TrustZone Downgrade Attack Opens Android Devices to Old Vulnerabilities
An attacker can downgrade components of the Android TrustZone technology to older versions that feature known vulnerabilities and use older exploits against smartphones running an up-to-date operating system. [...]
https://www.bleepingcomputer.com/news/security/trustzone-downgrade-attack-opens-android-devices-to-old-vulnerabilities/
An attacker can downgrade components of the Android TrustZone technology to older versions that feature known vulnerabilities and use older exploits against smartphones running an up-to-date operating system. [...]
https://www.bleepingcomputer.com/news/security/trustzone-downgrade-attack-opens-android-devices-to-old-vulnerabilities/
BleepingComputer
TrustZone Downgrade Attack Opens Android Devices to Old Vulnerabilities
An attacker can downgrade components of the Android TrustZone technology to older versions that feature known vulnerabilities and use older exploits against smartphones running an up-to-date operating system.
Companies Must Tell Employees When Monitoring Their PC Activity, EU Court Rules
EU companies must notify employees in advance if they plan to monitor work accounts, the European Court of Human Rights ruled this week. [...]
https://www.bleepingcomputer.com/news/legal/companies-must-tell-employees-when-monitoring-their-pc-activity-eu-court-rules/
EU companies must notify employees in advance if they plan to monitor work accounts, the European Court of Human Rights ruled this week. [...]
https://www.bleepingcomputer.com/news/legal/companies-must-tell-employees-when-monitoring-their-pc-activity-eu-court-rules/
BleepingComputer
Companies Must Tell Employees When Monitoring Their PC Activity, EU Court Rules
EU companies must notify employees in advance if they plan to monitor work accounts, the European Court of Human Rights ruled this week.
SynAck Ransomware Sees Huge Spike in Activity
Over the past two days, there was an increase in activity from a relatively unknown ransomware strain named SynAck, according to submissions to the ID-Ransomware service and users who complained on the Bleeping Computer ransomware support forums. [...]
https://www.bleepingcomputer.com/news/security/synack-ransomware-sees-huge-spike-in-activity/
Over the past two days, there was an increase in activity from a relatively unknown ransomware strain named SynAck, according to submissions to the ID-Ransomware service and users who complained on the Bleeping Computer ransomware support forums. [...]
https://www.bleepingcomputer.com/news/security/synack-ransomware-sees-huge-spike-in-activity/
BleepingComputer
SynAck Ransomware Sees Huge Spike in Activity
Over the past two days, there was an increase in activity from a relatively unknown ransomware strain named SynAck, according to submissions to the ID-Ransomware service and users who complained on the Bleeping Computer ransomware support forums.
Google Chrome 61 Released for Linux, Mac, and Windows
Today Google launched version 61 of the Chrome browser for Windows, Mac, and Linux. With this release, we have 21 security updates, numerous improvements and bug fixes, and three APIs that allow developers to further enhance their sites and apps. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-61-released-for-linux-mac-and-windows/
Today Google launched version 61 of the Chrome browser for Windows, Mac, and Linux. With this release, we have 21 security updates, numerous improvements and bug fixes, and three APIs that allow developers to further enhance their sites and apps. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-61-released-for-linux-mac-and-windows/
BleepingComputer
Google Chrome 61 Released for Linux, Mac, and Windows
Today Google launched version 61 of the Chrome browser for Windows, Mac, and Linux. With this release, we have 21 security updates, numerous improvements and bug fixes, and three APIs that allow developers to further enhance their sites and apps.
Last Windows Server Insider Build Released Before Ignite Conference
Today Microsoft released Windows Server Insider Preview Build 16278 to Windows Insiders. This build is the last Server build that will be released before the Ignite conference at the end of September, where the official Windows Server Version 1709 will be released. While there are no new features released as part of this build. [...]
https://www.bleepingcomputer.com/news/microsoft/last-windows-server-insider-build-released-before-ignite-conference/
Today Microsoft released Windows Server Insider Preview Build 16278 to Windows Insiders. This build is the last Server build that will be released before the Ignite conference at the end of September, where the official Windows Server Version 1709 will be released. While there are no new features released as part of this build. [...]
https://www.bleepingcomputer.com/news/microsoft/last-windows-server-insider-build-released-before-ignite-conference/
BleepingComputer
Last Windows Server Insider Build Released Before Ignite Conference
Today Microsoft released Windows Server Insider Preview Build 16278 to Windows Insiders. This build is the last Server build that will be released before the Ignite conference at the end of September, where the official Windows Server Version 1709 will beβ¦
New Apache Struts Vulnerability Puts Many Fortune Companies at Risk
An estimated 65% of Fortune 100 companies could be vulnerable to a security bug discovered in Apache Struts, a popular Java MVC framework used in the development of many top-grade enterprise applications. [...]
https://www.bleepingcomputer.com/news/security/new-apache-struts-vulnerability-puts-many-fortune-companies-at-risk/
An estimated 65% of Fortune 100 companies could be vulnerable to a security bug discovered in Apache Struts, a popular Java MVC framework used in the development of many top-grade enterprise applications. [...]
https://www.bleepingcomputer.com/news/security/new-apache-struts-vulnerability-puts-many-fortune-companies-at-risk/
BleepingComputer
New Apache Struts Vulnerability Puts Many Fortune Companies at Risk
An estimated 65% of Fortune 100 companies could be vulnerable to a security bug discovered in Apache Struts, a popular Java MVC framework used in the development of many top-grade enterprise applications.
Lenovo Gets a Slap on the Wrist for Superfish Adware Scandal
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015. [...]
https://www.bleepingcomputer.com/news/technology/lenovo-gets-a-slap-on-the-wrist-for-superfish-adware-scandal/
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015. [...]
https://www.bleepingcomputer.com/news/technology/lenovo-gets-a-slap-on-the-wrist-for-superfish-adware-scandal/
BleepingComputer
Lenovo Gets a Slap on the Wrist for Superfish Adware Scandal
Lenovo has settled charges with the FTC and 32 state attorneys for shipping laptops preinstalled with the Superfish adware back in 2014 and 2015.
UK's Facial Recognition System Dumber Than a Box of Rocks, Privacy Group Argues
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurate and painfully crude." [...]
https://www.bleepingcomputer.com/news/security/uks-facial-recognition-system-dumber-than-a-box-of-rocks-privacy-group-argues/
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurate and painfully crude." [...]
https://www.bleepingcomputer.com/news/security/uks-facial-recognition-system-dumber-than-a-box-of-rocks-privacy-group-argues/
BleepingComputer
UK's Facial Recognition System Dumber Than a Box of Rocks, Privacy Group Argues
A real-time facial recognition software tested by London Metropolitan Police at this year's Notting Hill Carnival was labeled as a "resounding success" by police officers, but privacy groups members who were invited to view it in action called it "inaccurateβ¦
Sabotage Warning Issued on Hackers Hiding Deep Inside Energy Sector
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wished to. [...]
https://www.bleepingcomputer.com/news/security/sabotage-warning-issued-on-hackers-hiding-deep-inside-energy-sector/
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wished to. [...]
https://www.bleepingcomputer.com/news/security/sabotage-warning-issued-on-hackers-hiding-deep-inside-energy-sector/
BleepingComputer
Sabotage Warning Issued on Hackers Hiding Deep Inside Energy Sector
US cyber-security firm Symantec has issued a warning today against a group of nation-state hackers that have managed to infiltrate several US and European energy firms, and are now in the dangerous position of sabotaging critical infrastructure if they wishedβ¦
Malware Author Uses Same Skype ID to Run IoT Botnet and Apply for Jobs
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-uses-same-skype-id-to-run-iot-botnet-and-apply-for-jobs/
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-uses-same-skype-id-to-run-iot-botnet-and-apply-for-jobs/
BleepingComputer
Malware Author Uses Same Skype ID to Run IoT Botnet and Apply for Jobs
In one of the most epic fails of epic fails, a malware dev used the same Skype ID to advertise his IoT botnet, but also to apply for jobs on freelancing portals.
CodeFork Group Uses Fileless Malware to Deploy Monero Miners
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions. [...]
https://www.bleepingcomputer.com/news/security/codefork-group-uses-fileless-malware-to-deploy-monero-miners/
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions. [...]
https://www.bleepingcomputer.com/news/security/codefork-group-uses-fileless-malware-to-deploy-monero-miners/
BleepingComputer
CodeFork Group Uses Fileless Malware to Deploy Monero Miners
A group of experienced hackers β tracked under the name of CodeFork β have launched a new malware distribution campaign that uses advanced tools and new techniques to go undetected by security solutions.
Bug in Windows Kernel Could Prevent Security Software From Identifying Malware
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime. [...]
https://www.bleepingcomputer.com/news/security/bug-in-windows-kernel-could-prevent-security-software-from-identifying-malware/
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime. [...]
https://www.bleepingcomputer.com/news/security/bug-in-windows-kernel-could-prevent-security-software-from-identifying-malware/
BleepingComputer
Bug in Windows Kernel Could Prevent Security Software From Identifying Malware
Malware developers can abuse a programming error in the Windows kernel to prevent security software from identifying if, and when, malicious modules have been loaded at runtime.
Apple and Google Fix Browser Bug. Microsoft Does Not.
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively. [...]
https://www.bleepingcomputer.com/news/security/apple-and-google-fix-browser-bug-microsoft-does-not-/
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively. [...]
https://www.bleepingcomputer.com/news/security/apple-and-google-fix-browser-bug-microsoft-does-not-/
BleepingComputer
Apple and Google Fix Browser Bug. Microsoft Does Not.
Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively.
13-Year-Old Detained for Selling "Prank" Screen Locker
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device. [...]
https://www.bleepingcomputer.com/news/security/13-year-old-detained-for-selling-prank-screen-locker/
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device. [...]
https://www.bleepingcomputer.com/news/security/13-year-old-detained-for-selling-prank-screen-locker/
BleepingComputer
13-Year-Old Detained for Selling "Prank" Screen Locker
On Tuesday, police in Japan detained a 13-year-old boy from Osaka on charges of advertising and selling a mobile virus that blocked smartphone screens and prevented users from using their device.
Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-use-ultrasounds-to-take-control-of-alexa-siri-cortana-others/
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars. [...]
https://www.bleepingcomputer.com/news/security/hackers-can-use-ultrasounds-to-take-control-of-alexa-siri-cortana-others/
BleepingComputer
Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies β inaudible to human ears β to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or evenβ¦
Researchers Hack Voting Machines Used in German Elections
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. [...]
https://www.bleepingcomputer.com/news/government/researchers-hack-voting-machines-used-in-german-elections/
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. [...]
https://www.bleepingcomputer.com/news/government/researchers-hack-voting-machines-used-in-german-elections/
BleepingComputer
Researchers Hack Voting Machines Used in German Elections
Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort.
Researchers Reveal New Toast Overlay Attack on Android Devices
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/researchers-reveal-new-toast-overlay-attack-on-android-devices/
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/researchers-reveal-new-toast-overlay-attack-on-android-devices/
BleepingComputer
Researchers Reveal New Toast Overlay Attack on Android Devices
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses "Toast" notifications to help malware in obtaining admin rights or access to Android's Accessibility service β often used to take over users' smartphones.
European Union Considering Intrusive Upload Filter as "Link Tax" Alternative
A document leaked at the end of August reveal that Estonia β currently holding the EU Presidency β is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China. [...]
https://www.bleepingcomputer.com/news/legal/european-union-considering-intrusive-upload-filter-as-link-tax-alternative/
A document leaked at the end of August reveal that Estonia β currently holding the EU Presidency β is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China. [...]
https://www.bleepingcomputer.com/news/legal/european-union-considering-intrusive-upload-filter-as-link-tax-alternative/
BleepingComputer
European Union Considering Intrusive Upload Filter as "Link Tax" Alternative
A document leaked at the end of August reveal that Estonia β currently holding the EU Presidency β is pushing fellow member states to adopt more intrusive Internet content filtering rules, similar to the ones implemented in China.
Highly Sensitive Details of 143 Million Users Stolen in Equifax Hack
Equifax β one of the largest providers of consumer credit reporting and other financial services in the US β said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers. [...]
https://www.bleepingcomputer.com/news/security/highly-sensitive-details-of-143-million-users-stolen-in-equifax-hack/
Equifax β one of the largest providers of consumer credit reporting and other financial services in the US β said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers. [...]
https://www.bleepingcomputer.com/news/security/highly-sensitive-details-of-143-million-users-stolen-in-equifax-hack/
BleepingComputer
Highly Sensitive Details of 143 Million Users Stolen in Equifax Hack
Equifax β one of the largest providers of consumer credit reporting and other financial services in the US β said last night it was the victim of a hack during which attackers made off with details on over 143 million of its customers.
Android Oreo Bug Bypasses WiFi to Use Mobile Data and Incur Extra Costs
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled. [...]
https://www.bleepingcomputer.com/news/mobile/android-oreo-bug-bypasses-wifi-to-use-mobile-data-and-incur-extra-costs/
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled. [...]
https://www.bleepingcomputer.com/news/mobile/android-oreo-bug-bypasses-wifi-to-use-mobile-data-and-incur-extra-costs/
BleepingComputer
Android Oreo Bug Bypasses WiFi to Use Mobile Data and Incur Extra Costs
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled.