, was sentenced on Friday last week to three years probation for a series of hacks the teenager committed in 2011 and 2012. [...]
https://www.bleepingcomputer.com/news/security/ugnazi-hacker-who-doxed-trump-clinton-obama-and-others-gets-no-prison-time/
BleepingComputer
UGNazi Hacker Who Doxed Trump, Clinton, Obama, and Others Gets No Prison Time
Eric Taylor, known online under the nickname of Cosmo the God, was sentenced on Friday last week to three years probation for a series of hacks the teenager committed in 2011 and 2012.
Mongoaudit Helps You Secure MongoDB Databases
A new tool developed by engineers at Stampery can help database administrators audit the security features of their current MongoDB installations, and take precautionary measures to prevent future exploitation. [...]
https://www.bleepingcomputer.com/news/security/mongoaudit-helps-you-secure-mongodb-databases/
A new tool developed by engineers at Stampery can help database administrators audit the security features of their current MongoDB installations, and take precautionary measures to prevent future exploitation. [...]
https://www.bleepingcomputer.com/news/security/mongoaudit-helps-you-secure-mongodb-databases/
BleepingComputer
Mongoaudit Helps You Secure MongoDB Databases
A new tool developed by engineers at Stampery can help database administrators audit the security features of their current MongoDB installations, and take precautionary measures to prevent future exploitation.
Ramnit Botnet Comeback Continues in 2017
Ramnit, a banking trojan whose botnet survived a takedown attempt in 2015, is continuing its comeback in 2017, after coming back to life at the end of 2015 and regaining its strength over the course of 2016. [...]
https://www.bleepingcomputer.com/news/security/ramnit-botnet-comeback-continues-in-2017/
Ramnit, a banking trojan whose botnet survived a takedown attempt in 2015, is continuing its comeback in 2017, after coming back to life at the end of 2015 and regaining its strength over the course of 2016. [...]
https://www.bleepingcomputer.com/news/security/ramnit-botnet-comeback-continues-in-2017/
BleepingComputer
Ramnit Botnet Comeback Continues in 2017
Ramnit, a banking trojan whose botnet survived a takedown attempt in 2015, is continuing its comeback in 2017, after coming back to life at the end of 2015 and regaining its strength over the course of 2016.
Malware Used to Attack Polish Banks Contained False Flags Blaming Russian Hackers
Malware samples used in the recent attacks against several Polish banks contained planted evidence that attempted to blame the attacks on Russian-speaking hackers. [...]
https://www.bleepingcomputer.com/news/security/malware-used-to-attack-polish-banks-contained-false-flags-blaming-russian-hackers/
Malware samples used in the recent attacks against several Polish banks contained planted evidence that attempted to blame the attacks on Russian-speaking hackers. [...]
https://www.bleepingcomputer.com/news/security/malware-used-to-attack-polish-banks-contained-false-flags-blaming-russian-hackers/
BleepingComputer
Malware Used to Attack Polish Banks Contained False Flags Blaming Russian Hackers
Malware samples used in the recent attacks against several Polish banks contained planted evidence that attempted to blame the attacks on Russian-speaking hackers.
PHP Becomes First Programming Language to Add Modern Cryptography Library in Its Core
The PHP team has unanimously voted to integrate the Libsodium library in the PHP core, and by doing so, becoming the first programming language to support a modern cryptography library by default. [...]
https://www.bleepingcomputer.com/news/security/php-becomes-first-programming-language-to-add-modern-cryptography-library-in-its-core/
The PHP team has unanimously voted to integrate the Libsodium library in the PHP core, and by doing so, becoming the first programming language to support a modern cryptography library by default. [...]
https://www.bleepingcomputer.com/news/security/php-becomes-first-programming-language-to-add-modern-cryptography-library-in-its-core/
BleepingComputer
PHP Becomes First Programming Language to Add Modern Cryptography Library in Its Core
The PHP team has unanimously voted to integrate the Libsodium library in the PHP core, and by doing so, becoming the first programming language to support a modern cryptography library by default.
Google, Bing Sign Anti-Piracy Deal That Will Demote Torrents in Search Results
Under the coordination of the UK government, rights holders and today's top two search engines have reached and signed an agreement that will demote piracy-related links in search results. [...]
https://www.bleepingcomputer.com/news/legal/google-bing-sign-anti-piracy-deal-that-will-demote-torrents-in-search-results/
Under the coordination of the UK government, rights holders and today's top two search engines have reached and signed an agreement that will demote piracy-related links in search results. [...]
https://www.bleepingcomputer.com/news/legal/google-bing-sign-anti-piracy-deal-that-will-demote-torrents-in-search-results/
BleepingComputer
Google, Bing Sign Anti-Piracy Deal That Will Demote Torrents in Search Results
Under the coordination of the UK government, rights holders and today's top two search engines have reached and signed an agreement that will demote piracy-related links in search results.
Java and Python Contain Security Flaws That Allow Attackers to Bypass Firewalls
Both Java and Python contain similar security flaws that allow an attacker to bypass firewalls by injecting malicious commands inside FTP URLs. [...]
https://www.bleepingcomputer.com/news/security/java-and-python-contain-security-flaws-that-allow-attackers-to-bypass-firewalls/
Both Java and Python contain similar security flaws that allow an attacker to bypass firewalls by injecting malicious commands inside FTP URLs. [...]
https://www.bleepingcomputer.com/news/security/java-and-python-contain-security-flaws-that-allow-attackers-to-bypass-firewalls/
BleepingComputer
Java and Python Contain Security Flaws That Allow Attackers to Bypass Firewalls
Both Java and Python contain similar security flaws that allow an attacker to bypass firewalls by injecting malicious commands inside FTP URLs.
8 Trends in Android Ransomware, According to ESET
Not everyone has the time of day to read an 18-page report on the state of Android ransomware, so that's why we read it for you and summarized its main findings below. [...]
https://www.bleepingcomputer.com/news/security/8-trends-in-android-ransomware-according-to-eset/
Not everyone has the time of day to read an 18-page report on the state of Android ransomware, so that's why we read it for you and summarized its main findings below. [...]
https://www.bleepingcomputer.com/news/security/8-trends-in-android-ransomware-according-to-eset/
BleepingComputer
8 Trends in Android Ransomware, According to ESET
Not everyone has the time of day to read an 18-page report on the state of Android ransomware, so that's why we read it for you and summarized its main findings below.
Unstoppable JavaScript Attack Helps Ad Fraud, Tech Support Scams, 0-Day Attacks
Argentinian security expert Manuel Caballero has published new research that shows how a website owner could show a constant stream of popups, even after the user has left his site, or even worse, execute his very own persistent JavaScript code while the user is on other domains. [...]
https://www.bleepingcomputer.com/news/security/unstoppable-javascript-attack-helps-ad-fraud-tech-support-scams-0-day-attacks/
Argentinian security expert Manuel Caballero has published new research that shows how a website owner could show a constant stream of popups, even after the user has left his site, or even worse, execute his very own persistent JavaScript code while the user is on other domains. [...]
https://www.bleepingcomputer.com/news/security/unstoppable-javascript-attack-helps-ad-fraud-tech-support-scams-0-day-attacks/
BleepingComputer
Unstoppable JavaScript Attack Helps Ad Fraud, Tech Support Scams, 0-Day Attacks
Argentinian security expert Manuel Caballero has published new research that shows how a website owner could show a constant stream of popups, even after the user has left his site, or even worse, execute his very own persistent JavaScript code while theβ¦
Firefox Users Fingerprinted via Cached Intermediate HTTPS Certificates
The way in which Firefox caches intermediate CA certificates allows a third-party to deduce various details about website visitors and also link advertising profiles to private browsing sessions. [...]
https://www.bleepingcomputer.com/news/security/firefox-users-fingerprinted-via-cached-intermediate-https-certificates/
The way in which Firefox caches intermediate CA certificates allows a third-party to deduce various details about website visitors and also link advertising profiles to private browsing sessions. [...]
https://www.bleepingcomputer.com/news/security/firefox-users-fingerprinted-via-cached-intermediate-https-certificates/
BleepingComputer
Firefox Users Fingerprinted via Cached Intermediate HTTPS Certificates
The way in which Firefox caches intermediate CA certificates allows a third-party to deduce various details about website visitors and also link advertising profiles to private browsing sessions.
Avast Releases a Decryptor for Offline Versions of the CryptoMix Ransomware
Today, Avast released a decryptor for CryptoMix victim's that were encrypted while in offline mode. Offline mode is when the ransomware runs and encrypts a victim's computer while there is no Internet connection or the computer cannot connect to the ransomware's Command & Control server. [...]
https://www.bleepingcomputer.com/news/security/avast-releases-a-decryptor-for-offline-versions-of-the-cryptomix-ransomware/
Today, Avast released a decryptor for CryptoMix victim's that were encrypted while in offline mode. Offline mode is when the ransomware runs and encrypts a victim's computer while there is no Internet connection or the computer cannot connect to the ransomware's Command & Control server. [...]
https://www.bleepingcomputer.com/news/security/avast-releases-a-decryptor-for-offline-versions-of-the-cryptomix-ransomware/
BleepingComputer
Avast Releases a Decryptor for Offline Versions of the CryptoMix Ransomware
Today, Avast released a decryptor for CryptoMix victim's that were encrypted while in offline mode. Offline mode is when the ransomware runs and encrypts a victim's computer while there is no Internet connection or the computer cannot connect to the ransβ¦
Microsoft Patches Remote Code Execution Vulnerability in Adobe Flash Player
Today Microsoft released the MS17-005 Security Update for Adobe Flash Player (4010250), which patches a remote code execution vulnerability in Adobe Flash Player. This update resolves the same vulnerabilities patched by Adobe on February 14th in their APSB17-04 update. [...]
https://www.bleepingcomputer.com/news/security/microsoft-patches-remote-code-execution-vulnerability-in-adobe-flash-player/
Today Microsoft released the MS17-005 Security Update for Adobe Flash Player (4010250), which patches a remote code execution vulnerability in Adobe Flash Player. This update resolves the same vulnerabilities patched by Adobe on February 14th in their APSB17-04 update. [...]
https://www.bleepingcomputer.com/news/security/microsoft-patches-remote-code-execution-vulnerability-in-adobe-flash-player/
BleepingComputer
Microsoft Patches Remote Code Execution Vulnerability in Adobe Flash Player
Today Microsoft released the MS17-005 Security Update for Adobe Flash Player (4010250), which patches a remote code execution vulnerability in Adobe Flash Player. This update resolves the same vulnerabilities patched by Adobe on February 14th in their APSB17β¦