BleepingComputer
10.4K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Latest news and stories from BleepingComputer.com
Researcher finds the Karma Ransomware being distributed via Pay-per-Install Network
A security researcher  has discovered the Karma Ransomware, which pretends to be a Windows optimization program called Windows-TuneUp. What is worse is that this sample was discovered as software that would potentially be distributed by a pay-per-install software monetization company when people install free software they download. [...]
Latest news and stories from BleepingComputer.com
Ransoc Ransomware Extorts Users Who Accessed Questionable Content
A new ransomware variant nicknamed Ransoc is currently distributed via malvertising campaigns and exploit kits, locking the user's desktop, searching for sensitive content, and employing the found information in an attempt to extort users who accessed questionable content into paying a ransom fee. [...]
Latest news and stories from BleepingComputer.com
CryptoLuck Ransomware being Malvertised via RIG-E Exploit Kits
A new ransomware called CryptoLuck has been discovered being distributed via the RIG-E exploit kit. This ransom also utilizes an interesting method of infecting a victim through the legitimate GoogleUpdate.exe executable and DLL hijacking. [...]
Latest news and stories from BleepingComputer.com
Linux Flaw Opens Root Shell During Boot-Up for LUKS Disk-Encrypted Systems
An error in the implementation of the Cryptsetup utility used for encrypting hard drives allows an attacker to bypass the authentication procedures on some Linux systems just by pressing the Enter key for around 70 seconds. This results in the attacked system opening a shell with root privileges. [...]
Latest news and stories from BleepingComputer.com
Linux Flaw allows Root Shell During Boot-Up for LUKS Disk-Encrypted Systems
An error in the implementation of the Cryptsetup utility used for encrypting hard drives allows an attacker to bypass the authentication procedures on some Linux systems just by pressing the Enter key for around 70 seconds. This results in the attacked system opening a shell with root privileges. [...]
Latest news and stories from BleepingComputer.com
New Android Spyware Targeting Governments Found Originating from Italy
Researchers from Red Naga Security have discovered new Android spyware that was used to target government employees, which initially appeared to be tied to the HackingTeam, but might very well be the work of a fellow Italian company, also a maker of surveillance software. [...]
Latest news and stories from BleepingComputer.com
Google to Show Errors for SHA1 Certificates Starting with Chrome 56
The number of HTTPS errors is about to go up as Google announced plans to remove support for SSL/TLS certificates signed with the SHA-1 cryptographic hash algorithm. Google plans to take this step with Chrome 56, scheduled for release at the end of January 2017. [...]