Drone Crashes Into Power Lines, Leaves Silicon Valley Homes in the Dark
Mountain View police are looking for a white adult male with white hair that crashed a drone into high-voltage power lines on Thursday night, June 8, knocking out power to over 1,600 people. [...]
https://www.bleepingcomputer.com/news/technology/drone-crashes-into-power-lines-leaves-silicon-valley-homes-in-the-dark/
Mountain View police are looking for a white adult male with white hair that crashed a drone into high-voltage power lines on Thursday night, June 8, knocking out power to over 1,600 people. [...]
https://www.bleepingcomputer.com/news/technology/drone-crashes-into-power-lines-leaves-silicon-valley-homes-in-the-dark/
BleepingComputer
Drone Crashes Into Power Lines, Leaves Silicon Valley Homes in the Dark
Mountain View police are looking for a white adult male with white hair that crashed a drone into high-voltage power lines on Thursday night, June 8, knocking out power to over 1,600 people.
French Police Seize Three Tor Relays in WannaCry Investigation
Two days after the WannaCry ransomware outbreak wreaked havoc across the world, French police seized three servers belonging to French activist Aeris, who said the servers were confiscated in connection to the WannaCry attacks. [...]
https://www.bleepingcomputer.com/news/security/french-police-seize-three-tor-relays-in-wannacry-investigation/
Two days after the WannaCry ransomware outbreak wreaked havoc across the world, French police seized three servers belonging to French activist Aeris, who said the servers were confiscated in connection to the WannaCry attacks. [...]
https://www.bleepingcomputer.com/news/security/french-police-seize-three-tor-relays-in-wannacry-investigation/
BleepingComputer
French Police Seize Three Tor Relays in WannaCry Investigation
Two days after the WannaCry ransomware outbreak wreaked havoc across the world, French police seized three servers belonging to French activist Aeris, who said the servers were confiscated in connection to the WannaCry attacks.
MacRansom and MacSpy Malware-as-a-Service Portals Put Mac Users on Alert
Security researchers have finally got their hands on samples of two new strains of Mac malware that have been offered through Malware-as-a-Service (MaaS) portals on the Dark Web for almost two weeks now. [...]
https://www.bleepingcomputer.com/news/security/macransom-and-macspy-malware-as-a-service-portals-put-mac-users-on-alert/
Security researchers have finally got their hands on samples of two new strains of Mac malware that have been offered through Malware-as-a-Service (MaaS) portals on the Dark Web for almost two weeks now. [...]
https://www.bleepingcomputer.com/news/security/macransom-and-macspy-malware-as-a-service-portals-put-mac-users-on-alert/
BleepingComputer
MacRansom and MacSpy Malware-as-a-Service Portals Put Mac Users on Alert
Security researchers have finally got their hands on samples of two new strains of Mac malware that have been offered through Malware-as-a-Service (MaaS) portals on the Dark Web for almost two weeks now.
Hackers Can Spoof Phone Numbers, Track Users via 4G VoLTE Mobile Technology
A team of researchers from French company P1 Security has detailed a long list of issues with the 4G VoLTE telephony, a protocol that has become quite popular all over the world in recent years and is currently in use in the US, Asia, and most European countries. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-spoof-phone-numbers-track-users-via-4g-volte-mobile-technology/
A team of researchers from French company P1 Security has detailed a long list of issues with the 4G VoLTE telephony, a protocol that has become quite popular all over the world in recent years and is currently in use in the US, Asia, and most European countries. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-spoof-phone-numbers-track-users-via-4g-volte-mobile-technology/
BleepingComputer
Hackers Can Spoof Phone Numbers, Track Users via 4G VoLTE Mobile Technology
A team of researchers from French company P1 Security has detailed a long list of issues with the 4G VoLTE telephony, a protocol that has become quite popular all over the world in recent years and is currently in use in the US, Asia, and most European countries.
New "Industroyer" Malware Targets Power Grids
Security researchers from ESET and Dragos have discovered a brand new malware strain that was specifically built to target equipment installed in power grids, and which has already been deployed in live attacks in Ukraine. [...]
https://www.bleepingcomputer.com/news/security/new-industroyer-malware-targets-power-grids/
Security researchers from ESET and Dragos have discovered a brand new malware strain that was specifically built to target equipment installed in power grids, and which has already been deployed in live attacks in Ukraine. [...]
https://www.bleepingcomputer.com/news/security/new-industroyer-malware-targets-power-grids/
BleepingComputer
New "Industroyer" Malware Targets Power Grids
Security researchers from ESET and Dragos have discovered a brand new malware strain that was specifically built to target equipment installed in power grids, and which has already been deployed in live attacks in Ukraine.
GPAA Ransomware Shows the Depravity of Some Ransomware Developers
I have been playing with ransomware for quite some time, but a new ransomware note really brings it to a new level of scumbaggery and disgust. [...]
https://www.bleepingcomputer.com/news/security/gpaa-ransomware-shows-the-depravity-of-some-ransomware-developers/
I have been playing with ransomware for quite some time, but a new ransomware note really brings it to a new level of scumbaggery and disgust. [...]
https://www.bleepingcomputer.com/news/security/gpaa-ransomware-shows-the-depravity-of-some-ransomware-developers/
BleepingComputer
GPAA Ransomware Shows the Depravity of Some Ransomware Developers
I have been playing with ransomware for quite some time, but a new ransomware note really brings it to a new level of scumbaggery and disgust.
You Can Hack Some Mazda Cars with a USB Flash Drive
Mazda cars with next-gen Mazda MZD Connect infotainment systems can be hacked just by plugging in a USB flash drive into their dashboard, thanks to a series of bugs that have been known for at least three years. [...]
https://www.bleepingcomputer.com/news/security/you-can-hack-some-mazda-cars-with-a-usb-flash-drive/
Mazda cars with next-gen Mazda MZD Connect infotainment systems can be hacked just by plugging in a USB flash drive into their dashboard, thanks to a series of bugs that have been known for at least three years. [...]
https://www.bleepingcomputer.com/news/security/you-can-hack-some-mazda-cars-with-a-usb-flash-drive/
BleepingComputer
You Can Hack Some Mazda Cars with a USB Flash Drive
Mazda cars with next-gen Mazda MZD Connect infotainment systems can be hacked just by plugging in a USB flash drive into their dashboard, thanks to a series of bugs that have been known for at least three years.
Hacker "Sagade" Extradited to the US for Role in Scareware Scheme
Peteris Sahurovs, a Latvian hacker known as "Sagade," was extradited to the US and appeared in Minneapolis court today in regards to accusations of running a scareware operation that pocketed the crook and his partners over $2 million. [...]
https://www.bleepingcomputer.com/news/security/hacker-sagade-extradited-to-the-us-for-role-in-scareware-scheme/
Peteris Sahurovs, a Latvian hacker known as "Sagade," was extradited to the US and appeared in Minneapolis court today in regards to accusations of running a scareware operation that pocketed the crook and his partners over $2 million. [...]
https://www.bleepingcomputer.com/news/security/hacker-sagade-extradited-to-the-us-for-role-in-scareware-scheme/
BleepingComputer
Hacker "Sagade" Extradited to the US for Role in Scareware Scheme
Peteris Sahurovs, a Latvian hacker known as "Sagade," was extradited to the US and appeared in Minneapolis court today in regards to accusations of running a scareware operation that pocketed the crook and his partners over $2 million.
75 Android Apps Remove Info-Stealing Adware From Their Code
Seventy-five apps available for download from the official Google Play Store had to remove a malicious advertising library that was secretly an adware called AdDown, which Trend Micro researchers have been tracking for the last two years. [...]
https://www.bleepingcomputer.com/news/security/75-android-apps-remove-info-stealing-adware-from-their-code/
Seventy-five apps available for download from the official Google Play Store had to remove a malicious advertising library that was secretly an adware called AdDown, which Trend Micro researchers have been tracking for the last two years. [...]
https://www.bleepingcomputer.com/news/security/75-android-apps-remove-info-stealing-adware-from-their-code/
BleepingComputer
75 Android Apps Remove Info-Stealing Adware From Their Code
Seventy-five apps available for download from the official Google Play Store had to remove a malicious advertising library that was secretly an adware called AdDown, which Trend Micro researchers have been tracking for the last two years.
A 12-Month Campaign of Fake News to Influence Elections Costs $400,000
A 77-page report released today by cyber-security firm Trend Micro explores the underground landscape of fake news, where anyone can buy influence and create artificial trends to serve personal interests. [...]
https://www.bleepingcomputer.com/news/security/a-12-month-campaign-of-fake-news-to-influence-elections-costs-400-000/
A 77-page report released today by cyber-security firm Trend Micro explores the underground landscape of fake news, where anyone can buy influence and create artificial trends to serve personal interests. [...]
https://www.bleepingcomputer.com/news/security/a-12-month-campaign-of-fake-news-to-influence-elections-costs-400-000/
BleepingComputer
A 12-Month Campaign of Fake News to Influence Elections Costs $400,000
A 77-page report released today by cyber-security firm Trend Micro explores the underground landscape of fake news, where anyone can buy influence and create artificial trends to serve personal interests.
Adobe Patches Nine Security Flaws in Flash Player
Adobe released today four security bulletins announcing patches for products such as Flash Player, Shockwave Player, Captivate, and Digital Editions. [...]
https://www.bleepingcomputer.com/news/security/adobe-patches-nine-security-flaws-in-flash-player/
Adobe released today four security bulletins announcing patches for products such as Flash Player, Shockwave Player, Captivate, and Digital Editions. [...]
https://www.bleepingcomputer.com/news/security/adobe-patches-nine-security-flaws-in-flash-player/
BleepingComputer
Adobe Patches Nine Security Flaws in Flash Player
Adobe released today four security bulletins announcing patches for products such as Flash Player, Shockwave Player, Captivate, and Digital Editions.
Microsoft to Disable SMBv1 in Windows Starting This Fall
Starting this fall, with the public launch of the next major Windows 10 update β codenamed Redstone 3 β Microsoft plans to disable SMBv1 in most versions of the Windows operating systems. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-to-disable-smbv1-in-windows-starting-this-fall/
Starting this fall, with the public launch of the next major Windows 10 update β codenamed Redstone 3 β Microsoft plans to disable SMBv1 in most versions of the Windows operating systems. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-to-disable-smbv1-in-windows-starting-this-fall/
BleepingComputer
Microsoft to Disable SMBv1 in Windows Starting This Fall
Starting this fall, with the public launch of the next major Windows 10 update β codenamed Redstone 3 β Microsoft plans to disable SMBv1 in most versions of the Windows operating systems.
Microsoft Issues Windows XP Security Updates for Previously Ignored NSA Hacking Tools
In two blog posts today, Microsoft announced it issued new security patches for Windows XP users to protect them against "potential nation-state activity" that could cause "destructive cyber attacks" similar to the WannaCry outbreak that hit users last month. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-windows-xp-security-updates-for-previously-ignored-nsa-hacking-tools/
In two blog posts today, Microsoft announced it issued new security patches for Windows XP users to protect them against "potential nation-state activity" that could cause "destructive cyber attacks" similar to the WannaCry outbreak that hit users last month. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-windows-xp-security-updates-for-previously-ignored-nsa-hacking-tools/
BleepingComputer
Microsoft Issues Windows XP Security Updates for Previously Ignored NSA Hacking Tools
In two blog posts today, Microsoft announced it issued new security patches for Windows XP users to protect them against "potential nation-state activity" that could cause "destructive cyber attacks" similar to the WannaCry outbreak that hit users last month.
Microsoft's June Patch Tuesday Fixes Two Vulnerabilities Used in Live Attacks
Microsoft published today the June 2017 Patch Tuesday, which patches over 90 security flaws, including two vulnerabilities used in live attacks. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-june-patch-tuesday-fixes-two-vulnerabilities-used-in-live-attacks/
Microsoft published today the June 2017 Patch Tuesday, which patches over 90 security flaws, including two vulnerabilities used in live attacks. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-june-patch-tuesday-fixes-two-vulnerabilities-used-in-live-attacks/
BleepingComputer
Microsoft's June Patch Tuesday Fixes Two Vulnerabilities Used in Live Attacks
Microsoft published today the June 2017 Patch Tuesday, which patches over 90 security flaws, including two vulnerabilities used in live attacks.
DHS and FBI Publish Details on DeltaCharlie, North Korea's DDoS Botnet
In a US-CERT report released yesterday afternoon, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have published IOCs about a malware family known as DeltaCharlie, used by North Korea to create its private DDoS botnet. [...]
https://www.bleepingcomputer.com/news/security/dhs-and-fbi-publish-details-on-deltacharlie-north-koreas-ddos-botnet/
In a US-CERT report released yesterday afternoon, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have published IOCs about a malware family known as DeltaCharlie, used by North Korea to create its private DDoS botnet. [...]
https://www.bleepingcomputer.com/news/security/dhs-and-fbi-publish-details-on-deltacharlie-north-koreas-ddos-botnet/
BleepingComputer
DHS and FBI Publish Details on DeltaCharlie, North Korea's DDoS Botnet
In a US-CERT report released yesterday afternoon, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have published IOCs about a malware family known as DeltaCharlie, used by North Korea to create its private DDoS botnet.
Firefox 54 Released With Improved Multi-Process Support
Mozilla released yesterday version 54 of the Firefox browser, which has expanded the multi-process feature from two to five processes (one for the UI, four for browser content). [...]
https://www.bleepingcomputer.com/news/software/firefox-54-released-with-improved-multi-process-support/
Mozilla released yesterday version 54 of the Firefox browser, which has expanded the multi-process feature from two to five processes (one for the UI, four for browser content). [...]
https://www.bleepingcomputer.com/news/software/firefox-54-released-with-improved-multi-process-support/
BleepingComputer
Firefox 54 Released With Improved Multi-Process Support
Mozilla released yesterday version 54 of the Firefox browser, which has expanded the multi-process feature from two to five processes (one for the UI, four for browser content).
Decrypted: Kaspersky Releases Decryptor for the Jaff Ransomware
Fedor Sinitsyn, a senior malware analyst at Kaspersky Labs, has discovered a weakness in the Jaff ransomware and was able to release a decryptor for all current variants For those who were infected with Jaff and had their files encrypted with the .jaff, .wlu, or .sVn extensions, this decryptor can recover your files for free. [...]
https://www.bleepingcomputer.com/news/security/decrypted-kaspersky-releases-decryptor-for-the-jaff-ransomware/
Fedor Sinitsyn, a senior malware analyst at Kaspersky Labs, has discovered a weakness in the Jaff ransomware and was able to release a decryptor for all current variants For those who were infected with Jaff and had their files encrypted with the .jaff, .wlu, or .sVn extensions, this decryptor can recover your files for free. [...]
https://www.bleepingcomputer.com/news/security/decrypted-kaspersky-releases-decryptor-for-the-jaff-ransomware/
BleepingComputer
Decrypted: Kaspersky Releases Decryptor for the Jaff Ransomware
Fedor Sinitsyn, a senior malware analyst at Kaspersky Labs, has discovered a weakness in the Jaff ransomware and was able to release a decryptor for all current variants For those who were infected with Jaff and had their files encrypted with the .jaff, .wluβ¦
Police Arrest Owner and Six Customers of Malware Crypter Service
Europol announced today that police across Europe arrested six users who were customers of a malware crypter service and a counter anti-virus platform developed by a 22-year-old German man. [...]
https://www.bleepingcomputer.com/news/security/police-arrest-owner-and-six-customers-of-malware-crypter-service/
Europol announced today that police across Europe arrested six users who were customers of a malware crypter service and a counter anti-virus platform developed by a 22-year-old German man. [...]
https://www.bleepingcomputer.com/news/security/police-arrest-owner-and-six-customers-of-malware-crypter-service/
BleepingComputer
Police Arrest Owner and Six Customers of Malware Crypter Service
Europol announced today that police across Europe arrested six users who were customers of a malware crypter service and a counter anti-virus platform developed by a 22-year-old German man.
Former Major Player Neutrino Exploit Kit Has Gone Dark
The Neutrino exploit kit, a former leader of the exploit kit market, appears to have shut down, with the last activity recorded at the start of April, well over two months ago. [...]
https://www.bleepingcomputer.com/news/security/former-major-player-neutrino-exploit-kit-has-gone-dark/
The Neutrino exploit kit, a former leader of the exploit kit market, appears to have shut down, with the last activity recorded at the start of April, well over two months ago. [...]
https://www.bleepingcomputer.com/news/security/former-major-player-neutrino-exploit-kit-has-gone-dark/
BleepingComputer
Former Major Player Neutrino Exploit Kit Has Gone Dark
The Neutrino exploit kit, a former leader of the exploit kit market, appears to have shut down, with the last activity recorded at the start of April, well over two months ago.
Google Will Be Able to Backup Your Entire Computer
Google pre-announced today a new tool named "Backup and Sync," built on top of Google Drive, which will be able to back up files stored anywhere on the user's computer, not just in the Drive folder. The search giant says it will launch Backup and Sync in two weeks, on June 28. [...]
https://www.bleepingcomputer.com/news/google/google-will-be-able-to-backup-your-entire-computer/
Google pre-announced today a new tool named "Backup and Sync," built on top of Google Drive, which will be able to back up files stored anywhere on the user's computer, not just in the Drive folder. The search giant says it will launch Backup and Sync in two weeks, on June 28. [...]
https://www.bleepingcomputer.com/news/google/google-will-be-able-to-backup-your-entire-computer/
BleepingComputer
Google Will Be Able to Backup Your Entire Computer
Google pre-announced today a new tool named "Backup and Sync," built on top of Google Drive, which will be able to back up files stored anywhere on the user's computer, not just in the Drive folder. The search giant says it will launch Backup and Sync inβ¦