Russian Cyberspies Are Using NSA Tools to Target European Hotels
After the US government has spent probably millions of dollars developing hacking tools, Russian hackers are now using them to spy on guests across hotels in Europe and the Middle East. [...]
https://www.bleepingcomputer.com/news/security/russian-cyberspies-are-using-nsa-tools-to-target-european-hotels/
After the US government has spent probably millions of dollars developing hacking tools, Russian hackers are now using them to spy on guests across hotels in Europe and the Middle East. [...]
https://www.bleepingcomputer.com/news/security/russian-cyberspies-are-using-nsa-tools-to-target-european-hotels/
BleepingComputer
Russian Cyberspies Are Using NSA Tools to Target European Hotels
After the US government has spent probably millions of dollars developing hacking tools, Russian hackers are now using them to spy on guests across hotels in Europe and the Middle East.
The Week in Ransomware - August 11th 2017 - GlobeImposter & CryptoMix
This week has been dominated by GlobeImposter releases that do not seem to stop. We also have a few CryptoMix variants and smaller ransomware variants. Otherwise, no big news released this week, which is always a good thing. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-11th-2017-globeimposter-and-cryptomix/
This week has been dominated by GlobeImposter releases that do not seem to stop. We also have a few CryptoMix variants and smaller ransomware variants. Otherwise, no big news released this week, which is always a good thing. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-11th-2017-globeimposter-and-cryptomix/
BleepingComputer
The Week in Ransomware - August 11th 2017 - GlobeImposter & CryptoMix
This week has been dominated by GlobeImposter releases that do not seem to stop. We also have a few CryptoMix variants and smaller ransomware variants. Otherwise, no big news released this week, which is always a good thing.
USB Devices Vulnerable to Crosstalk Data Leaks
Just like water leaks from pipes, so do electric signals from USB ports, indirectly exposing sensitive data to a knowledgeable attacker, according to new research from scientists at the University of Adelaide in Australia. [...]
https://www.bleepingcomputer.com/news/security/usb-devices-vulnerable-to-crosstalk-data-leaks/
Just like water leaks from pipes, so do electric signals from USB ports, indirectly exposing sensitive data to a knowledgeable attacker, according to new research from scientists at the University of Adelaide in Australia. [...]
https://www.bleepingcomputer.com/news/security/usb-devices-vulnerable-to-crosstalk-data-leaks/
BleepingComputer
USB Devices Vulnerable to Crosstalk Data Leaks
Just like water leaks from pipes, so do electric signals from USB ports, indirectly exposing sensitive data to a knowledgeable attacker, according to new research from scientists at the University of Adelaide in Australia.
Spyware Apps Found on Google Play Store
Researchers from mobile security firm Lookout say they found at least three Android apps on the Google Play Store that contained a form of advanced spyware they believe was created by an Iraqi developer. [...]
https://www.bleepingcomputer.com/news/security/spyware-apps-found-on-google-play-store/
Researchers from mobile security firm Lookout say they found at least three Android apps on the Google Play Store that contained a form of advanced spyware they believe was created by an Iraqi developer. [...]
https://www.bleepingcomputer.com/news/security/spyware-apps-found-on-google-play-store/
BleepingComputer
Spyware Apps Found on Google Play Store
Researchers from mobile security firm Lookout say they found at least three Android apps on the Google Play Store that contained a form of advanced spyware they believe was created by an Iraqi developer.
Botched Firmware Update Bricks Hundreds of Smart Door Locks
On Tuesday, August 8, smart locks manufacturer LockState botched an over-the-air firmware update for its WiFi enabled smart locks, causing the devices to lose connectivity to the vendor's servers and the ability to open doors for its users. [...]
https://www.bleepingcomputer.com/news/hardware/botched-firmware-update-bricks-hundreds-of-smart-door-locks/
On Tuesday, August 8, smart locks manufacturer LockState botched an over-the-air firmware update for its WiFi enabled smart locks, causing the devices to lose connectivity to the vendor's servers and the ability to open doors for its users. [...]
https://www.bleepingcomputer.com/news/hardware/botched-firmware-update-bricks-hundreds-of-smart-door-locks/
BleepingComputer
Botched Firmware Update Bricks Hundreds of Smart Door Locks
On Tuesday, August 8, smart locks manufacturer LockState botched an over-the-air firmware update for its WiFi enabled smart locks, causing the devices to lose connectivity to the vendor's servers and the ability to open doors for its users.
GoDaddy Has the Best Password Practices, Netflix, Spotify, Uber Have the Worst
The team at Dashlane — a password manager app — has analyzed the password policies of 40 popular online services and has discovered that not all websites are alike when it comes to password security, but some are worse than others. [...]
https://www.bleepingcomputer.com/news/security/godaddy-has-the-best-password-practices-netflix-spotify-uber-have-the-worst/
The team at Dashlane — a password manager app — has analyzed the password policies of 40 popular online services and has discovered that not all websites are alike when it comes to password security, but some are worse than others. [...]
https://www.bleepingcomputer.com/news/security/godaddy-has-the-best-password-practices-netflix-spotify-uber-have-the-worst/
BleepingComputer
GoDaddy Has the Best Password Practices, Netflix, Spotify, Uber Have the Worst
The team at Dashlane — a password manager app — has analyzed the password policies of 40 popular online services and has discovered that not all websites are alike when it comes to password security, but some are worse than others.
Hackers Leak More HBO Shows but No Game of Thrones This Week
Earlier today, the hacker group that goes by the pseudonym of Mr. Smith has leaked more data from HBO servers. This time around the hackers leaked a plethora of unaired episodes from ten different HBO shows. [...]
https://www.bleepingcomputer.com/news/security/hackers-leak-more-hbo-shows-but-no-game-of-thrones-this-week/
Earlier today, the hacker group that goes by the pseudonym of Mr. Smith has leaked more data from HBO servers. This time around the hackers leaked a plethora of unaired episodes from ten different HBO shows. [...]
https://www.bleepingcomputer.com/news/security/hackers-leak-more-hbo-shows-but-no-game-of-thrones-this-week/
BleepingComputer
Hackers Leak More HBO Shows but No Game of Thrones This Week
Earlier today, the hacker group that goes by the pseudonym of Mr. Smith has leaked more data from HBO servers. This time around the hackers leaked a plethora of unaired episodes from ten different HBO shows.
Leading White Supremacy Site Gets Booted off GoDaddy's Network
GoDaddy has informed The Daily Stormer, the top white supremacy site in the US, to find a new web host following a denigrating post against the woman who died over the weekend in Charlottesville, Virginia. [...]
https://www.bleepingcomputer.com/news/security/leading-white-supremacy-site-gets-booted-off-godaddys-network/
GoDaddy has informed The Daily Stormer, the top white supremacy site in the US, to find a new web host following a denigrating post against the woman who died over the weekend in Charlottesville, Virginia. [...]
https://www.bleepingcomputer.com/news/security/leading-white-supremacy-site-gets-booted-off-godaddys-network/
BleepingComputer
Leading White Supremacy Site Gets Booted off GoDaddy's Network
GoDaddy has informed The Daily Stormer, the top white supremacy site in the US, to find a new web host following a denigrating post against the woman who died over the weekend in Charlottesville, Virginia.
Mozilla Will Kill Legacy Firefox Add-Ons in Exactly Three Months
On November 14 Mozilla will take the biggest gamble in its long history when the organization will ship Firefox 57, the first version of its browser that will stop supporting legacy Firefox add-ons. [...]
https://www.bleepingcomputer.com/news/software/mozilla-will-kill-legacy-firefox-add-ons-in-exactly-three-months/
On November 14 Mozilla will take the biggest gamble in its long history when the organization will ship Firefox 57, the first version of its browser that will stop supporting legacy Firefox add-ons. [...]
https://www.bleepingcomputer.com/news/software/mozilla-will-kill-legacy-firefox-add-ons-in-exactly-three-months/
BleepingComputer
Mozilla Will Kill Legacy Firefox Add-Ons in Exactly Three Months
On November 14 Mozilla will take the biggest gamble in its long history when the organization will ship Firefox 57, the first version of its browser that will stop supporting legacy Firefox add-ons.
Four Suspects Arrested in India for Leaking Game of Thrones Episode
Indian authorities have announced they arrested four suspects on suspicion of leaking episode 4 of Game of Thrones season 7, titled "Spoils of War." [...]
https://www.bleepingcomputer.com/news/security/four-suspects-arrested-in-india-for-leaking-game-of-thrones-episode/
Indian authorities have announced they arrested four suspects on suspicion of leaking episode 4 of Game of Thrones season 7, titled "Spoils of War." [...]
https://www.bleepingcomputer.com/news/security/four-suspects-arrested-in-india-for-leaking-game-of-thrones-episode/
BleepingComputer
Four Suspects Arrested in India for Leaking Game of Thrones Episode
Indian authorities have announced they arrested four suspects on suspicion of leaking episode 4 of Game of Thrones season 7, titled "Spoils of War."
New Disdain Exploit Kit Sold on Underground Hacking Forums
A malware developer using the pseudonym of Cehceny is currently advertising a new exploit kit on underground hacking forums. [...]
https://www.bleepingcomputer.com/news/security/new-disdain-exploit-kit-sold-on-underground-hacking-forums/
A malware developer using the pseudonym of Cehceny is currently advertising a new exploit kit on underground hacking forums. [...]
https://www.bleepingcomputer.com/news/security/new-disdain-exploit-kit-sold-on-underground-hacking-forums/
BleepingComputer
New Disdain Exploit Kit Sold on Underground Hacking Forums
A malware developer using the pseudonym of Cehceny is currently advertising a new exploit kit on underground hacking forums.
DOJ Asks DreamHost to Reveal IP Addresses of All Who Visited Anti-Trump Website
DreamHost — a US-based web hosting provider — revealed today that the Department of Justice (DOJ) had issued a search warrant in an attempt to obtain details about one of its customers, and the people who visited its website. [...]
https://www.bleepingcomputer.com/news/government/doj-asks-dreamhost-to-reveal-ip-addresses-of-all-who-visited-anti-trump-website/
DreamHost — a US-based web hosting provider — revealed today that the Department of Justice (DOJ) had issued a search warrant in an attempt to obtain details about one of its customers, and the people who visited its website. [...]
https://www.bleepingcomputer.com/news/government/doj-asks-dreamhost-to-reveal-ip-addresses-of-all-who-visited-anti-trump-website/
BleepingComputer
DOJ Asks DreamHost to Reveal IP Addresses of All Who Visited Anti-Trump Website
DreamHost — a US-based web hosting provider — revealed today that the Department of Justice (DOJ) had issued a search warrant in an attempt to obtain details about one of its customers, and the people who visited its website.
Office Exploit Gets New Life With PowerPoint Variation
Over the past few months, an Office vulnerability has become one of the most popular and efficient ways of delivering malware to vulnerable computers. [...]
https://www.bleepingcomputer.com/news/security/office-exploit-gets-new-life-with-powerpoint-variation/
Over the past few months, an Office vulnerability has become one of the most popular and efficient ways of delivering malware to vulnerable computers. [...]
https://www.bleepingcomputer.com/news/security/office-exploit-gets-new-life-with-powerpoint-variation/
BleepingComputer
Office Exploit Gets New Life With PowerPoint Variation
Over the past few months, an Office vulnerability has become one of the most popular and efficient ways of delivering malware to vulnerable computers.
Hacker Helps Family Recover Minivan After Losing One-Of-A-Kind Car Key
After getting locked out of their Toyota Estima minivan for almost two months, a Canadian family has regained access to their car after a hacker agreed to help them. [...]
https://www.bleepingcomputer.com/news/technology/hacker-helps-family-recover-minivan-after-losing-one-of-a-kind-car-key/
After getting locked out of their Toyota Estima minivan for almost two months, a Canadian family has regained access to their car after a hacker agreed to help them. [...]
https://www.bleepingcomputer.com/news/technology/hacker-helps-family-recover-minivan-after-losing-one-of-a-kind-car-key/
BleepingComputer
Hacker Helps Family Recover Minivan After Losing One-Of-A-Kind Car Key
After getting locked out of their Toyota Estima minivan for almost two months, a Canadian family has regained access to their car after a hacker agreed to help them.
Millions of RDP Endpoints Exposed Online and Ready for Bad Things
An Internet-wide scan carried out by security researchers from Rapid7 has discovered over 11 million devices with 3389/TCP ports left open online, of which over 4.1 million are specifically speaking the RDP protocol. [...]
https://www.bleepingcomputer.com/news/security/millions-of-rdp-endpoints-exposed-online-and-ready-for-bad-things/
An Internet-wide scan carried out by security researchers from Rapid7 has discovered over 11 million devices with 3389/TCP ports left open online, of which over 4.1 million are specifically speaking the RDP protocol. [...]
https://www.bleepingcomputer.com/news/security/millions-of-rdp-endpoints-exposed-online-and-ready-for-bad-things/
BleepingComputer
Millions of RDP Endpoints Exposed Online and Ready for Bad Things
An Internet-wide scan carried out by security researchers from Rapid7 has discovered over 11 million devices with 3389/TCP ports left open online, of which over 4.1 million are specifically speaking the RDP protocol.
White Supremacy Site Moves to the Dark Web After Being Spurned by GoDaddy, Google, and Zoho
The Daily Stormer, the most well known of all white supremacy online portals, was forced to move today to the Dark Web after various service providers dropped the site from their infrastructure. [...]
https://www.bleepingcomputer.com/news/technology/white-supremacy-site-moves-to-the-dark-web-after-being-spurned-by-godaddy-google-and-zoho/
The Daily Stormer, the most well known of all white supremacy online portals, was forced to move today to the Dark Web after various service providers dropped the site from their infrastructure. [...]
https://www.bleepingcomputer.com/news/technology/white-supremacy-site-moves-to-the-dark-web-after-being-spurned-by-godaddy-google-and-zoho/
BleepingComputer
White Supremacy Site Moves to the Dark Web After Being Spurned by GoDaddy, Google, and Zoho
The Daily Stormer, the most well known of all white supremacy online portals, was forced to move today to the Dark Web after various service providers dropped the site from their infrastructure.
2016 Open-Source Repo Continues to Fuel the PHP Server Ransomware Scene
A PHP ransomware project open-sourced on GitHub is still spawning active threats, more than a year after it was released in early 2016. [...]
https://www.bleepingcomputer.com/news/security/2016-open-source-repo-continues-to-fuel-the-php-server-ransomware-scene/
A PHP ransomware project open-sourced on GitHub is still spawning active threats, more than a year after it was released in early 2016. [...]
https://www.bleepingcomputer.com/news/security/2016-open-source-repo-continues-to-fuel-the-php-server-ransomware-scene/
BleepingComputer
2016 Open-Source Repo Continues to Fuel the PHP Server Ransomware Scene
A PHP ransomware project open-sourced on GitHub is still spawning active threats, more than a year after it was released in early 2016.
Eight Chrome Extensions Hijacked to Deliver Malicious Code to 4.8 Million Users
Six more developers have had their Chrome extensions hijacked in the past four months, according to new evidence surfaced yesterday by Proofpoint researcher Kafeine. [...]
https://www.bleepingcomputer.com/news/security/eight-chrome-extensions-hijacked-to-deliver-malicious-code-to-4-8-million-users/
Six more developers have had their Chrome extensions hijacked in the past four months, according to new evidence surfaced yesterday by Proofpoint researcher Kafeine. [...]
https://www.bleepingcomputer.com/news/security/eight-chrome-extensions-hijacked-to-deliver-malicious-code-to-4-8-million-users/
BleepingComputer
Eight Chrome Extensions Hijacked to Deliver Malicious Code to 4.8 Million Users
Six more developers have had their Chrome extensions hijacked in the past four months, according to new evidence surfaced yesterday by Proofpoint researcher Kafeine.
Lone Nigerian Hacker Behind Hacks at 4,000 Organizations
One lone hacker operating out of Lagos, Nigeria was able to hack into over 4,000 organizations across the globe using basic techniques and antiquated tools, according to an investigation by researchers at Check Point. [...]
https://www.bleepingcomputer.com/news/security/lone-nigerian-hacker-behind-hacks-at-4-000-organizations/
One lone hacker operating out of Lagos, Nigeria was able to hack into over 4,000 organizations across the globe using basic techniques and antiquated tools, according to an investigation by researchers at Check Point. [...]
https://www.bleepingcomputer.com/news/security/lone-nigerian-hacker-behind-hacks-at-4-000-organizations/
BleepingComputer
Lone Nigerian Hacker Behind Attempted Hacks at 4,000 Organizations
One lone hacker operating out of Lagos, Nigeria was able to hack into over 4,000 organizations across the globe using basic techniques and antiquated tools, according to an investigation by researchers at Check Point.
Backdoor Found in Enterprise Software Used by Banks, Tech, and Energy Companies
A group with possible links to Chinese hackers has managed to break into the servers of NetSarang — a South Korean software maker — and has hidden a backdoor in the company's software packages. [...]
https://www.bleepingcomputer.com/news/security/backdoor-found-in-enterprise-software-used-by-banks-tech-and-energy-companies/
A group with possible links to Chinese hackers has managed to break into the servers of NetSarang — a South Korean software maker — and has hidden a backdoor in the company's software packages. [...]
https://www.bleepingcomputer.com/news/security/backdoor-found-in-enterprise-software-used-by-banks-tech-and-energy-companies/
BleepingComputer
Backdoor Found in Enterprise Software Used by Banks, Tech, and Energy Companies
A group with possible links to Chinese hackers has managed to break into the servers of NetSarang — a South Korean software maker — and has hidden a backdoor in the company's software packages.