Method to View Contact Info on a Locked iOS 12.1 Device Disclosed
The day after iOS 12.1 was released, a researcher disclosed a new passcode bypass method that allows you to easily view the phone numbers and email addresses of a device's contacts even when the device is locked. [...]
https://www.bleepingcomputer.com/news/security/method-to-view-contact-info-on-a-locked-ios-121-device-disclosed/
The day after iOS 12.1 was released, a researcher disclosed a new passcode bypass method that allows you to easily view the phone numbers and email addresses of a device's contacts even when the device is locked. [...]
https://www.bleepingcomputer.com/news/security/method-to-view-contact-info-on-a-locked-ios-121-device-disclosed/
BleepingComputer
Method to View Contact Info on a Locked iOS 12.1 Device Disclosed
The day after iOS 12.1 was released, a researcher disclosed a new passcode bypass method that allows you to easily view the phone numbers and email addresses of a device's contacts even when the device is locked.
Mozilla Firefox Adding Setting to Disable Recommended Extensions
In September we reported that Mozilla Firefox would be testing a new feature called Contextual Feature Recommender, or CFR, that recommends extensions related to sites that you are visiting. In Firefox 64, Mozilla will be adding a setting that allows you to block Firefox from making these types of recommendations. [...]
https://www.bleepingcomputer.com/news/software/mozilla-firefox-adding-setting-to-disable-recommended-extensions/
In September we reported that Mozilla Firefox would be testing a new feature called Contextual Feature Recommender, or CFR, that recommends extensions related to sites that you are visiting. In Firefox 64, Mozilla will be adding a setting that allows you to block Firefox from making these types of recommendations. [...]
https://www.bleepingcomputer.com/news/software/mozilla-firefox-adding-setting-to-disable-recommended-extensions/
BleepingComputer
Mozilla Firefox Adding Setting to Disable Recommended Extensions
In September we reported that Mozilla Firefox would be testing a new feature called Contextual Feature Recommender, or CFR, that recommends extensions related to sites that you are visiting. In Firefox 64, Mozilla will be adding a setting that allows youβ¦
New Stuxnet Variant Allegedly Struck Iran
A malware similar in nature to Stuxnet but more aggressive and sophisticated allegedly hit the infrastructure and strategic networks in Iran. [...]
https://www.bleepingcomputer.com/news/security/new-stuxnet-variant-allegedly-struck-iran/
A malware similar in nature to Stuxnet but more aggressive and sophisticated allegedly hit the infrastructure and strategic networks in Iran. [...]
https://www.bleepingcomputer.com/news/security/new-stuxnet-variant-allegedly-struck-iran/
BleepingComputer
New Stuxnet Variant Allegedly Struck Iran
A malware similar in nature to Stuxnet but more aggressive and sophisticated allegedly hit the infrastructure and strategic networks in Iran.
Necurs Botnet Distributing Sextortion Email Scams
Two recent sextortion scam campaigns seem to rely on the Necurs botnet infrastructure to distribute the messages, security researchers have discovered. [...]
https://www.bleepingcomputer.com/news/security/necurs-botnet-distributing-sextortion-email-scams/
Two recent sextortion scam campaigns seem to rely on the Necurs botnet infrastructure to distribute the messages, security researchers have discovered. [...]
https://www.bleepingcomputer.com/news/security/necurs-botnet-distributing-sextortion-email-scams/
BleepingComputer
Necurs Botnet Distributing Sextortion Email Scams
Two recent sextortion scam campaigns seem to rely on the Necurs botnet infrastructure to distribute the messages, security researchers have discovered.
New BLEEDINGBIT Vulnerabilities Affect Widely-Used Bluetooth Chips
Two vulnerabilities in the Bluetooth chips typically found in access points used to provide WiFi service in enterprises allow attackers to take control of the devices without authentication or breach the network. [...]
https://www.bleepingcomputer.com/news/security/new-bleedingbit-vulnerabilities-affect-widely-used-bluetooth-chips/
Two vulnerabilities in the Bluetooth chips typically found in access points used to provide WiFi service in enterprises allow attackers to take control of the devices without authentication or breach the network. [...]
https://www.bleepingcomputer.com/news/security/new-bleedingbit-vulnerabilities-affect-widely-used-bluetooth-chips/
BleepingComputer
New BLEEDINGBIT Vulnerabilities Affect Widely-Used Bluetooth Chips
Two vulnerabilities in the Bluetooth chips typically found in access points used to provide WiFi service in enterprises allow attackers to take control of the devices without authentication or breach the network.
Windows Defender Bug Needs a Restart, Not Shutdown, To Enable Sandbox
Last week Microsoft announced that users can enable a feature that adds Windows Defender to a sandbox, which protects the computer from vulnerabilities found in Defender. A bug was discovered, though, that may cause you to think that this sandbox feature is enabled, when it really isn't. [...]
https://www.bleepingcomputer.com/news/security/windows-defender-bug-needs-a-restart-not-shutdown-to-enable-sandbox/
Last week Microsoft announced that users can enable a feature that adds Windows Defender to a sandbox, which protects the computer from vulnerabilities found in Defender. A bug was discovered, though, that may cause you to think that this sandbox feature is enabled, when it really isn't. [...]
https://www.bleepingcomputer.com/news/security/windows-defender-bug-needs-a-restart-not-shutdown-to-enable-sandbox/
BleepingComputer
Windows Defender Bug Needs a Restart, Not Shutdown, To Enable Sandbox
Last week Microsoft announced that users can enable a feature that adds Windows Defender to a sandbox, which protects the computer from vulnerabilities found in Defender. A bug was discovered, though, that may cause you to think that this sandbox featureβ¦
Microsoft Will Soon Send Your Office 365 Users Tips and Training Emails
Microsoft has announced that they will automatically enable the emailing of tips and training information to all Office 365 and Microsoft 365 users starting on November 29th 2018. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-will-soon-send-your-office-365-users-tips-and-training-emails/
Microsoft has announced that they will automatically enable the emailing of tips and training information to all Office 365 and Microsoft 365 users starting on November 29th 2018. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-will-soon-send-your-office-365-users-tips-and-training-emails/
BleepingComputer
Microsoft Will Soon Send Your Office 365 Users Tips and Training Emails
Microsoft has announced that they will automatically enable the emailing of tips and training information to all Office 365 and Microsoft 365 users starting on November 29th 2018.
Attackers Use Zero-Day That Can Restart Cisco Security Appliances
Unknown attackers have exploited a vulnerability in software running on security hardware products from Cisco that could trigger a restart of the affected devices, the equivalent of a denial-of-service (DoS) condition. [...]
https://www.bleepingcomputer.com/news/security/attackers-use-zero-day-that-can-restart-cisco-security-appliances/
Unknown attackers have exploited a vulnerability in software running on security hardware products from Cisco that could trigger a restart of the affected devices, the equivalent of a denial-of-service (DoS) condition. [...]
https://www.bleepingcomputer.com/news/security/attackers-use-zero-day-that-can-restart-cisco-security-appliances/
BleepingComputer
Attackers Use Zero-Day That Can Restart Cisco Security Appliances
Unknown attackers have exploited a vulnerability in software running on security hardware products from Cisco that could trigger a restart of the affected devices, the equivalent of a denial-of-service (DoS) condition.
Private Messages for 81k Hacked Facebook Accounts Being Sold Online
A seller has posted on underground criminal forums about having access to the information of 120 million Facebook users as well as access to the private messages of 81,000 profiles. These accounts are being sold for 10 cents each. [...]
https://www.bleepingcomputer.com/news/security/private-messages-for-81k-hacked-facebook-accounts-being-sold-online/
A seller has posted on underground criminal forums about having access to the information of 120 million Facebook users as well as access to the private messages of 81,000 profiles. These accounts are being sold for 10 cents each. [...]
https://www.bleepingcomputer.com/news/security/private-messages-for-81k-hacked-facebook-accounts-being-sold-online/
BleepingComputer
Private Messages for 81k Hacked Facebook Accounts Being Sold Online
A seller has posted on underground criminal forums about having access to the information of 120 million Facebook users as well as access to the private messages of 81,000 profiles. These accounts are being sold for 10 cents each.
New Ransomware using DiskCryptor With Custom Ransom Message
A new ransomware has been discovered that installs DiskCryptor on the infected computer and reboots your computer. On reboot, victims will be greeted with a custom ransom note that explains that their disk has been encrypted and how to pay the ransom. [...]
https://www.bleepingcomputer.com/news/security/new-ransomware-using-diskcryptor-with-custom-ransom-message/
A new ransomware has been discovered that installs DiskCryptor on the infected computer and reboots your computer. On reboot, victims will be greeted with a custom ransom note that explains that their disk has been encrypted and how to pay the ransom. [...]
https://www.bleepingcomputer.com/news/security/new-ransomware-using-diskcryptor-with-custom-ransom-message/
BleepingComputer
New Ransomware using DiskCryptor With Custom Ransom Message
A new ransomware has been discovered that installs DiskCryptor on the infected computer and reboots your computer. On reboot, victims will be greeted with a custom ransom note that explains that their disk has been encrypted and how to pay the ransom.
Mozilla Added WebP Image Support to Firefox 65
Mozilla is bringing support for Google's WebP image format to Firefox 65. The WebP image format was created by Google as a modern format designed for displaying images on the web. [...]
https://www.bleepingcomputer.com/news/software/mozilla-added-webp-image-support-to-firefox-65/
Mozilla is bringing support for Google's WebP image format to Firefox 65. The WebP image format was created by Google as a modern format designed for displaying images on the web. [...]
https://www.bleepingcomputer.com/news/software/mozilla-added-webp-image-support-to-firefox-65/
BleepingComputer
Mozilla Added WebP Image Support to Firefox 65
Mozilla is bringing support for Google's WebP image format to Firefox 65. The WebP image format was created by Google as a modern format designed for displaying images on the web.
The Week in Ransomware - November 2nd 2018 - RaaS, DiskCryptor, & More
This week we saw a new RaaS called CommonRansom, a new DiskCryptor variant, and numerous Dharma variant released. Otherwise, it has been a fairly light news week for ransomware. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-2nd-2018-raas-diskcryptor-and-more/
This week we saw a new RaaS called CommonRansom, a new DiskCryptor variant, and numerous Dharma variant released. Otherwise, it has been a fairly light news week for ransomware. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-2nd-2018-raas-diskcryptor-and-more/
BleepingComputer
The Week in Ransomware - November 2nd 2018 - RaaS, DiskCryptor, & More
This week we saw a new RaaS called CommonRansom, a new DiskCryptor variant, and numerous Dharma variant released. Otherwise, it has been a fairly light news week for ransomware.
New PortSmash Hyper-Threading CPU Vuln Can Steal Decryption Keys
A new side-channel vulnerability has been discovered called PortSmash that uses a timing attack that to steal information from other processes running on the same SMT/hyper-threading enabled CPU core. Utilizing this attack, researchers were able to steal the private decryption key from an OpenSSL thread running in the same core. [...]
https://www.bleepingcomputer.com/news/security/new-portsmash-hyper-threading-cpu-vuln-can-steal-decryption-keys/
A new side-channel vulnerability has been discovered called PortSmash that uses a timing attack that to steal information from other processes running on the same SMT/hyper-threading enabled CPU core. Utilizing this attack, researchers were able to steal the private decryption key from an OpenSSL thread running in the same core. [...]
https://www.bleepingcomputer.com/news/security/new-portsmash-hyper-threading-cpu-vuln-can-steal-decryption-keys/
BleepingComputer
New PortSmash Hyper-Threading CPU Vuln Can Steal Decryption Keys
A new side-channel vulnerability has been discovered called PortSmash that uses a timing attack that to steal information from other processes running on the same SMT/hyper-threading enabled CPU core. Utilizing this attack, researchers were able to stealβ¦
New Microsoft Edge Browser Zero-Day RCE Exploit in the Works
Details are about to emerge about a zero-day remote code execution vulnerability in the Microsoft Edge web browser, as two researchers plan to reveal a proof-of-concept and publish a general write up. Microsoft has not been told the details of this vulnerability. [...]
https://www.bleepingcomputer.com/news/security/new-microsoft-edge-browser-zero-day-rce-exploit-in-the-works/
Details are about to emerge about a zero-day remote code execution vulnerability in the Microsoft Edge web browser, as two researchers plan to reveal a proof-of-concept and publish a general write up. Microsoft has not been told the details of this vulnerability. [...]
https://www.bleepingcomputer.com/news/security/new-microsoft-edge-browser-zero-day-rce-exploit-in-the-works/
BleepingComputer
New Microsoft Edge Browser Zero-Day RCE Exploit in the Works
Details are about to emerge about a zero-day remote code execution vulnerability in the Microsoft Edge web browser, as two researchers plan to reveal a proof-of-concept and publish a general write up. Microsoft has not been told the details of this vulnerability.
Security Bug Puts Online Radio Stations At Risk
A vulnerability discovered in Icecast streaming media server could be leveraged by an attacker to kill the broadcast of online radio stations that rely on it to reach their audience. [...]
https://www.bleepingcomputer.com/news/security/security-bug-puts-online-radio-stations-at-risk/
A vulnerability discovered in Icecast streaming media server could be leveraged by an attacker to kill the broadcast of online radio stations that rely on it to reach their audience. [...]
https://www.bleepingcomputer.com/news/security/security-bug-puts-online-radio-stations-at-risk/
BleepingComputer
Security Bug Puts Online Radio Stations At Risk
A vulnerability discovered in Icecast streaming media server could be leveraged by an attacker to kill the broadcast of online radio stations that rely on it to reach their audience.
Scammers Ride on Voter Info Website Popularity to Push Scareware Alerts
[...]
https://www.bleepingcomputer.com/news/security/scammers-ride-on-voter-info-website-popularity-to-push-scareware-alerts/
[...]
https://www.bleepingcomputer.com/news/security/scammers-ride-on-voter-info-website-popularity-to-push-scareware-alerts/
BleepingComputer
Scammers Ride on Voter Info Website Popularity to Push Scareware Alerts
Online swindlers looking for a quick buck are using a domain that can be easily confused with a voter information website to redirect users to pages pushing various types of scams.
Chrome 71 Will Block All Ads on Abusive Sites in December
Google has announced that starting in December 2018, Chrome 71 will remove all ads on sites that have repeatedly performed abusive behavior. [...]
https://www.bleepingcomputer.com/news/google/chrome-71-will-block-all-ads-on-abusive-sites-in-december/
Google has announced that starting in December 2018, Chrome 71 will remove all ads on sites that have repeatedly performed abusive behavior. [...]
https://www.bleepingcomputer.com/news/google/chrome-71-will-block-all-ads-on-abusive-sites-in-december/
BleepingComputer
Chrome 71 Will Block All Ads on Abusive Sites in December
Google has announced that starting in December 2018, Chrome 71 will remove all ads on sites that have repeatedly performed abusive behavior.
Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
Researchers have found flaws that can be exploited to bypass hardware decryption without a password in well known and popular SSD drives. [...]
https://www.bleepingcomputer.com/news/security/flaws-in-popular-ssd-drives-bypass-hardware-disk-encryption/
Researchers have found flaws that can be exploited to bypass hardware decryption without a password in well known and popular SSD drives. [...]
https://www.bleepingcomputer.com/news/security/flaws-in-popular-ssd-drives-bypass-hardware-disk-encryption/
BleepingComputer
Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
Researchers have found flaws that can be exploited to bypass hardware decryption without a password in well known and popular SSD drives.
Microsoft is Porting Sysinternals Tools to Linux - ProcDump Released
If you have administered Windows computers or assisted in Windows malware removal, then there is a good chance you have heard of the popular free Sysinternals utilities. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-porting-sysinternals-tools-to-linux-procdump-released/
If you have administered Windows computers or assisted in Windows malware removal, then there is a good chance you have heard of the popular free Sysinternals utilities. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-porting-sysinternals-tools-to-linux-procdump-released/
BleepingComputer
Microsoft is Porting Sysinternals Tools to Linux - ProcDump Released
If you have administered Windows computers or assisted in Windows malware removal, then there is a good chance you have heard of the popular free Sysinternals utilities.
Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
A widespread scam pretending to be from Elon Musk and utilizing a stream of hacked Twitter accounts and fake giveaway sites has earned scammers over 28 bitcoins or approximately $180,000 in a single day. [...]
https://www.bleepingcomputer.com/news/security/fake-elon-musk-twitter-bitcoin-scam-earned-180k-in-one-day/
A widespread scam pretending to be from Elon Musk and utilizing a stream of hacked Twitter accounts and fake giveaway sites has earned scammers over 28 bitcoins or approximately $180,000 in a single day. [...]
https://www.bleepingcomputer.com/news/security/fake-elon-musk-twitter-bitcoin-scam-earned-180k-in-one-day/
BleepingComputer
Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
A widespread scam pretending to be from Elon Musk and utilizing a stream of hacked Twitter accounts and fake giveaway sites has earned scammers over 28 bitcoins or approximately $180,000 in a single day.