BleepingComputer
10.3K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Latest news and stories from BleepingComputer.com
Researchers Point Out "Theoretical" Security Flaws in AMD's Upcoming Zen CPU
The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, by Felicitas Hetzelt and Robert Buhren, two scientists at the Security in Telecommunications Department at the Technical University of Berlin, Germany. [...]
Latest news and stories from BleepingComputer.com
The Week in Ransomware - December 9th 2016 - Osiris, PornoPoker, Popcorn Time, Locked-In, and More

A bunch of small ransomware variants were released, but we did have a new release of the Locky Osiris variant and the interesting Popcorn Time. To me the most interesting story is Popcorn Time as they offer victims the ability to get a free decryption key if they can get two other people infected and have them pay the ransom. [...]
Latest news and stories from BleepingComputer.com
CERT Warns Users to Stop Using Two Netgear Router Models Due to Security Flaw

The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security (DHS), has published a security alert yesterday, warning owners of Netgear R6400 and R7000 models against using their routers for the time being, because of a severe security flaw. [...]
Latest news and stories from BleepingComputer.com
Five-Year-Old Bait-and-Switch Linux Security Flaw Patched

Maintainers of the Linux Kernel project have fixed three security flaws this week, among which there was a serious bug that lingered in the kernel for the past five years and allowed attackers to bypass some OS security systems and open a root shell. [...]
Latest news and stories from BleepingComputer.com
First Version of Sandboxed Tor Browser Available

Developers at the Tor Project have started working on a sandboxed version of the Tor Browser, currently available as an early alpha version for Linux systems. Currently, this version is in an early alpha stage, and only available for Linux. There are no binaries available, and users must compile it themselves from the source code. [...]
Latest news and stories from BleepingComputer.com
Cryptocurrency Miners Turn Their Sights to Zcash

Barely a month and a half have passed since Zcash became available, and crooks have already started deploying malware that infects the computers of unsuspecting users and uses their resources to mine for this very profitable cryptocurrency. [...]
Latest news and stories from BleepingComputer.com
Microsoft Edge SmartScreen Security Feature Can Be Abused for Tech Support Scams

Microsoft Edge SmartScreen SecuriManuel Caballero, the Web security expert behind the Broken Browser blog, has discovered that Microsoft Edge, the default web browser included with Windows 10, is affected by a vulnerability that allows a third-party to show fake warning messages for any online domain, such as Google, Facebook, or the [...]
Latest news and stories from BleepingComputer.com
Samas Ransomware Group Made at Least $450,000

A criminal group has made at least $450,000 by infecting organizations with the Samas ransomware in the past year, according to an analysis by researchers from security firm Palo Alto Networks. [...]
Latest news and stories from BleepingComputer.com
Music Records and Movie Studios Shouldn't Be Allowed to Cut off Your Internet

The Electronic Frontier Foundation (EFF) has issued a dire warning, bringing public attention to a legal case that may allow copyright holders such as music labels and movie studios the power to cut off a user's Internet connection in case they suspect he may be breaking copyright laws. [...]
Latest news and stories from BleepingComputer.com
Old Skype for Mac API Doubles as a Backdoor

A soon-to-be-deprecated API included with Skype for Mac contains a vulnerability that allows an attacker to bypass authentication procedures and query for user data or interact with a local Skype installation. [...]