Latest news and stories from BleepingComputer.com
Ethereum Cryptocurrency Forum Suffers Data Breach
Administrators of the Ethereum Project have announced today a data breach that affected over 16,500 users of the platform's community forums. The breach took place last Friday, on December 16. The database backup the attacker managed to get his hands on was taken on April 2016. [...]
Ethereum Cryptocurrency Forum Suffers Data Breach
Administrators of the Ethereum Project have announced today a data breach that affected over 16,500 users of the platform's community forums. The breach took place last Friday, on December 16. The database backup the attacker managed to get his hands on was taken on April 2016. [...]
BleepingComputer
Ethereum Cryptocurrency Forum Suffers Data Breach
Administrators of the Ethereum Project have announced today a data breach that affected over 16,500 users of the platform's community forums. The breach took place last Friday, on December 16. The database backup the attacker managed to get his hands on was…
Latest news and stories from BleepingComputer.com
Cyber-Attack Causes Second Power Grid Outage in the Ukraine in the Past Year
According to statements from Ukrenergo, a Ukrainian energy provider, a cyber-attack may have caused a power outage in northern Ukraine, almost a year after another cyber-attack had shut down power supply across several regions during Christmas 2015. [...]
Cyber-Attack Causes Second Power Grid Outage in the Ukraine in the Past Year
According to statements from Ukrenergo, a Ukrainian energy provider, a cyber-attack may have caused a power outage in northern Ukraine, almost a year after another cyber-attack had shut down power supply across several regions during Christmas 2015. [...]
BleepingComputer
Cyber-Attack Causes Second Power Grid Outage in the Ukraine in the Past Year
According to statements from Ukrenergo, a Ukrainian energy provider, a cyber-attack may have caused a power outage in northern Ukraine, almost a year after another cyber-attack had shut down power supply across several regions during Christmas 2015.
Latest news and stories from BleepingComputer.com
Malware Disguises Installer as Windows "Save As" Dialog Box
Malware distributed via affiliate programs and bundled with other applications is using a devious tactic to fool users into installing it on their systems. [...]
Malware Disguises Installer as Windows "Save As" Dialog Box
Malware distributed via affiliate programs and bundled with other applications is using a devious tactic to fool users into installing it on their systems. [...]
BleepingComputer
Malware Disguises Installer as Windows "Save As" Dialog Box
Malware distributed via affiliate programs and bundled with other applications is using a devious tactic to fool users into installing it on their systems.
Latest news and stories from BleepingComputer.com
Russian Methbot Operation Makes up to $5 Million per Day from Click-Fraud
A bot farm involving hundreds of servers and over 570K different IP addresses has caused losses for online video advertisers ranging from $3 to $5M per day. This bot farm, nicknamed Methbot, dates back to Sep 2015, when US security firm White Ops had first detected signs of automated traffic coming from the crook's infrastructure. [...]
Russian Methbot Operation Makes up to $5 Million per Day from Click-Fraud
A bot farm involving hundreds of servers and over 570K different IP addresses has caused losses for online video advertisers ranging from $3 to $5M per day. This bot farm, nicknamed Methbot, dates back to Sep 2015, when US security firm White Ops had first detected signs of automated traffic coming from the crook's infrastructure. [...]
BleepingComputer
Russian Methbot Operation Makes up to $5 Million per Day from Click-Fraud
A bot farm involving hundreds of servers and over 570K different IP addresses has caused losses for online video advertisers ranging from $3 to $5M per day. This bot farm, nicknamed Methbot, dates back to Sep 2015, when US security firm White Ops had first…
Latest news and stories from BleepingComputer.com
New "Alice" Malware Makes ATMs Spit Out Cash
In November 2016, Europol and Trend Micro discovered a new breed of malware that targets ATMs and enables crooks with physical access to the machine's ports to make an ATM spit out cash. [...]
New "Alice" Malware Makes ATMs Spit Out Cash
In November 2016, Europol and Trend Micro discovered a new breed of malware that targets ATMs and enables crooks with physical access to the machine's ports to make an ATM spit out cash. [...]
BleepingComputer
New "Alice" Malware Makes ATMs Spit Out Cash
In November 2016, Europol and Trend Micro discovered a new breed of malware that targets ATMs and enables crooks with physical access to the machine's ports to make an ATM spit out cash.
Latest news and stories from BleepingComputer.com
Mysterious Rakos Botnet Rises in the Shadows by Targeting Linux Servers, IoT Devices
Somebody is building a botnet by infecting Linux servers and Linux-based IoT devices with a new malware strain named Rakos. First detected online over the summer, this new malware strain is harmless, at least in its current variant. [...]
Mysterious Rakos Botnet Rises in the Shadows by Targeting Linux Servers, IoT Devices
Somebody is building a botnet by infecting Linux servers and Linux-based IoT devices with a new malware strain named Rakos. First detected online over the summer, this new malware strain is harmless, at least in its current variant. [...]
BleepingComputer
Mysterious Rakos Botnet Rises in the Shadows by Targeting Linux Servers, IoT Devices
Somebody is building a botnet by infecting Linux servers and Linux-based IoT devices with a new malware strain named Rakos. First detected online over the summer, this new malware strain is harmless, at least in its current variant.
Latest news and stories from BleepingComputer.com
Kaspersky updates RannohDecryptor to decrypt CryptXXX's Crypt, Cryp1, and Crypz Extensions
If you are a CryptXXX Ransomware victim who didn't pay the ransom and instead decided to store their encrypted files and ransom notes for future fixes then you are in luck. Today, Kaspersky announced that they updated their RannohDecryptor program to decrypt CryptXXX encrypted files that have the .crypt, .cryp1 and .crypz extensions. [...]
Kaspersky updates RannohDecryptor to decrypt CryptXXX's Crypt, Cryp1, and Crypz Extensions
If you are a CryptXXX Ransomware victim who didn't pay the ransom and instead decided to store their encrypted files and ransom notes for future fixes then you are in luck. Today, Kaspersky announced that they updated their RannohDecryptor program to decrypt CryptXXX encrypted files that have the .crypt, .cryp1 and .crypz extensions. [...]
BleepingComputer
Kaspersky updates RannohDecryptor to decrypt CryptXXX's Crypt, Cryp1, and Crypz Extensions
If you are a CryptXXX Ransomware victim who didn't pay the ransom and instead decided to store their encrypted files and ransom notes for future fixes then you are in luck. Today, Kaspersky announced that they updated their RannohDecryptor program to decrypt…
Latest news and stories from BleepingComputer.com
Panasonic Plays Down Security Bugs Found in Airplane In-Flight Entertainment Systems
Security firm IOActive published research yesterday detailing security flaws in the in-flight entertainment systems developed by Panasonic Avionics, used by multiple airlines such as United, Emirates, Virgin, KLM, Etihad, Scandinavian, Air France, and many other more. [...]
Panasonic Plays Down Security Bugs Found in Airplane In-Flight Entertainment Systems
Security firm IOActive published research yesterday detailing security flaws in the in-flight entertainment systems developed by Panasonic Avionics, used by multiple airlines such as United, Emirates, Virgin, KLM, Etihad, Scandinavian, Air France, and many other more. [...]
BleepingComputer
Panasonic Plays Down Security Bugs Found in Airplane In-Flight Entertainment Systems
Security firm IOActive published research yesterday detailing security flaws in the in-flight entertainment systems developed by Panasonic Avionics, used by multiple airlines such as United, Emirates, Virgin, KLM, Etihad, Scandinavian, Air France, and many…
Latest news and stories from BleepingComputer.com
Crook Who Used His Home IP Address for Banking Fraud Gets 5 Years in Prison
A UK judge sentenced a crook part of a cybercrime operation that used banking malware to five years in prison for stealing £840,000 ($1,035,000) from victims all over the world. [...]
Crook Who Used His Home IP Address for Banking Fraud Gets 5 Years in Prison
A UK judge sentenced a crook part of a cybercrime operation that used banking malware to five years in prison for stealing £840,000 ($1,035,000) from victims all over the world. [...]
BleepingComputer
Crook Who Used His Home IP Address for Banking Fraud Gets 5 Years in Prison
A UK judge sentenced a crook part of a cybercrime operation that used banking malware to five years in prison for stealing £840,000 ($1,035,000) from victims all over the world.
Latest news and stories from BleepingComputer.com
Google Employee Sues Company Over "Internal Spying Program"
A man who worked at Google as a product manager in its Nest division is now suing the company over what he and his lawyer describe as an internal "spying program." [...]
Google Employee Sues Company Over "Internal Spying Program"
A man who worked at Google as a product manager in its Nest division is now suing the company over what he and his lawyer describe as an internal "spying program." [...]
BleepingComputer
Google Employee Sues Company Over "Internal Spying Program"
A man who worked at Google as a product manager in its Nest division is now suing the company over what he and his lawyer describe as an internal "spying program."
Latest news and stories from BleepingComputer.com
Hotbed of Cybercrime Activity Tracked Down to ISP in Ukrainian Region Under Russian Control
More details have surfaced regarding a recent wave of brute-force attacks (dictionary attacks to be more accurate) that have targeted WordPress sites over the past few weeks. [...]
Hotbed of Cybercrime Activity Tracked Down to ISP in Ukrainian Region Under Russian Control
More details have surfaced regarding a recent wave of brute-force attacks (dictionary attacks to be more accurate) that have targeted WordPress sites over the past few weeks. [...]
BleepingComputer
Hotbed of Cybercrime Activity Tracked Down to ISP in Ukrainian Region Under Russian Control
More details have surfaced regarding a recent wave of brute-force attacks (dictionary attacks to be more accurate) that have targeted WordPress sites over the past few weeks.
Latest news and stories from BleepingComputer.com
Google Releases Tool to Help Developers Find Crypto Bugs
Google released this week a new tool called Project Wycheproof, which is a set of automated tests developers can run on their code and identify weaknesses or problems in the sections that deal with cryptography operations. [...]
Google Releases Tool to Help Developers Find Crypto Bugs
Google released this week a new tool called Project Wycheproof, which is a set of automated tests developers can run on their code and identify weaknesses or problems in the sections that deal with cryptography operations. [...]
BleepingComputer
Google Releases Tool to Help Developers Find Crypto Bugs
Google released this week a new tool called Project Wycheproof, which is a set of automated tests developers can run on their code and identify weaknesses or problems in the sections that deal with cryptography operations.
Latest news and stories from BleepingComputer.com
Meet "Hailstorm," the Latest Email Spamming Technique
A new technique for sending email spam has become very popular with cyber-criminals, said Cisco this week, following an investigation from its Talos and Umbrella DNS security teams. [...]
Meet "Hailstorm," the Latest Email Spamming Technique
A new technique for sending email spam has become very popular with cyber-criminals, said Cisco this week, following an investigation from its Talos and Umbrella DNS security teams. [...]
BleepingComputer
Meet "Hailstorm," the Latest Email Spamming Technique
A new technique for sending email spam has become very popular with cyber-criminals, said Cisco this week, following an investigation from its Talos and Umbrella DNS security teams.
Latest news and stories from BleepingComputer.com
Firefox to Expand Sandbox Security Feature
Mozilla announced plans to expand the Firefox sandbox security features with the introduction of a second sandboxing system for working with the browser's new multi-process e10s (Electrolysis) feature. [...]
Firefox to Expand Sandbox Security Feature
Mozilla announced plans to expand the Firefox sandbox security features with the introduction of a second sandboxing system for working with the browser's new multi-process e10s (Electrolysis) feature. [...]
BleepingComputer
Firefox to Expand Sandbox Security Feature
Mozilla announced plans to expand the Firefox sandbox security features with the introduction of a second sandboxing system for working with the browser's new multi-process e10s (Electrolysis) feature.
Latest news and stories from BleepingComputer.com
Russian Cyber-Espionage Group Tracked Ukrainian Military Using Android Malware
A cyber-espionage group linked to the Russian military has developed Android malware which it used to infect the smartphones of Ukrainian soldiers and track Ukrainian field artillery units, according to a report released today by Crowdstrike. [...]
Russian Cyber-Espionage Group Tracked Ukrainian Military Using Android Malware
A cyber-espionage group linked to the Russian military has developed Android malware which it used to infect the smartphones of Ukrainian soldiers and track Ukrainian field artillery units, according to a report released today by Crowdstrike. [...]
BleepingComputer
Russian Cyber-Espionage Group Tracked Ukrainian Military Using Android Malware
A cyber-espionage group linked to the Russian military has developed Android malware which it used to infect the smartphones of Ukrainian soldiers and track Ukrainian field artillery units, according to a report released today by Crowdstrike.
Latest news and stories from BleepingComputer.com
Groupon Users Targeted by Hackers One Week Before Christmas
Starting with December 16, scores of Groupon UK users have been complaining online about having their accounts hacked after finding out that fraudsters have placed countless of orders using the payment card the victims had attached to their Groupon profile. [...]
Groupon Users Targeted by Hackers One Week Before Christmas
Starting with December 16, scores of Groupon UK users have been complaining online about having their accounts hacked after finding out that fraudsters have placed countless of orders using the payment card the victims had attached to their Groupon profile. [...]
BleepingComputer
Groupon Users Targeted by Hackers One Week Before Christmas
Starting with December 16, scores of Groupon UK users have been complaining online about having their accounts hacked after finding out that fraudsters have placed countless of orders using the payment card the victims had attached to their Groupon profile.
Latest news and stories from BleepingComputer.com
How to Protect and Harden a Computer against Ransomware
2016 is almost over and it definitely taught us one thing; Ransomware is here to stay and it's only going to get worse. This guide contains tips and steps that every computer user needs to do in order to protect their data from ransomware. [...]
How to Protect and Harden a Computer against Ransomware
2016 is almost over and it definitely taught us one thing; Ransomware is here to stay and it's only going to get worse. This guide contains tips and steps that every computer user needs to do in order to protect their data from ransomware. [...]
BleepingComputer
How to Protect and Harden a Computer against Ransomware
2016 is almost over and it definitely taught us one thing; Ransomware is here to stay and it's only going to get worse. This guide contains tips and steps that every computer user needs to do in order to protect their data from ransomware.
Latest news and stories from BleepingComputer.com
Cerber Ransomware Doesn't Delete Shadow Volume Copies Anymore, Prioritizes Office Docs
Recent versions of the Cerber ransomware are behaving somewhat different from older variants, with the ransomware not deleting shadow volume copies, prioritizing specific folders and ignoring others. [...]
Cerber Ransomware Doesn't Delete Shadow Volume Copies Anymore, Prioritizes Office Docs
Recent versions of the Cerber ransomware are behaving somewhat different from older variants, with the ransomware not deleting shadow volume copies, prioritizing specific folders and ignoring others. [...]
BleepingComputer
Cerber Ransomware Doesn't Delete Shadow Volume Copies Anymore, Prioritizes Office Docs
Recent versions of the Cerber ransomware are behaving somewhat different from older variants, with the ransomware not deleting shadow volume copies, prioritizing specific folders and ignoring others.
Latest news and stories from BleepingComputer.com
Russian Investigators to Attempt to Crack iPhone Belonging to Ambassador's Killer
Russian investigative experts sent to Turkey to help with the investigation into the assassination of Andrey Karlov, the Russian Ambassador to Turkey, are attempting to crack the killer's iPhone, but doing it without asking Apple for help. [...]
Russian Investigators to Attempt to Crack iPhone Belonging to Ambassador's Killer
Russian investigative experts sent to Turkey to help with the investigation into the assassination of Andrey Karlov, the Russian Ambassador to Turkey, are attempting to crack the killer's iPhone, but doing it without asking Apple for help. [...]
BleepingComputer
Russian Investigators to Attempt to Crack iPhone Belonging to Ambassador's Killer
Russian investigative experts sent to Turkey to help with the investigation into the assassination of Andrey Karlov, the Russian Ambassador to Turkey, are attempting to crack the killer's iPhone, but doing it without asking Apple for help.
Latest news and stories from BleepingComputer.com
As Bitcoin Price Surges, Phishing Attacks on Cryptocurrency Wallets Intensify
Bitcoin price surge reverberates through cybercriminal landscape, as cyber-criminals ramp up phishing attacks against Bitcoin users. [...]
As Bitcoin Price Surges, Phishing Attacks on Cryptocurrency Wallets Intensify
Bitcoin price surge reverberates through cybercriminal landscape, as cyber-criminals ramp up phishing attacks against Bitcoin users. [...]
BleepingComputer
As Bitcoin Price Surges, Phishing Attacks on Cryptocurrency Wallets Intensify
Bitcoin price surge reverberates through cybercriminal landscape, as cyber-criminals ramp up phishing attacks against Bitcoin users.