Latest news and stories from BleepingComputer.com
Canonical Releases Ubuntu Core 16, a Secure OS for Today's Woefully Insecure IoT Devices
Canonical announced yesterday the availability of Ubuntu Core 16, a slimmed down version of the Ubuntu operating system that wants to be the de-facto OS for Internet of Things (IoT) devices, which currently have a bad reputation when it comes to delivering security updates, something at which Ubuntu is a lot better. [...]
Canonical Releases Ubuntu Core 16, a Secure OS for Today's Woefully Insecure IoT Devices
Canonical announced yesterday the availability of Ubuntu Core 16, a slimmed down version of the Ubuntu operating system that wants to be the de-facto OS for Internet of Things (IoT) devices, which currently have a bad reputation when it comes to delivering security updates, something at which Ubuntu is a lot better. [...]
BleepingComputer
Canonical Releases Ubuntu Core 16, a Secure OS for Today's Woefully Insecure IoT Devices
Canonical announced yesterday the availability of Ubuntu Core 16, a slimmed down version of the Ubuntu operating system that wants to be the de-facto OS for Internet of Things (IoT) devices, which currently have a bad reputation when it comes to delivering…
Latest news and stories from BleepingComputer.com
Tests Show Microsoft Edge Is More Secure Than Chrome and Firefox
A series of benchmark tests performed by NSS Labs, a US-based independent network, and security testing organization, reveals that Microsoft Edge detects malware and phishing attacks much better than both Google Chrome and Firefox, despite losing over 40 million of users in the last month. [...]
Tests Show Microsoft Edge Is More Secure Than Chrome and Firefox
A series of benchmark tests performed by NSS Labs, a US-based independent network, and security testing organization, reveals that Microsoft Edge detects malware and phishing attacks much better than both Google Chrome and Firefox, despite losing over 40 million of users in the last month. [...]
BleepingComputer
Tests Show Microsoft Edge Is More Secure Than Chrome and Firefox
A series of benchmark tests performed by NSS Labs, a US-based independent network, and security testing organization, reveals that Microsoft Edge detects malware and phishing attacks much better than both Google Chrome and Firefox, despite losing over 40…
Latest news and stories from BleepingComputer.com
Fake Cain XPii Cleaner App Is Actually a Backdoor with Very Annoying Features
Researchers have come across a new malware variant, currently in development, that likes to bombard victims with countless of popup ads, and kill their CPU by opening countless processes. [...]
Fake Cain XPii Cleaner App Is Actually a Backdoor with Very Annoying Features
Researchers have come across a new malware variant, currently in development, that likes to bombard victims with countless of popup ads, and kill their CPU by opening countless processes. [...]
BleepingComputer
Fake Cain XPii Cleaner App Is Actually a Backdoor with Very Annoying Features
Researchers have come across a new malware variant, currently in development, that likes to bombard victims with countless of popup ads, and kill their CPU by opening countless processes.
Latest news and stories from BleepingComputer.com
Microsoft Extends EMET Support for 18 Months Until July 2018
Despite saying "EMET has serious limits," Microsoft announced yesterday plans to extend EMET support past the original EOL (End Of Life) date on January 27, 2017 to July 31, 2018. [...]
Microsoft Extends EMET Support for 18 Months Until July 2018
Despite saying "EMET has serious limits," Microsoft announced yesterday plans to extend EMET support past the original EOL (End Of Life) date on January 27, 2017 to July 31, 2018. [...]
BleepingComputer
Microsoft Extends EMET Support for 18 Months Until July 2018
Despite saying "EMET has serious limits," Microsoft announced yesterday plans to extend EMET support past the original EOL (End Of Life) date on January 27, 2017 to July 31, 2018.
Latest news and stories from BleepingComputer.com
Ransomware goes Retro with PayDOS and Serpent written as Batch Files
When it comes to ransomware, we are seeing the oddest variants being released. This is no exception with a batch file ransomware discovered by Avast malware analyst Jakub Kroustek that runs within the Windows command prompt. [...]
Ransomware goes Retro with PayDOS and Serpent written as Batch Files
When it comes to ransomware, we are seeing the oddest variants being released. This is no exception with a batch file ransomware discovered by Avast malware analyst Jakub Kroustek that runs within the Windows command prompt. [...]
BleepingComputer
Ransomware goes Retro with PayDOS and Serpent written as Batch Files
When it comes to ransomware, we are seeing the oddest variants being released. This is no exception with a batch file ransomware discovered by Avast malware analyst Jakub Kroustek that runs within the Windows command prompt.
Latest news and stories from BleepingComputer.com
The Week in Ransomware - November 4th 2016 - Cerber, PayDOS, Alcatraz Locker, and More!
Wow..lots of annoying little ransomware variants. Many of which will probably never make it too far into distribution. The biggest news is the release of new Cerber versions that now helpfully tell us the version number in the ransom note. Also for those older computer users, we have some ransomware created using batch files. [...]
The Week in Ransomware - November 4th 2016 - Cerber, PayDOS, Alcatraz Locker, and More!
Wow..lots of annoying little ransomware variants. Many of which will probably never make it too far into distribution. The biggest news is the release of new Cerber versions that now helpfully tell us the version number in the ransom note. Also for those older computer users, we have some ransomware created using batch files. [...]
BleepingComputer
The Week in Ransomware - November 4th 2016 - Cerber, PayDOS, Alcatraz Locker, and More!
Wow..lots of annoying little ransomware variants. Many of which will probably never make it too far into distribution. The biggest news is the release of new Cerber versions that now helpfully tell us the version number in the ransom note. Also for those…
Latest news and stories from BleepingComputer.com
Microsoft Pesters Users with Ads Again, This Time for Edge
Microsoft is on the receiving end of new criticism after reporter Brad Chacos spotted a new type of ad pestering Windows 10 users and attempting to promote Edge when users set up Chrome as their default browser. [...]
Microsoft Pesters Users with Ads Again, This Time for Edge
Microsoft is on the receiving end of new criticism after reporter Brad Chacos spotted a new type of ad pestering Windows 10 users and attempting to promote Edge when users set up Chrome as their default browser. [...]
BleepingComputer
Microsoft Pesters Users with Ads Again, This Time for Edge
Microsoft is on the receiving end of new criticism after reporter Brad Chacos spotted a new type of ad pestering Windows 10 users and attempting to promote Edge when users set up Chrome as their default browser.
Latest news and stories from BleepingComputer.com
Researchers Create Undetectable Rootkit That Targets Industrial Equipment
Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world. [...]
Researchers Create Undetectable Rootkit That Targets Industrial Equipment
Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world. [...]
BleepingComputer
Researchers Create Undetectable Rootkit That Targets Industrial Equipment
Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all…
Latest news and stories from BleepingComputer.com
Android Banking Trojans Based on GM Bot Infected Over 200,000 Users in the Past 3 Months
Over the course of three months, more than 200,000 users have downloaded apps infected with an Android malware derived from the source code of the GM Bot, Czech security firm Avast reports. [...]
Android Banking Trojans Based on GM Bot Infected Over 200,000 Users in the Past 3 Months
Over the course of three months, more than 200,000 users have downloaded apps infected with an Android malware derived from the source code of the GM Bot, Czech security firm Avast reports. [...]
BleepingComputer
Android Banking Trojans Based on GM Bot Infected Over 200,000 Users in the Past 3 Months
Over the course of three months, more than 200,000 users have downloaded apps infected with an Android malware derived from the source code of the GM Bot, Czech security firm Avast reports.
Latest news and stories from BleepingComputer.com
Security Firm Shows How to Hack a US Voting Machine
Three days before the US Presidential Election takes place, California-based security firm Cylance showed the world how easy is to hack one of the many voting machine models that will be deployed at voting stations across the US on Election Day. [...]
Security Firm Shows How to Hack a US Voting Machine
Three days before the US Presidential Election takes place, California-based security firm Cylance showed the world how easy is to hack one of the many voting machine models that will be deployed at voting stations across the US on Election Day. [...]
BleepingComputer
Security Firm Shows How to Hack a US Voting Machine
Three days before the US Presidential Election takes place, California-based security firm Cylance showed the world how easy is to hack one of the many voting machine models that will be deployed at voting stations across the US on Election Day.
Latest news and stories from BleepingComputer.com
Hacked User Develops FileZilla Version That Encrypts FTP Passwords
A developer that had his sites hacked because the FileZilla FTP client stores passwords on disk in cleartext has taken things into his own hands and has put together FileZilla Secure, a FileZilla version that encrypts all the user's credentials with a master password. [...]
Hacked User Develops FileZilla Version That Encrypts FTP Passwords
A developer that had his sites hacked because the FileZilla FTP client stores passwords on disk in cleartext has taken things into his own hands and has put together FileZilla Secure, a FileZilla version that encrypts all the user's credentials with a master password. [...]
BleepingComputer
Hacked User Develops FileZilla Version That Encrypts FTP Passwords
A developer that had his sites hacked because the FileZilla FTP client stores passwords on disk in cleartext has taken things into his own hands and has put together FileZilla Secure, a FileZilla version that encrypts all the user's credentials with a master…
Latest news and stories from BleepingComputer.com
Google Updates Search Engine Rules, Will Rank Sites Based on Their Mobile Versions First
Google announced on late Friday afternoon plans to use a website's mobile version as the primary content source for ranking sites for its search engine's results, in a move that its engineers have hinted at for the past year at several SEO conferences. [...]
Google Updates Search Engine Rules, Will Rank Sites Based on Their Mobile Versions First
Google announced on late Friday afternoon plans to use a website's mobile version as the primary content source for ranking sites for its search engine's results, in a move that its engineers have hinted at for the past year at several SEO conferences. [...]
BleepingComputer
Google Updates Search Engine Rules, Will Rank Sites Based on Their Mobile Versions First
Google announced on late Friday afternoon plans to use a website's mobile version as the primary content source for ranking sites for its search engine's results, in a move that its engineers have hinted at for the past year at several SEO conferences.
Latest news and stories from BleepingComputer.com
Over One Billion Android Users Susceptible to App Hijacking via OAuth 2.0 Attack
Three researchers from the Chinese University of Hong Kong discovered a flaw in how app developers and identity providers support Single-Sign-On (SSO) via the OAuth 2.0 protocol, a flaw that allows an attacker to assume the identity of another person. [...]
Over One Billion Android Users Susceptible to App Hijacking via OAuth 2.0 Attack
Three researchers from the Chinese University of Hong Kong discovered a flaw in how app developers and identity providers support Single-Sign-On (SSO) via the OAuth 2.0 protocol, a flaw that allows an attacker to assume the identity of another person. [...]
BleepingComputer
Over One Billion Android Users Susceptible to App Hijacking via OAuth 2.0 Attack
Three researchers from the Chinese University of Hong Kong discovered a flaw in how app developers and identity providers support Single-Sign-On (SSO) via the OAuth 2.0 protocol, a flaw that allows an attacker to assume the identity of another person.
Latest news and stories from BleepingComputer.com
Zcash Promises the Anonymous Transactions Bitcoin Can't Deliver
A team of internationally-recognized cryptography experts has helped launch a new cryptocurrency called Zcash, which promises the anonymity Bitcoin couldn't deliver. [...]
Zcash Promises the Anonymous Transactions Bitcoin Can't Deliver
A team of internationally-recognized cryptography experts has helped launch a new cryptocurrency called Zcash, which promises the anonymity Bitcoin couldn't deliver. [...]
BleepingComputer
Zcash Promises the Anonymous Transactions Bitcoin Can't Deliver
A team of internationally-recognized cryptography experts has helped launch a new cryptocurrency called Zcash, which promises the anonymity Bitcoin couldn't deliver.
Latest news and stories from BleepingComputer.com
Cerber 4.1.4 being Distributed. Uses 3 IP ranges for UDP Stats
Cerber 4.1.4 is currently being distributed using Word documents with malicious macros that download and install the ransomware. Another interesting feature that I have not seen in previous variants, is the use of multiple IP ranges that Cerber will use to send statistics and information about infected victims to C2 servers. [...]
Cerber 4.1.4 being Distributed. Uses 3 IP ranges for UDP Stats
Cerber 4.1.4 is currently being distributed using Word documents with malicious macros that download and install the ransomware. Another interesting feature that I have not seen in previous variants, is the use of multiple IP ranges that Cerber will use to send statistics and information about infected victims to C2 servers. [...]
BleepingComputer
Cerber 4.1.4 being Distributed. Uses 3 IP ranges for UDP Stats
Cerber 4.1.4 is currently being distributed using Word documents with malicious macros that download and install the ransomware. Another interesting feature that I have not seen in previous variants, is the use of multiple IP ranges that Cerber will use to…
Latest news and stories from BleepingComputer.com
MySQL Databases Need Urgent Updates to Address Three Critical Security Bugs
System administrators should be patching their MySQL installations if they haven't in the last three weeks, to safeguard their database servers against three critical security flaws discovered by Polish security researcher Dawid Golunski. [...]
MySQL Databases Need Urgent Updates to Address Three Critical Security Bugs
System administrators should be patching their MySQL installations if they haven't in the last three weeks, to safeguard their database servers against three critical security flaws discovered by Polish security researcher Dawid Golunski. [...]
BleepingComputer
MySQL Databases Need Urgent Updates to Address Three Critical Security Bugs
System administrators should be patching their MySQL installations if they haven't in the last three weeks, to safeguard their database servers against three critical security flaws discovered by Polish security researcher Dawid Golunski.
Latest news and stories from BleepingComputer.com
Google and Mozilla Remove Extension That Was Caught Selling User Data
An investigation by German public broadcaster NDR revealed that MyWOT (WOT, or Web Of Trust) has been selling user data to third-parties without properly anonymizing user information, which in some cases exposed the user's real identity and details about his browsing habits. [...]
Google and Mozilla Remove Extension That Was Caught Selling User Data
An investigation by German public broadcaster NDR revealed that MyWOT (WOT, or Web Of Trust) has been selling user data to third-parties without properly anonymizing user information, which in some cases exposed the user's real identity and details about his browsing habits. [...]
BleepingComputer
Google and Mozilla Remove Extension That Was Caught Selling User Data
An investigation by German public broadcaster NDR revealed that MyWOT (WOT, or Web Of Trust) has been selling user data to third-parties without properly anonymizing user information, which in some cases exposed the user's real identity and details about…
Latest news and stories from BleepingComputer.com
Dridex and Dyre Malware Gang Members Arrested in the UK
British authorities have arrested fourteen people across the country on suspicion of helping the cybercriminals behind the Dridex and Dyre malware launder ill-gotten funds. [...]
Dridex and Dyre Malware Gang Members Arrested in the UK
British authorities have arrested fourteen people across the country on suspicion of helping the cybercriminals behind the Dridex and Dyre malware launder ill-gotten funds. [...]
BleepingComputer
Dridex and Dyre Malware Gang Members Arrested in the UK
British authorities have arrested fourteen people across the country on suspicion of helping the cybercriminals behind the Dridex and Dyre malware launder ill-gotten funds.
Latest news and stories from BleepingComputer.com
Over 318,000 Android Users Affected by Auto-Downloading Malvertising Attack
Crooks distributing the Svpeng Android banking trojan have discovered a flaw in how Google Chrome for Android handles file downloads and have used it to forcibly and secretly download their malicious payload on the devices of over 318,000 users in the span of three months, starting with July 2016. [...]
Over 318,000 Android Users Affected by Auto-Downloading Malvertising Attack
Crooks distributing the Svpeng Android banking trojan have discovered a flaw in how Google Chrome for Android handles file downloads and have used it to forcibly and secretly download their malicious payload on the devices of over 318,000 users in the span of three months, starting with July 2016. [...]
BleepingComputer
Over 318,000 Android Users Affected by Auto-Downloading Malvertising Attack
Crooks distributing the Svpeng Android banking trojan have discovered a flaw in how Google Chrome for Android handles file downloads and have used it to forcibly and secretly download their malicious payload on the devices of over 318,000 users in the span…
Latest news and stories from BleepingComputer.com
China Passes New Cybersecurity Law That Grants Government the Power to Shut Down the Internet at Will
On Monday, November 7, 2016, the Chinese government passed a new cybersecurity law that heavily restricts Internet freedom for the country's citizens and gives the government the power to shut down Internet access at will, in the name of "national security." [...]
China Passes New Cybersecurity Law That Grants Government the Power to Shut Down the Internet at Will
On Monday, November 7, 2016, the Chinese government passed a new cybersecurity law that heavily restricts Internet freedom for the country's citizens and gives the government the power to shut down Internet access at will, in the name of "national security." [...]
BleepingComputer
China Passes New Cybersecurity Law That Grants Government the Power to Shut Down the Internet at Will
On Monday, November 7, 2016, the Chinese government passed a new cybersecurity law that heavily restricts Internet freedom for the country's citizens and gives the government the power to shut down Internet access at will, in the name of "national security."