BleepingComputer
10.4K subscribers
41 photos
24.6K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
Cerber Ransomware Developers make changes that defeat Check Point's Decryption Service
In just one day, the developers behind the Cerber Ransomware have made changes that blocked Check Point Software from decrypting Cerber victim's for free. At the same time, Cerber has added a captcha to their payment system. Was a simple captcha used to block Check Points' decryption system? [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
Microsoft released Windows 10 Insider Preview Build 14905 for PC & Mobile
Well it's time once again, Microsoft has released Windows 10 Insider Preview Build 14905 to insiders on the fast ring.  In this build Microsoft has made more sounds available that can be used to personalize Windows. Information on how to access these sounds can be found below. [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
New Deal: 92% off the Become an Ethical Hacker Bonus Course Bundle
A new deal is available for 92% off the Become an Ethical Hacker Bonus Bundle. This 9 course bundle and over 60 hours of training teaches you how to become an ethical hacker and to learn the fundamentals of pentesting. These courses are normally priced at $681.00, this deal has been discounted 92% to $49.00 [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
Australian Porn Site Members Targeted School Girls for Nude Images
Members of a pornography website targeted dozens of Australian schools so they could view and swap graphic sexual images of female students and other non-consenting women. News.com reports that members of the site have posted and shared more than 2,000 images since December 2015. [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
New FSociety Ransomware pays homage to Mr. Robot
Today Michael Gillespie discovered a new EDA2 variant that I have dubbed the FSociety Ransomware based on the image used on the infection's wallpaper. Fans of Mr. Robot, will instantly recognize the image as the logo of the show's infamous hacking group called FSociety. [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
Youndoo Adware hijacks Browser Homepage using DLL Hijacking
Adware vendors are constantly using new methods to inject advertisements or to hijack the home pages of computer user's browsers. Recently, Djordje Lukic, a malware researcher for Zemana, passed along a sample of a a new variant of the Youndoo Browser Hijacker. This sample uses DLL Hijacking and information in the registry to hijack [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
Warning! Next Bitcoin Core Version Could be Hacked, Reads Advisory
On 17 August, open-source project Bitcoin.org announced on their website that the next version of Bitcoin Core, a popular digital wallet for the cryptocurrency, could be hacked and replaced with a malicious look-alike by state sponsored actors. [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
New DetoxCrypto Ransomware pretends to be PokemonGo or uploads a Picture of your Screen
A new ransomware called DetoxCrypto has been discovered that includes variant that take pictures of your active screen or try to take part in the PokemonGo craze. [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
The Week in Ransomware - August 19 2016 - Cerber, FSociety, PokemonGo, and More
Wow... it has been a really busy week for ransomware. The top stories this week are the rise of Pop Culture Ransomware, as seen by two Pokemon variants and a Mr. Robot variant, and Check Point's Cerber report and short-lived, but useful, decryption service. [...]
BleepingComputer
Photo
Latest news and stories from BleepingComputer.com
How to Trick Facial Recognition Tech with a Facebook Photo
Security researchers have demonstrated a system by which they can use publicly available photographs of an individual to trick facial recognition technology and achieve successful authentication. [...]