Latest news and stories from BleepingComputer.com
Petya Ransomware Returns with GoldenEye Version, Continuing James Bond Theme
The author of the Petya-Mischa ransomware combo has returned with a new version that uses the name GoldenEye Ransomware, continuing the malware's James Bond theme. [...]
Petya Ransomware Returns with GoldenEye Version, Continuing James Bond Theme
The author of the Petya-Mischa ransomware combo has returned with a new version that uses the name GoldenEye Ransomware, continuing the malware's James Bond theme. [...]
BleepingComputer
Petya Ransomware Returns with GoldenEye Version, Continuing James Bond Theme
The author of the Petya-Mischa ransomware combo has returned with a new version that uses the name GoldenEye Ransomware, continuing the malware's James Bond theme.
Latest news and stories from BleepingComputer.com
Hundreds of Thousands of Unpatchable IP Cameras Affected by Two Zero-Days
Hundreds of thousands of IP cameras from several vendors are affected by two zero-day vulnerabilities that allow an attacker to hijack the device, use it as a pivot point for other attacks, or spy on the camera's owner. [...]
Hundreds of Thousands of Unpatchable IP Cameras Affected by Two Zero-Days
Hundreds of thousands of IP cameras from several vendors are affected by two zero-day vulnerabilities that allow an attacker to hijack the device, use it as a pivot point for other attacks, or spy on the camera's owner. [...]
BleepingComputer
Hundreds of Thousands of Unpatchable IP Cameras Affected by Two Zero-Days
Hundreds of thousands of IP cameras from several vendors are affected by two zero-day vulnerabilities that allow an attacker to hijack the device, use it as a pivot point for other attacks, or spy on the camera's owner.
Latest news and stories from BleepingComputer.com
Google Shrinks Android App Update Size by 65%
Google engineers have found a way to shrink the size of Android app updates once again, revealing that a new technology they've recently started deploying has allowed them to cut down the size of app update packages with 65% on average when compared to the original app APK file. [...]
Google Shrinks Android App Update Size by 65%
Google engineers have found a way to shrink the size of Android app updates once again, revealing that a new technology they've recently started deploying has allowed them to cut down the size of app update packages with 65% on average when compared to the original app APK file. [...]
BleepingComputer
Google Shrinks Android App Update Size by 65%
Google engineers have found a way to shrink the size of Android app updates once again, revealing that a new technology they've recently started deploying has allowed them to cut down the size of app update packages with 65% on average when compared to the…
Latest news and stories from BleepingComputer.com
Judge Releases Avalanche Network Leader, Despite Police Shootout
A judge in the city of Poltava, Ukraine, has released the alleged leader of the Avalanche malware distribution network, despite the fact the crook was involved in a shootout with the local police special forces that came to arrest him. [...]
Judge Releases Avalanche Network Leader, Despite Police Shootout
A judge in the city of Poltava, Ukraine, has released the alleged leader of the Avalanche malware distribution network, despite the fact the crook was involved in a shootout with the local police special forces that came to arrest him. [...]
BleepingComputer
Judge Releases Avalanche Network Leader, Despite Police Shootout
A judge in the city of Poltava, Ukraine, has released the alleged leader of the Avalanche malware distribution network, despite the fact the crook was involved in a shootout with the local police special forces that came to arrest him.
Latest news and stories from BleepingComputer.com
ISP Asks Security Researcher for Help in Regaining Control over 15,000 Routers
Around six months ago, an Internet service provider (ISP) doing business in the Middle East was forced to ask a security researcher for help in order to regain access to over 15,000 routers it was about to lose control of. [...]
ISP Asks Security Researcher for Help in Regaining Control over 15,000 Routers
Around six months ago, an Internet service provider (ISP) doing business in the Middle East was forced to ask a security researcher for help in order to regain access to over 15,000 routers it was about to lose control of. [...]
BleepingComputer
ISP Asks Security Researcher for Help in Regaining Control over 15,000 Routers
Around six months ago, an Internet service provider (ISP) doing business in the Middle East was forced to ask a security researcher for help in order to regain access to over 15,000 routers it was about to lose control of.
Latest news and stories from BleepingComputer.com
Turkish Hackers Are Playing a DDoS-for-Points Game
A Turkish hacking crew is running a DDoS-for-Points platform where participants can earn points if they carry out DDoS attacks against a list of predetermined targets, points they can exchange later on for various online click-fraud tools. [...]
Turkish Hackers Are Playing a DDoS-for-Points Game
A Turkish hacking crew is running a DDoS-for-Points platform where participants can earn points if they carry out DDoS attacks against a list of predetermined targets, points they can exchange later on for various online click-fraud tools. [...]
BleepingComputer
Turkish Hackers Are Playing a DDoS-for-Points Game
A Turkish hacking crew is running a DDoS-for-Points platform where participants can earn points if they carry out DDoS attacks against a list of predetermined targets, points they can exchange later on for various online click-fraud tools.
Latest news and stories from BleepingComputer.com
Hacker Steals $300,000 from Major Cryptocurrency Investor
An unknown hacker has stolen at least $300,000 in Augur and Ether cryptocurrency from Bo Shen, the founder of venture capital firm Fenbushi Capital, and one of the early adopters of many of today's cryptocurrencies. [...]
Hacker Steals $300,000 from Major Cryptocurrency Investor
An unknown hacker has stolen at least $300,000 in Augur and Ether cryptocurrency from Bo Shen, the founder of venture capital firm Fenbushi Capital, and one of the early adopters of many of today's cryptocurrencies. [...]
BleepingComputer
Hacker Steals $300,000 from Major Cryptocurrency Investor
An unknown hacker has stolen at least $300,000 in Augur and Ether cryptocurrency from Bo Shen, the founder of venture capital firm Fenbushi Capital, and one of the early adopters of many of today's cryptocurrencies.
Latest news and stories from BleepingComputer.com
Cryptography Expert Matthew Green to Audit OpenVPN Security
OpenVPN, one of the most popular VPN clients today, is to receive a security audit from Dr. Matthew Green, a famous US cryptographer and assistant professor at the Department of Computer Science at the Johns Hopkins University. [...]
Cryptography Expert Matthew Green to Audit OpenVPN Security
OpenVPN, one of the most popular VPN clients today, is to receive a security audit from Dr. Matthew Green, a famous US cryptographer and assistant professor at the Department of Computer Science at the Johns Hopkins University. [...]
BleepingComputer
Cryptography Expert Matthew Green to Audit OpenVPN Security
OpenVPN, one of the most popular VPN clients today, is to receive a security audit from Dr. Matthew Green, a famous US cryptographer and assistant professor at the Department of Computer Science at the Johns Hopkins University.
Latest news and stories from BleepingComputer.com
Hackers Attacking Russia Will Face up to 10 Years in Prison According to New Bill
The Russian Parliament is working on a new law that would introduce criminal liability for hackers creating tools and participating in cyber-attacks against Russian infrastructure. [...]
Hackers Attacking Russia Will Face up to 10 Years in Prison According to New Bill
The Russian Parliament is working on a new law that would introduce criminal liability for hackers creating tools and participating in cyber-attacks against Russian infrastructure. [...]
BleepingComputer
Hackers Attacking Russia Will Face up to 10 Years in Prison According to New Bill
The Russian Parliament is working on a new law that would introduce criminal liability for hackers creating tools and participating in cyber-attacks against Russian infrastructure.
Latest news and stories from BleepingComputer.com
Wrongfully Accused Movie Pirate to Receive $17,000 from Overaggressive Filmmaker
A judge in Oregon has ruled that a Nevada movie company must pay over $17,000 in financial compensations to a man it wrongfully accused of copyright infringement and insisted on pursuing the case with "overaggressive litigation tactics," even after it became clear that the accused man was not responsible for the supposed crime. [...]
Wrongfully Accused Movie Pirate to Receive $17,000 from Overaggressive Filmmaker
A judge in Oregon has ruled that a Nevada movie company must pay over $17,000 in financial compensations to a man it wrongfully accused of copyright infringement and insisted on pursuing the case with "overaggressive litigation tactics," even after it became clear that the accused man was not responsible for the supposed crime. [...]
BleepingComputer
Wrongfully Accused Movie Pirate to Receive $17,000 from Overaggressive Filmmaker
A judge in Oregon has ruled that a Nevada movie company must pay over $17,000 in financial compensations to a man it wrongfully accused of copyright infringement and insisted on pursuing the case with "overaggressive litigation tactics," even after it became…
Latest news and stories from BleepingComputer.com
Crooks Start Deploying New "August" Infostealer
During the month of November 2016, a cyber-crime group has started deploying a new malware family nicknamed "August," used mainly for information gathering and reconnaissance on the infected target's computer. [...]
Crooks Start Deploying New "August" Infostealer
During the month of November 2016, a cyber-crime group has started deploying a new malware family nicknamed "August," used mainly for information gathering and reconnaissance on the infected target's computer. [...]
BleepingComputer
Crooks Start Deploying New "August" Infostealer
During the month of November 2016, a cyber-crime group has started deploying a new malware family nicknamed "August," used mainly for information gathering and reconnaissance on the infected target's computer.
Latest news and stories from BleepingComputer.com
New Scheme: Spread Popcorn Time Ransomware, get chance of free Decryption Key
A in-development ransomware was discovered called Popcorn Time that intends to give victim's a very unusual way of getting a free decryption key. With Popcorn Time, not only can a victim pay a ransom to get their files back, but they can also try to infect two other people and have them pay the ransom in order to get a free key. [...]
New Scheme: Spread Popcorn Time Ransomware, get chance of free Decryption Key
A in-development ransomware was discovered called Popcorn Time that intends to give victim's a very unusual way of getting a free decryption key. With Popcorn Time, not only can a victim pay a ransom to get their files back, but they can also try to infect two other people and have them pay the ransom in order to get a free key. [...]
BleepingComputer
New Scheme: Spread Popcorn Time Ransomware, get chance of free Decryption Key
A in-development ransomware was discovered called Popcorn Time that intends to give victim's a very unusual way of getting a free decryption key. With Popcorn Time, not only can a victim pay a ransom to get their files back, but they can also try to infect…
Latest news and stories from BleepingComputer.com
Asian Hackers Stole Technical Trade Secrets from German Steelmaker ThyssenKrupp
ThyssenKrupp, one of the world's largest multinationals and one of the leading steel producers, said today in a statement that it was the victim of an economical espionage campaign carried out by hackers based in Southeast Asia. [...]
Asian Hackers Stole Technical Trade Secrets from German Steelmaker ThyssenKrupp
ThyssenKrupp, one of the world's largest multinationals and one of the leading steel producers, said today in a statement that it was the victim of an economical espionage campaign carried out by hackers based in Southeast Asia. [...]
BleepingComputer
Asian Hackers Stole Technical Trade Secrets from German Steelmaker ThyssenKrupp
ThyssenKrupp, one of the world's largest multinationals and one of the leading steel producers, said today in a statement that it was the victim of an economical espionage campaign carried out by hackers based in Southeast Asia.
Latest news and stories from BleepingComputer.com
Windows 10 Insider Build 14986 release to PC with lots of Updates
Yetsterday Microsoft has released the Windows 10 Insider Preview Build 14986 for PC only to Insiders on the fast ring. This build is filled with a lot of new features and updates in Cortana, Printing, Game Bar, Windows Defender and more. [...]
Windows 10 Insider Build 14986 release to PC with lots of Updates
Yetsterday Microsoft has released the Windows 10 Insider Preview Build 14986 for PC only to Insiders on the fast ring. This build is filled with a lot of new features and updates in Cortana, Printing, Game Bar, Windows Defender and more. [...]
BleepingComputer
Windows 10 Insider Build 14986 release to PC with lots of Updates
Yetsterday Microsoft has released the Windows 10 Insider Preview Build 14986 for PC only to Insiders on the fast ring. This build is filled with a lot of new features and updates in Cortana, Printing, Game Bar, Windows Defender and more.
Latest news and stories from BleepingComputer.com
Facebook Spam Campaign Uses Chrome Extension to Spread Nude Celebrity PDFs
Spammers are mass-messaging Facebook users with PDF files claiming to contain nude celebrity pictures, but which lead users to a malicious Chrome extension and overly aggressive advertising sites. [...]
Facebook Spam Campaign Uses Chrome Extension to Spread Nude Celebrity PDFs
Spammers are mass-messaging Facebook users with PDF files claiming to contain nude celebrity pictures, but which lead users to a malicious Chrome extension and overly aggressive advertising sites. [...]
BleepingComputer
Facebook Spam Campaign Uses Chrome Extension to Spread Nude Celebrity PDFs
Spammers are mass-messaging Facebook users with PDF files claiming to contain nude celebrity pictures, but which lead users to a malicious Chrome extension and overly aggressive advertising sites.
Latest news and stories from BleepingComputer.com
Researchers Point Out "Theoretical" Security Flaws in AMD's Upcoming Zen CPU
The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, by Felicitas Hetzelt and Robert Buhren, two scientists at the Security in Telecommunications Department at the Technical University of Berlin, Germany. [...]
Researchers Point Out "Theoretical" Security Flaws in AMD's Upcoming Zen CPU
The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, by Felicitas Hetzelt and Robert Buhren, two scientists at the Security in Telecommunications Department at the Technical University of Berlin, Germany. [...]
BleepingComputer
Researchers Point Out "Theoretical" Security Flaws in AMD's Upcoming Zen CPU
The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, by Felicitas Hetzelt and Robert Buhren, two scientists at the Security in Telecommunications…
Latest news and stories from BleepingComputer.com
Banking Trojan Uses Gmail Popup to Extend Infection to Victim's Android Phone
A group of malware authors has come up with a new method of transcending an infection from the user's computer to his Android smartphone. [...]
Banking Trojan Uses Gmail Popup to Extend Infection to Victim's Android Phone
A group of malware authors has come up with a new method of transcending an infection from the user's computer to his Android smartphone. [...]
BleepingComputer
Banking Trojan Uses Gmail Popup to Extend Infection to Victim's Android Phone
A group of malware authors has come up with a new method of transcending an infection from the user's computer to his Android smartphone.
Latest news and stories from BleepingComputer.com
New Exo Android Trojan Sold on Hacking Forums, Dark Web
Malware coders are advertising a new Android trojan that can be used for phishing banking credentials, intercepting SMS messages, locking devices with a password (ransomware-like behavior), and more. [...]
New Exo Android Trojan Sold on Hacking Forums, Dark Web
Malware coders are advertising a new Android trojan that can be used for phishing banking credentials, intercepting SMS messages, locking devices with a password (ransomware-like behavior), and more. [...]
BleepingComputer
New Exo Android Trojan Sold on Hacking Forums, Dark Web
Malware coders are advertising a new Android trojan that can be used for phishing banking credentials, intercepting SMS messages, locking devices with a password (ransomware-like behavior), and more.
Latest news and stories from BleepingComputer.com
"Proof of Concept" CryptoWire Ransomware Spawns Lomix and UltraLocker Families
A new open-source ransomware project uploaded on GitHub as a "proof of concept," has now spawned three new ransomware families that are infecting users in real-life. [...]
"Proof of Concept" CryptoWire Ransomware Spawns Lomix and UltraLocker Families
A new open-source ransomware project uploaded on GitHub as a "proof of concept," has now spawned three new ransomware families that are infecting users in real-life. [...]
BleepingComputer
"Proof of Concept" CryptoWire Ransomware Spawns Lomix and UltraLocker Families
A new open-source ransomware project uploaded on GitHub as a "proof of concept," has now spawned three new ransomware families that are infecting users in real-life.
Latest news and stories from BleepingComputer.com
Chrome 56 to Show Warnings on HTTP Pages with Payment and Password Forms
Google Chrome 56, currently in Beta stage, will show a distinctive and visible warning text when users navigate to pages hosted on HTTP that contain sensitive form elements such as fields for password or credit card data input. [...]
Chrome 56 to Show Warnings on HTTP Pages with Payment and Password Forms
Google Chrome 56, currently in Beta stage, will show a distinctive and visible warning text when users navigate to pages hosted on HTTP that contain sensitive form elements such as fields for password or credit card data input. [...]
BleepingComputer
Chrome 56 to Show Warnings on HTTP Pages with Payment and Password Forms
Google Chrome 56, currently in Beta stage, will show a distinctive and visible warning text when users navigate to pages hosted on HTTP that contain sensitive form elements such as fields for password or credit card data input.