BleepingComputer
10.4K subscribers
41 photos
24.6K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Acoustic Attacks on HDDs Can Sabotage PCs, CCTV Systems, ATMs, More

Attackers can use sound waves to interfere with a hard drive's normal mode of operation, creating a temporary or permanent denial of state (DoS) that could be used to prevent CCTV systems from recording video footage or freeze computers dealing with critical operations. [...]

https://www.bleepingcomputer.com/news/security/acoustic-attacks-on-hdds-can-sabotage-pcs-cctv-systems-atms-more/
Malicious Apps Could Guess Your Phone's PIN Using Sensors Data

Malicious applications can freely access sensor data on modern smartphones and use this highly sensitive data stream to collect vasts amounts of intel on the phone's owner, information that they can later use to guess the user's phone PIN. [...]

https://www.bleepingcomputer.com/news/security/malicious-apps-could-guess-your-phones-pin-using-sensors-data/
Web Trackers Exploit Flaw in Browser Login Managers to Steal Usernames

Princeton privacy experts are warning that advertising and analytics firms can secretly extract site usernames from browsers using hidden login fields and tie non-authenticated users visiting a site with their profiles or emails on that domain. [...]

https://www.bleepingcomputer.com/news/security/web-trackers-exploit-flaw-in-browser-login-managers-to-steal-usernames/
Three More WordPress Plugins Found Hiding a Backdoor

The massive size of the WordPress plugins ecosystem is starting to show signs of rot, as yet another incident has been reported involving the sale of old abandoned plugins to new authors who immediately proceed to add a backdoor to the original code. [...]

https://www.bleepingcomputer.com/news/security/three-more-wordpress-plugins-found-hiding-a-backdoor/
Chinese Hackers Target Think Tanks to Steal Military Strategic Info

Towards the end of 2017, Chinese cyber-spies have engaged in a hacking spree that targeted at least four US think tanks and an additional two non-governmental organizations (NGOs), researchers from US firm Crowdstrike revealed in a report published last week. [...]

https://www.bleepingcomputer.com/news/security/chinese-hackers-target-think-tanks-to-steal-military-strategic-info/
DHS: 18 of 33 First Responder Apps Affected by Security Flaws

A Department of Homeland Security (DHS) pilot program uncovered several privacy and security-related issues in Android and iOS applications used by first responders on the scene of natural disasters and other emergency situations. [...]

https://www.bleepingcomputer.com/news/security/dhs-18-of-33-first-responder-apps-affected-by-security-flaws/
New Algorithms Can Repair Corrupted Images, Enhance Low-Res Photos

Deep convolutional neural networks (CNN) have become a popular tool for image generation and restoration, with a few algorithms released in the last months of 2017 that achieve spectacular results when it comes to recovering and reconstructing corrupted or low-quality images. [...]

https://www.bleepingcomputer.com/news/technology/new-algorithms-can-repair-corrupted-images-enhance-low-res-photos/
Apple Apologizes Over iOS Slowdown and Discounts Future Battery Replacements

Apple released a press release today where they apologized over the confusion regarding the slow down of iOS as a iPhone's battery begins to fail.  They also announced that starting in 2018 they will reduce the costs of battery replacements from $79 to $29 for phones that need a new battery. [...]

https://www.bleepingcomputer.com/news/apple/apple-apologizes-over-ios-slowdown-and-discounts-future-battery-replacements/
Amazon Mistakenly Sends AWS Budget Emails Forecasting Free Tier Overages

In what appears to be a New Years glitch, Amazon has sent out a barrage of emails to AWS users that state recipient's free tier services are forecasted to breach free limits. These alerts are being sent to customers who have active services and even those who do not currently have any running services with Amazon. [...]

https://www.bleepingcomputer.com/news/cloud/amazon-mistakenly-sends-aws-budget-emails-forecasting-free-tier-overages/
macOS Exploit Published on the Last Day of 2017

On the last day of 2017, a security researcher going online by the pseudonym of Siguza published details about a macOS vulnerability affecting all Mac operating system versions released since 2002, and possibly earlier. [...]

https://www.bleepingcomputer.com/news/apple/macos-exploit-published-on-the-last-day-of-2017/
Security Summary: In Development Heropoint Ransomware

This is a quick analysis of the in development infection called Heropoint Ransomware. This article will contain technical information related to how it infects a computer, how it is distributed, and whether it can be decrypted. [...]

https://www.bleepingcomputer.com/news/security/security-summary-in-development-heropoint-ransomware/