Latest news and stories from BleepingComputer.com
Shocking! USB Killer Uses Electrical Charge to Fry Vulnerable Devices
A commercial device known as USB Kill 2.0 allegedly has the ability to fry a number of electrical devices by sending an electrical charge to a public-facing USB port. Using a standard USB port, USB Killer will charge itself with electricity and then discharge to fry the device it is plugged into. [...]
Shocking! USB Killer Uses Electrical Charge to Fry Vulnerable Devices
A commercial device known as USB Kill 2.0 allegedly has the ability to fry a number of electrical devices by sending an electrical charge to a public-facing USB port. Using a standard USB port, USB Killer will charge itself with electricity and then discharge to fry the device it is plugged into. [...]
BleepingComputer
Shocking! USB Killer Uses Electrical Charge to Fry Vulnerable Devices
A commercial device known as USB Kill 2.0 allegedly has the ability to fry a number of electrical devices by sending an electrical charge to a public-facing USB port. Using a standard USB port, USB Killer will charge itself with electricity and then discharge…
Latest news and stories from BleepingComputer.com
The Week in Ransomware - September 9th 2016 - CryPy, CryLocker, Philadelphia, and More
This week we have 6 new ransomware, 1 distasteful ransom note, 2 decryptors, and an update to Locky. Of particular note is the CryLocker Ransomware, which uses Imgur.com to store information about its victims. We also have a new ransomware being sold, an update to Locky, and security researchers fighting back! [...]
The Week in Ransomware - September 9th 2016 - CryPy, CryLocker, Philadelphia, and More
This week we have 6 new ransomware, 1 distasteful ransom note, 2 decryptors, and an update to Locky. Of particular note is the CryLocker Ransomware, which uses Imgur.com to store information about its victims. We also have a new ransomware being sold, an update to Locky, and security researchers fighting back! [...]
BleepingComputer
The Week in Ransomware - September 9th 2016 - CryPy, CryLocker, Philadelphia, and More
This week we have 6 new ransomware, 1 distasteful ransom note, 2 decryptors, and an update to Locky. Of particular note is the CryLocker Ransomware, which uses Imgur.com to store information about its victims. We also have a new ransomware being sold, an…
Latest news and stories from BleepingComputer.com
NoobCrypt Ransomware Dev shows Noobness by using Same Password for Everyone
It is a good day when a ransomware programmer channels their noobness and releases an insecure ransomware. This is the case with a new variant of the NoobCrypt Ransomware that was discovered by security researcher Jakub Kroustek. Living up to its name, the developer of NoobCrypt uses the same encryption key for every victim. [...]
NoobCrypt Ransomware Dev shows Noobness by using Same Password for Everyone
It is a good day when a ransomware programmer channels their noobness and releases an insecure ransomware. This is the case with a new variant of the NoobCrypt Ransomware that was discovered by security researcher Jakub Kroustek. Living up to its name, the developer of NoobCrypt uses the same encryption key for every victim. [...]
BleepingComputer
NoobCrypt Ransomware Dev shows Noobness by using Same Password for Everyone
It is a good day when a ransomware programmer channels their noobness and releases an insecure ransomware. This is the case with a new variant of the NoobCrypt Ransomware that was discovered by security researcher Jakub Kroustek. Living up to its name, the…
Latest news and stories from BleepingComputer.com
Most Connected Seagate Central devices infected by Monero Mining Trojan
Sophos recently reported about a Trojan that installs a Monero mining program called NsCpuCNMiner32.exe on an infected computer and then spreads itself to other computers and FTP sites. Since connected Seagate Central devices have a writable Public folder, many have been compromised by this ransomware. [...]
Most Connected Seagate Central devices infected by Monero Mining Trojan
Sophos recently reported about a Trojan that installs a Monero mining program called NsCpuCNMiner32.exe on an infected computer and then spreads itself to other computers and FTP sites. Since connected Seagate Central devices have a writable Public folder, many have been compromised by this ransomware. [...]
BleepingComputer
Most Connected Seagate Central devices infected by Monero Mining Trojan
Sophos recently reported about a Trojan that installs a Monero mining program called NsCpuCNMiner32.exe on an infected computer and then spreads itself to other computers and FTP sites. Since connected Seagate Central devices have a writable Public folder…
Latest news and stories from BleepingComputer.com
September 2016 Patch Tuesday includes 14 Security Updates
Today is the September 2016 Microsoft Patch Tuesday and we have fourteen security updates being released by Microsoft. Of these fourteen updates, seven of them are rated as Critical as they allow remote code execution on the affected computer. [...]
September 2016 Patch Tuesday includes 14 Security Updates
Today is the September 2016 Microsoft Patch Tuesday and we have fourteen security updates being released by Microsoft. Of these fourteen updates, seven of them are rated as Critical as they allow remote code execution on the affected computer. [...]
BleepingComputer
September 2016 Patch Tuesday includes 14 Security Updates
Today is the September 2016 Microsoft Patch Tuesday and we have fourteen security updates being released by Microsoft. Of these fourteen updates, seven of them are rated as Critical as they allow remote code execution on the affected computer.
Latest news and stories from BleepingComputer.com
Apple releases updates for watchOS, Xcode, and iOS but not without Problems
Apple released updates for iOS, Xcode, and watchOS to fix a variety of security holes as well as to introduce new features. Unfortunately, there were many reports of the iOS 10 updates causing major problems for updaters. As people rushed to install the latest and "greatest" update, they soon found that their iPhones no longer booted [...]
Apple releases updates for watchOS, Xcode, and iOS but not without Problems
Apple released updates for iOS, Xcode, and watchOS to fix a variety of security holes as well as to introduce new features. Unfortunately, there were many reports of the iOS 10 updates causing major problems for updaters. As people rushed to install the latest and "greatest" update, they soon found that their iPhones no longer booted [...]
BleepingComputer
Apple releases updates for watchOS, Xcode, and iOS but not without Problems
Apple released updates for iOS, Xcode, and watchOS to fix a variety of security holes as well as to introduce new features. Unfortunately, there were many reports of the iOS 10 updates causing major problems for updaters. As people rushed to install the latest…
Latest news and stories from BleepingComputer.com
Shark Ransomware Rebrands as Atom for a Fresh Start
The Shark Ransomware Project that appeared in July 2016 has rebranded as the Atom Ransomware Affiliate Program, offering an improved service for crooks that want to start a life in cyber-crime. Just like Shark, the service is still available on the public Internet, which is strange because most of its rivals prefer anonymity. [...]
Shark Ransomware Rebrands as Atom for a Fresh Start
The Shark Ransomware Project that appeared in July 2016 has rebranded as the Atom Ransomware Affiliate Program, offering an improved service for crooks that want to start a life in cyber-crime. Just like Shark, the service is still available on the public Internet, which is strange because most of its rivals prefer anonymity. [...]
BleepingComputer
Shark Ransomware Rebrands as Atom for a Fresh Start
The Shark Ransomware Project that appeared in July 2016 has rebranded as the Atom Ransomware Affiliate Program, offering an improved service for crooks that want to start a life in cyber-crime. Just like Shark, the service is still available on the public…
Latest news and stories from BleepingComputer.com
Adobe releases updates that resolve 35 Security Vulnerabilities
Yesterday, Adobe released updates for Adobe Flash, Adobe Digital Editions, and Adobe AIR SDK & Compiler. When you combine the vulnerabilities patched for the three products, there are 35 exploits fixed, with many of them allowing code execution. [...]
Adobe releases updates that resolve 35 Security Vulnerabilities
Yesterday, Adobe released updates for Adobe Flash, Adobe Digital Editions, and Adobe AIR SDK & Compiler. When you combine the vulnerabilities patched for the three products, there are 35 exploits fixed, with many of them allowing code execution. [...]
BleepingComputer
Adobe releases updates that resolve 35 Security Vulnerabilities
Yesterday, Adobe released updates for Adobe Flash, Adobe Digital Editions, and Adobe AIR SDK & Compiler. When you combine the vulnerabilities patched for the three products, there are 35 exploits fixed, with many of them allowing code execution.
Latest news and stories from BleepingComputer.com
Windows 10 Insider Preview Build 14926 Released with Build Expirations
Microsoft is once again releasing Insider preview builds with todays release of Windows 10 Insider Preview Build 14926 for mobile and PC to insiders on the fast ring. Included in this build are some new features, but more importantly, Insider builds will now have expirations where Insiders must update or Windows will no longer work. [...]
Windows 10 Insider Preview Build 14926 Released with Build Expirations
Microsoft is once again releasing Insider preview builds with todays release of Windows 10 Insider Preview Build 14926 for mobile and PC to insiders on the fast ring. Included in this build are some new features, but more importantly, Insider builds will now have expirations where Insiders must update or Windows will no longer work. [...]
BleepingComputer
Windows 10 Insider Preview Build 14926 Released with Build Expirations
Microsoft is once again releasing Insider preview builds with todays release of Windows 10 Insider Preview Build 14926 for mobile and PC to insiders on the fast ring. Included in this build are some new features, but more importantly, Insider builds will…
Latest news and stories from BleepingComputer.com
Stampado: Taking Ransomware Scumbaggery to the Next Level
A new version of the Stampado ransomware has taken ransomware development to a new low by encrypting files already encrypted by other ransomware. [...]
Stampado: Taking Ransomware Scumbaggery to the Next Level
A new version of the Stampado ransomware has taken ransomware development to a new low by encrypting files already encrypted by other ransomware. [...]
BleepingComputer
Stampado: Taking Ransomware Scumbaggery to the Next Level
A new version of the Stampado ransomware has taken ransomware development to a new low by encrypting files already encrypted by other ransomware.
Latest news and stories from BleepingComputer.com
US 911 Emergency Services Can Be Shut Down by DDoS Attacks From Mobile Botnets
Research published last week by the Cyber-Security Research Center at the Ben-Gurion University of the Negev in Israel reveals that it only takes about 6,000 smartphones infected with malware to launch a DDoS attack capable of shutting down 911 emergency services in a US state. [...]
US 911 Emergency Services Can Be Shut Down by DDoS Attacks From Mobile Botnets
Research published last week by the Cyber-Security Research Center at the Ben-Gurion University of the Negev in Israel reveals that it only takes about 6,000 smartphones infected with malware to launch a DDoS attack capable of shutting down 911 emergency services in a US state. [...]
BleepingComputer
US 911 Emergency Services Can Be Shut Down by DDoS Attacks From Mobile Botnets
Research published last week by the Cyber-Security Research Center at the Ben-Gurion University of the Negev in Israel reveals that it only takes about 6,000 smartphones infected with malware to launch a DDoS attack capable of shutting down 911 emergency…
Latest news and stories from BleepingComputer.com
The Week in Ransomware - September 16 2016 - Stampado, Locky, Atom, and More
Thankfully, it was a slow week this week when it comes to ransomware. For this week we had 3 new variants of existing ransomware, 2 new ransomware infections, and an updated decryptor. [...]
The Week in Ransomware - September 16 2016 - Stampado, Locky, Atom, and More
Thankfully, it was a slow week this week when it comes to ransomware. For this week we had 3 new variants of existing ransomware, 2 new ransomware infections, and an updated decryptor. [...]
BleepingComputer
The Week in Ransomware - September 16 2016 - Stampado, Locky, Atom, and More
Thankfully, it was a slow week this week when it comes to ransomware. For this week we had 3 new variants of existing ransomware, 2 new ransomware infections, and an updated decryptor.
Latest news and stories from BleepingComputer.com
Researcher Bypasses iPhone Passcode Using the Technique the FBI Said Doesn't Work
A researcher from the University of Cambridge has proven the FBI wrong after Bureau officials said the technique known as NAND mirroring wouldn't work in hacking the San Bernardino's iPhone. [...]
Researcher Bypasses iPhone Passcode Using the Technique the FBI Said Doesn't Work
A researcher from the University of Cambridge has proven the FBI wrong after Bureau officials said the technique known as NAND mirroring wouldn't work in hacking the San Bernardino's iPhone. [...]
BleepingComputer
Researcher Bypasses iPhone Passcode Using the Technique the FBI Said Doesn't Work
A researcher from the University of Cambridge has proven the FBI wrong after Bureau officials said the technique known as NAND mirroring wouldn't work in hacking the San Bernardino's iPhone.
Latest news and stories from BleepingComputer.com
HDDCryptor Ransomware Overwrites Your MBR Using Open Source Tools
[...]
HDDCryptor Ransomware Overwrites Your MBR Using Open Source Tools
[...]
BleepingComputer
HDDCryptor Ransomware Overwrites Your MBR Using Open Source Tools
HDDCryptor, sometimes spelled HDD Cryptor and also identified as Mamba, is a new ransomware variant that rewrites a computer's MBR (Master Boot Record) boot sectors and locks users out of their PCs. While we might hurry to classify this as a Petya clone…
Latest news and stories from BleepingComputer.com
HP accused of Sabotaging Non-HP Ink Cartridges
123inkt, a Dutch reseller of printer ink cartridges, has accused HP of intentionally sabotaging non-HP ink cartridges via a failure date, pre-programmed in the firmware of some HP laser ink printers. [...]
HP accused of Sabotaging Non-HP Ink Cartridges
123inkt, a Dutch reseller of printer ink cartridges, has accused HP of intentionally sabotaging non-HP ink cartridges via a failure date, pre-programmed in the firmware of some HP laser ink printers. [...]
BleepingComputer
HP accused of Sabotaging Non-HP Ink Cartridges
123inkt, a Dutch reseller of printer ink cartridges, has accused HP of intentionally sabotaging non-HP ink cartridges via a failure date, pre-programmed in the firmware of some HP laser ink printers.
Latest news and stories from BleepingComputer.com
Apple macOS Sierra release Squashes over 60 Vulnerabilities
Today apple released macOS Sierra, which along with new features also fixed over 60 security vulnerabilities. Also released today were security updates for iCloud for Windows 6.0, macOS Server 5.2, and Safari 10. Many of the updates resolve remote code execution vulnerabilities that allow attackers to possibly issue commands or downl [...]
Apple macOS Sierra release Squashes over 60 Vulnerabilities
Today apple released macOS Sierra, which along with new features also fixed over 60 security vulnerabilities. Also released today were security updates for iCloud for Windows 6.0, macOS Server 5.2, and Safari 10. Many of the updates resolve remote code execution vulnerabilities that allow attackers to possibly issue commands or downl [...]
BleepingComputer
Apple macOS Sierra release Squashes over 60 Vulnerabilities
Today apple released macOS Sierra, which along with new features also fixed over 60 security vulnerabilities. Also released today were security updates for iCloud for Windows 6.0, macOS Server 5.2, and Safari 10. Many of the updates resolve remote code execution…
Latest news and stories from BleepingComputer.com
Researchers demonstrate how they can remotely attack Tesla Cars
As more and more devices and machines become connected, the world becomes a scarier place. This was shown yesterday, when the Keen Security Lab of Tencent posted a blog post on how they figured out a way to remotely attack Tesla cars. [...]
Researchers demonstrate how they can remotely attack Tesla Cars
As more and more devices and machines become connected, the world becomes a scarier place. This was shown yesterday, when the Keen Security Lab of Tencent posted a blog post on how they figured out a way to remotely attack Tesla cars. [...]
BleepingComputer
Researchers demonstrate how they can remotely attack Tesla Cars
As more and more devices and machines become connected, the world becomes a scarier place. This was shown yesterday, when the Keen Security Lab of Tencent posted a blog post on how they figured out a way to remotely attack Tesla cars.
Latest news and stories from BleepingComputer.com
Fantom Ransomware derives Ransom Amount and Address from Filename
A new variant of the Fantom Ransomware was discovered last week that added some new features. These features include network share encryption, random desktop wallpapers, and offline encryption. By far the most interesting feature is the ransomware's ability to set a ransom amount and a payment address based upon the name of the file. [...]
Fantom Ransomware derives Ransom Amount and Address from Filename
A new variant of the Fantom Ransomware was discovered last week that added some new features. These features include network share encryption, random desktop wallpapers, and offline encryption. By far the most interesting feature is the ransomware's ability to set a ransom amount and a payment address based upon the name of the file. [...]
BleepingComputer
Fantom Ransomware derives Ransom Amount and Address from Filename
A new variant of the Fantom Ransomware was discovered last week that added some new features. These features include network share encryption, random desktop wallpapers, and offline encryption. By far the most interesting feature is the ransomware's ability…
Latest news and stories from BleepingComputer.com
Windows 10 Insider Preview Build 14931 for PC Released
Microsoft has released Windows 10 Insider Preview Build 14931 only for the PC to Insiders on the fast ring. This build does not contain any new features, but Microsoft wanted to point out new features in certain apps that were upgrade last week and this week. [...]
Windows 10 Insider Preview Build 14931 for PC Released
Microsoft has released Windows 10 Insider Preview Build 14931 only for the PC to Insiders on the fast ring. This build does not contain any new features, but Microsoft wanted to point out new features in certain apps that were upgrade last week and this week. [...]
BleepingComputer
Windows 10 Insider Preview Build 14931 for PC Released
Microsoft has released Windows 10 Insider Preview Build 14931 only for the PC to Insiders on the fast ring. This build does not contain any new features, but Microsoft wanted to point out new features in certain apps that were upgrade last week and this week.
Latest news and stories from BleepingComputer.com
Yahoo hit with a Massive 500 Million Account Data Breach
In what could be the largest data breach in history, Yahoo announced today that attackers infiltrated their servers and walked away with account information for at least 500 million users. This stolen information may include names, email addresses, telephone numbers, encrypted passwords, and more. [...]
Yahoo hit with a Massive 500 Million Account Data Breach
In what could be the largest data breach in history, Yahoo announced today that attackers infiltrated their servers and walked away with account information for at least 500 million users. This stolen information may include names, email addresses, telephone numbers, encrypted passwords, and more. [...]
BleepingComputer
Yahoo hit with a Massive 500 Million Account Data Breach
In what could be the largest data breach in history, Yahoo announced today that attackers infiltrated their servers and walked away with account information for at least 500 million users. This stolen information may include names, email addresses, telephone…