Bithumb Hacked Second Time in a Year. Hackers Steal $31 Million
For the second time in a year, South Korean cryptocurrency exchange Bithumb has been hacked, and this time around, hackers stole the equivalent of 35 billion won ($31.6 million) worth of cryptocurrency. [...]
https://www.bleepingcomputer.com/news/security/bithumb-hacked-second-time-in-a-year-hackers-steal-31-million/
For the second time in a year, South Korean cryptocurrency exchange Bithumb has been hacked, and this time around, hackers stole the equivalent of 35 billion won ($31.6 million) worth of cryptocurrency. [...]
https://www.bleepingcomputer.com/news/security/bithumb-hacked-second-time-in-a-year-hackers-steal-31-million/
BleepingComputer
Bithumb Hacked Second Time in a Year. Hackers Steal $31 Million
For the second time in a year, South Korean cryptocurrency exchange Bithumb has been hacked, and this time around, hackers stole the equivalent of 35 billion won ($31.6 million) worth of cryptocurrency.
Google, Roku, Sonos to Fix DNS Rebinding Attack Vector
The developer teams from Google Home, Roku TV, and Sonos, are preparing security patches to prevent DNS rebinding attacks on their devices. Roku has already started deploying updates, while Google and Sonos are expected to deploy patches next month. [...]
https://www.bleepingcomputer.com/news/security/google-roku-sonos-to-fix-dns-rebinding-attack-vector/
The developer teams from Google Home, Roku TV, and Sonos, are preparing security patches to prevent DNS rebinding attacks on their devices. Roku has already started deploying updates, while Google and Sonos are expected to deploy patches next month. [...]
https://www.bleepingcomputer.com/news/security/google-roku-sonos-to-fix-dns-rebinding-attack-vector/
BleepingComputer
Google, Roku, Sonos to Fix DNS Rebinding Attack Vector
The developer teams from Google Home, Roku TV, and Sonos, are preparing security patches to prevent DNS rebinding attacks on their devices. Roku has already started deploying updates, while Google and Sonos are expected to deploy patches next month.
Hacking Forum Ad Peddles New Kardon Loader Malware
Security researchers have spotted a new commercial malware product that's been put up for sale on hacking forums for the lowly price of only $50, paid in Bitcoin. Named Kardon Loader, this is a new malware strain, currently still under development, in a "beta" stage according to its author. [...]
https://www.bleepingcomputer.com/news/security/hacking-forum-ad-peddles-new-kardon-loader-malware/
Security researchers have spotted a new commercial malware product that's been put up for sale on hacking forums for the lowly price of only $50, paid in Bitcoin. Named Kardon Loader, this is a new malware strain, currently still under development, in a "beta" stage according to its author. [...]
https://www.bleepingcomputer.com/news/security/hacking-forum-ad-peddles-new-kardon-loader-malware/
BleepingComputer
Hacking Forum Ad Peddles New Kardon Loader Malware
Security researchers have spotted a new commercial malware product that's been put up for sale on hacking forums for the lowly price of only $50, paid in Bitcoin. Named Kardon Loader, this is a new malware strain, currently still under development, in a "beta"β¦
Steam Blocks Dutch Users from Trading CS:GO and Dota 2 Items To Avoid Legal Action
As of yesterday, Dutch owners of Counter-Strike: Global Offensive and Dota 2 are being greeted with a news message on Steam stating that they are no longer allowed to trade or perform marketplace transfers for items related to these games. This is due to Dutch law that found certain Loot Boxes to be considered gambling. [...]
https://www.bleepingcomputer.com/news/security/steam-blocks-dutch-users-from-trading-cs-go-and-dota-2-items-to-avoid-legal-action/
As of yesterday, Dutch owners of Counter-Strike: Global Offensive and Dota 2 are being greeted with a news message on Steam stating that they are no longer allowed to trade or perform marketplace transfers for items related to these games. This is due to Dutch law that found certain Loot Boxes to be considered gambling. [...]
https://www.bleepingcomputer.com/news/security/steam-blocks-dutch-users-from-trading-cs-go-and-dota-2-items-to-avoid-legal-action/
BleepingComputer
Steam Blocks Dutch Users from Trading CS:GO and Dota 2 Items To Avoid Legal Action
As of yesterday, Dutch owners of Counter-Strike: Global Offensive and Dota 2 are being greeted with a news message on Steam stating that they are no longer allowed to trade or perform marketplace transfers for items related to these games. This is due to Dutchβ¦
Google Updates File Signature Checks for Android Apps
Google is changing how the Play Store app is verifying the authenticity of Android apps before installation. The company plans to modify the header of APK (Android app) files to include a new metadata field that contains the app's file signature. [...]
https://www.bleepingcomputer.com/news/microsoft/google-updates-file-signature-checks-for-android-apps/
Google is changing how the Play Store app is verifying the authenticity of Android apps before installation. The company plans to modify the header of APK (Android app) files to include a new metadata field that contains the app's file signature. [...]
https://www.bleepingcomputer.com/news/microsoft/google-updates-file-signature-checks-for-android-apps/
BleepingComputer
Google Updates File Signature Checks for Android Apps
Google is changing how the Play Store app is verifying the authenticity of Android apps before installation. The company plans to modify the header of APK (Android app) files to include a new metadata field that contains the app's file signature.
Microsoft Releases Microsoft News App as it Rebrands its News Aggregation Engine
Microsoft announced today that it's news aggregation service that powers MSN has been rebranded as Microsoft News. This engine is used to display a list of curated news stories gathered from more than a thousand publishers, which is then aggregated in their MSN news feeds and in their Microsoft News app for Android and iOS. [...]
https://www.bleepingcomputer.com/news/security/microsoft-releases-microsoft-news-app-as-it-rebrands-its-news-aggregation-engine/
Microsoft announced today that it's news aggregation service that powers MSN has been rebranded as Microsoft News. This engine is used to display a list of curated news stories gathered from more than a thousand publishers, which is then aggregated in their MSN news feeds and in their Microsoft News app for Android and iOS. [...]
https://www.bleepingcomputer.com/news/security/microsoft-releases-microsoft-news-app-as-it-rebrands-its-news-aggregation-engine/
BleepingComputer
Microsoft Releases Microsoft News App as it Rebrands its News Aggregation Engine
Microsoft announced today that it's news aggregation service that powers MSN has been rebranded as Microsoft News. This engine is used to display a list of curated news stories gathered from more than a thousand publishers, which is then aggregated in theirβ¦
Microsoft Edge Bug Exposes Content From Other Sites via HTML5 Audio Tag
A weird Edge bug that was fixed earlier this month, allows a malicious website to retrieve content from other sites by playing audio files in a malformed manner that produces unintended consequences. [...]
https://www.bleepingcomputer.com/news/security/microsoft-edge-bug-exposes-content-from-other-sites-via-html5-audio-tag/
A weird Edge bug that was fixed earlier this month, allows a malicious website to retrieve content from other sites by playing audio files in a malformed manner that produces unintended consequences. [...]
https://www.bleepingcomputer.com/news/security/microsoft-edge-bug-exposes-content-from-other-sites-via-html5-audio-tag/
BleepingComputer
Microsoft Edge Bug Exposes Content From Other Sites via HTML5 Audio Tag
A weird Edge bug that was fixed earlier this month, allows a malicious website to retrieve content from other sites by playing audio files in a malformed manner that produces unintended consequences.
New SamSam Variant Requires Special Password Before Infection
New versions of the SamSam ransomware will not execute unless the person running the malware's payload enters a special password via the command-line. [...]
https://www.bleepingcomputer.com/news/security/new-samsam-variant-requires-special-password-before-infection/
New versions of the SamSam ransomware will not execute unless the person running the malware's payload enters a special password via the command-line. [...]
https://www.bleepingcomputer.com/news/security/new-samsam-variant-requires-special-password-before-infection/
BleepingComputer
New SamSam Variant Requires Special Password Before Infection
New versions of the SamSam ransomware will not execute unless the person running the malware's payload enters a special password via the command-line.
Sixteen Arrested After Deploying Coinminers Across Internet Cafes in 30 Cities
Chinese police have arrested 16 employees of a local IT company on charges of hacking after deploying cryptocurrency miners on thousands of computers at Internet cafes in 30 cities. [...]
https://www.bleepingcomputer.com/news/security/sixteen-arrested-after-deploying-coinminers-across-internet-cafes-in-30-cities/
Chinese police have arrested 16 employees of a local IT company on charges of hacking after deploying cryptocurrency miners on thousands of computers at Internet cafes in 30 cities. [...]
https://www.bleepingcomputer.com/news/security/sixteen-arrested-after-deploying-coinminers-across-internet-cafes-in-30-cities/
Dude Gets 20 Years in the Slammer for Attempting to Hijack Domain at Gunpoint
An Iowa man will go to prison for the next 20 years after he attempted to hijack an Internet domain at gunpoint, tased and shot the victim, and got shot back himself. [...]
https://www.bleepingcomputer.com/news/legal/dude-gets-20-years-in-the-slammer-for-attempting-to-hijack-domain-at-gunpoint/
An Iowa man will go to prison for the next 20 years after he attempted to hijack an Internet domain at gunpoint, tased and shot the victim, and got shot back himself. [...]
https://www.bleepingcomputer.com/news/legal/dude-gets-20-years-in-the-slammer-for-attempting-to-hijack-domain-at-gunpoint/
BleepingComputer
Dude Gets 20 Years in the Slammer for Attempting to Hijack Domain at Gunpoint
An Iowa man will go to prison for the next 20 years after he attempted to hijack an Internet domain at gunpoint, tased and shot the victim, and got shot back himself.
New Google Account Update Makes It Easier to Manage Your Data
In the past, Google consolidated a users account, privacy, and security settings into one control panel called Google Account. Today, Google is revamping this interface to make it easier to use by including a search feature, making security and privacy features more readily accessible, and by offering detailed summary pages. [...]
https://www.bleepingcomputer.com/news/google/new-google-account-update-makes-it-easier-to-manage-your-data/
In the past, Google consolidated a users account, privacy, and security settings into one control panel called Google Account. Today, Google is revamping this interface to make it easier to use by including a search feature, making security and privacy features more readily accessible, and by offering detailed summary pages. [...]
https://www.bleepingcomputer.com/news/google/new-google-account-update-makes-it-easier-to-manage-your-data/
BleepingComputer
New Google Account Update Makes It Easier to Manage Your Data
In the past, Google consolidated a users account, privacy, and security settings into one control panel called Google Account. Today, Google is revamping this interface to make it easier to use by including a search feature, making security and privacy featuresβ¦
Downloading 3rd Party OpenVPN Configs May Be Dangerous. Here’s Why.
Call my a cynic, but one thing I have learned from the using the Internet is to double-check, if not triple-check, everything you download. So many downloads have malware, adware, and scripts that perform malicious activities on your computer that it has to be a requirement to thoroughly check a download before it's used. [...]
https://www.bleepingcomputer.com/news/security/downloading-3rd-party-openvpn-configs-may-be-dangerous-here-s-why/
Call my a cynic, but one thing I have learned from the using the Internet is to double-check, if not triple-check, everything you download. So many downloads have malware, adware, and scripts that perform malicious activities on your computer that it has to be a requirement to thoroughly check a download before it's used. [...]
https://www.bleepingcomputer.com/news/security/downloading-3rd-party-openvpn-configs-may-be-dangerous-here-s-why/
BleepingComputer
Downloading 3rd Party OpenVPN Configs May Be Dangerous. Hereβs Why.
Call me a cynic, but one thing I have learned from the using the Internet is to double-check, if not triple-check, everything you download. So many downloads have malware, adware, and scripts that perform malicious activities on your computer that it hasβ¦
Continued Conversation Now Available in Google Assistant. Here's How to Enable.
At Google I/O 2018 Google announced an optional new feature called "Continued Conversation" that would allow you to continue talking to Google Assistant without using the wake up word each time. Starting today, this new feature has begun to rollout to Google Home, Google Home Mini and Google Home Max devices worldwide. [...]
https://www.bleepingcomputer.com/news/google/continued-conversation-now-available-in-google-assistant-heres-how-to-enable/
At Google I/O 2018 Google announced an optional new feature called "Continued Conversation" that would allow you to continue talking to Google Assistant without using the wake up word each time. Starting today, this new feature has begun to rollout to Google Home, Google Home Mini and Google Home Max devices worldwide. [...]
https://www.bleepingcomputer.com/news/google/continued-conversation-now-available-in-google-assistant-heres-how-to-enable/
BleepingComputer
Continued Conversation Now Available in Google Assistant. Here's How to Enable.
At Google I/O 2018 Google announced an optional new feature called "Continued Conversation" that would allow you to continue talking to Google Assistant without using the wake up word each time. Starting today, this new feature has begun to rollout to Googleβ¦
US Bill Hopes to Prevent IT Supply-Chain Issues Like the Kaspersky & ZTE Fiascos
Two US senators have proposed a bill this week that aims to address the issues with software and IT services provided to the US government and its agencies. [...]
https://www.bleepingcomputer.com/news/government/us-bill-hopes-to-prevent-it-supply-chain-issues-like-the-kaspersky-and-zte-fiascos/
Two US senators have proposed a bill this week that aims to address the issues with software and IT services provided to the US government and its agencies. [...]
https://www.bleepingcomputer.com/news/government/us-bill-hopes-to-prevent-it-supply-chain-issues-like-the-kaspersky-and-zte-fiascos/
BleepingComputer
US Bill Hopes to Prevent IT Supply-Chain Issues Like the Kaspersky & ZTE Fiascos
Two US senators have proposed a bill this week that aims to address the issues with software and IT services provided to the US government and its agencies.
Windows 10 Control Center Maybe Still In Development Based on Screenshot in MS Store
A screenshot of a new Microsoft app called Screen Sketch may have leaked that Microsoft is still developing the Windows 10 Control Center feature. [...]
https://www.bleepingcomputer.com/news/security/windows-10-control-center-maybe-still-in-development-based-on-screenshot-in-ms-store/
A screenshot of a new Microsoft app called Screen Sketch may have leaked that Microsoft is still developing the Windows 10 Control Center feature. [...]
https://www.bleepingcomputer.com/news/security/windows-10-control-center-maybe-still-in-development-based-on-screenshot-in-ms-store/
BleepingComputer
Windows 10 Control Center Maybe Still In Development Based on Screenshot in MS Store
A screenshot of a new Microsoft app called Screen Sketch may have leaked that Microsoft is still developing the Windows 10 Control Center feature.
Four Ukrainians Arrested for Running Six Fake Cryptocurrency Exchanges
Ukrainian police announced the arrest of four suspects on accusations of running six fake cryptocurrency exchanges. The four men, aged between 20 and 26, were arrested last week in the city of Dnipro. [...]
https://www.bleepingcomputer.com/news/cryptocurrency/four-ukrainians-arrested-for-running-six-fake-cryptocurrency-exchanges/
Ukrainian police announced the arrest of four suspects on accusations of running six fake cryptocurrency exchanges. The four men, aged between 20 and 26, were arrested last week in the city of Dnipro. [...]
https://www.bleepingcomputer.com/news/cryptocurrency/four-ukrainians-arrested-for-running-six-fake-cryptocurrency-exchanges/
BleepingComputer
Four Ukrainians Arrested for Running Six Fake Cryptocurrency Exchanges
Ukrainian police announced the arrest of four suspects on accusations of running six fake cryptocurrency exchanges. The four men, aged between 20 and 26, were arrested last week in the city of Dnipro.
New GZipDe Malware Drops Metasploit Backdoor
Security researchers from AlienVault have discovered a new malware strain named GZipDe that appears to be part of a targeted attack βmost likely a cyber-espionage campaign. [...]
https://www.bleepingcomputer.com/news/security/new-gzipde-malware-drops-metasploit-backdoor/
Security researchers from AlienVault have discovered a new malware strain named GZipDe that appears to be part of a targeted attack βmost likely a cyber-espionage campaign. [...]
https://www.bleepingcomputer.com/news/security/new-gzipde-malware-drops-metasploit-backdoor/
BleepingComputer
New GZipDe Malware Drops Metasploit Backdoor
Security researchers from AlienVault have discovered a new malware strain named GZipDe that appears to be part of a targeted attack βmost likely a cyber-espionage campaign.
Someone Is Taking Over Insecure Cameras and Spying on Device Owners
Many brands of webcams, security cameras, pet and baby monitors, use a woefully insecure cloud-based remote control system that can allow hackers to take over devices by performing Internet scans, modifying the device ID parameter, and using a default password to gain control over the user's equipment and its video stream. [...]
https://www.bleepingcomputer.com/news/security/someone-is-taking-over-insecure-cameras-and-spying-on-device-owners/
Many brands of webcams, security cameras, pet and baby monitors, use a woefully insecure cloud-based remote control system that can allow hackers to take over devices by performing Internet scans, modifying the device ID parameter, and using a default password to gain control over the user's equipment and its video stream. [...]
https://www.bleepingcomputer.com/news/security/someone-is-taking-over-insecure-cameras-and-spying-on-device-owners/
BleepingComputer
Someone Is Taking Over Insecure Cameras and Spying on Device Owners
Many brands of webcams, security cameras, pet and baby monitors, use a woefully insecure cloud-based remote control system that can allow hackers to take over devices by performing Internet scans, modifying the device ID parameter, and using a default passwordβ¦
India Tells Banks to Migrate ATMs From Windows XP by June 2019
The Reserve Bank of India (RBI), the country's s central banking authority, told local banks to update all ATMs still running Windows XP to a newer operating system by June 2019, or face regulatory sanctions. [...]
https://www.bleepingcomputer.com/news/security/india-tells-banks-to-migrate-atms-from-windows-xp-by-june-2019/
The Reserve Bank of India (RBI), the country's s central banking authority, told local banks to update all ATMs still running Windows XP to a newer operating system by June 2019, or face regulatory sanctions. [...]
https://www.bleepingcomputer.com/news/security/india-tells-banks-to-migrate-atms-from-windows-xp-by-june-2019/
BleepingComputer
India Tells Banks to Migrate ATMs From Windows XP by June 2019
The Reserve Bank of India (RBI), the country's s central banking authority, told local banks to update all ATMs still running Windows XP to a newer operating system by June 2019, or face regulatory sanctions.
Blackmail Campaign Pretending to be WannaCry Is Really Just WannaSpam
A new spam campaign is underway that pretends to be from a group called the "WannaCry-Hack-Team" that states the infamous WannaCry Ransomware has returned, the recipients computer is infected, and they need to send some bitcoins or their files will be deleted. [...]
https://www.bleepingcomputer.com/news/security/blackmail-campaign-pretending-to-be-wannacry-is-really-just-wannaspam/
A new spam campaign is underway that pretends to be from a group called the "WannaCry-Hack-Team" that states the infamous WannaCry Ransomware has returned, the recipients computer is infected, and they need to send some bitcoins or their files will be deleted. [...]
https://www.bleepingcomputer.com/news/security/blackmail-campaign-pretending-to-be-wannacry-is-really-just-wannaspam/
BleepingComputer
Blackmail Campaign Pretending to be WannaCry Is Really Just WannaSpam
A new spam campaign is underway that pretends to be from a group called the "WannaCry-Hack-Team" that states the infamous WannaCry Ransomware has returned, the recipients computer is infected, and they need to send some bitcoins or their files will be deleted.