BleepingComputer
10.3K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Chrome's Sandbox Feature Infringes on Three Patents So Google Must Now Pay $20M

After five years of litigation at various levels of the US legal system, today, following the conclusion of a jury trial, Google was ordered to pay $20 million to two developers after a jury ruled that Google had infringed on three patents when it designed some of Chrome's anti-malware features. [...]

https://www.bleepingcomputer.com/news/google/chromes-sandbox-feature-infringes-on-three-patents-so-google-must-now-pay-20m/
Hacker Who Blackmailed Dozens of Female Victims Gets 8 Years in Prison

A New Hampshire hacker will spend the next eight years of his life in prison after he hacked into the email and social media accounts of dozens of females, including ten minors, and harassed and extorted victims into sending sexually explicit photos. [...]

https://www.bleepingcomputer.com/news/security/hacker-who-blackmailed-dozens-of-female-victims-gets-8-years-in-prison/
PacketTotal - A Useful Site for Analyzing PCAP Files

If you are InfoSec professional who commonly deals with intrusion detection and response or malware analysis, a new site called PacketTotal may make your life easier. PacketTotal allows you to upload a PCAP, or packet capture, file and have it automatically analyzed and parsed against BRO IDS and Suricata signatures., [...]

https://www.bleepingcomputer.com/news/security/packettotal-a-useful-site-for-analyzing-pcap-files/
Researchers Create PoC Ransomware That Targets ICS/SCADA Systems

Researchers from the Georgia Institute of Technology (GIT) have created a proof-of-concept ransomware strain that can alter programmable logic controller (PLC) parameters. The research team presented their work yesterday, at the RSA cyber-security conference in San Francisco. [...]

https://www.bleepingcomputer.com/news/security/researchers-create-poc-ransomware-that-targets-ics-scada-systems/
Mysterious Girl at the Heart of Cyber-Espionage Campaign

During the past year, social media profiles belonging to a girl named Safeena Malik have been at the heart of a series of phishing attacks that have targeted journalists and activists investigating Qatari migrant worker labor issues. [...]

https://www.bleepingcomputer.com/news/security/mysterious-girl-at-the-heart-of-cyber-espionage-campaign/
Microsoft Delays February 2017 Security Updates Due to "Last Minute Issue"

In a short announcement posted on its blog today, Microsoft announced it was delaying today's Patch Tuesday security updates indefinitely until its engineers address a last minute issue the company expected to cause problems for customers, if deployed today. [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-delays-february-2017-security-updates-due-to-last-minute-issue-/
Adobe fixes 24 Security Vulnerabilities in Adobe Flash, Digital Editions, & Campaign

Adobe has released updates for Adobe Flash Player, Digital Editions, & Campaign that fix a total of 24 security vulnerabilities, with half of them being in Adobe Flash Player. As many of these vulnerabilities are rated as Critical, it is strongly advised that anyone using these products immediately update them to the latest version. [...]

https://www.bleepingcomputer.com/news/security/adobe-fixes-24-security-vulnerabilities-in-adobe-flash-digital-editions-and-campaign/
Cerber Ransomware Doesn't Encrypt Files Belonging to Security Products

A variant of the Cerber ransomware spotted in the wild in the past month contains a function that searches for locally-installed security products and avoids encrypting their files, so firewalls, antivirus or antispyware products can continue working even after Cerber has locked the computer. [...]

https://www.bleepingcomputer.com/news/security/cerber-ransomware-doesnt-encrypt-files-belonging-to-security-products/
JavaScript Attack Breaks ASLR on 22 CPU Architectures

Five researchers from the Vrije University in the Netherlands have put together an attack that can be carried out via JavaScript code and break ASLR protection on at least 22 microprocessor architectures from vendors such as Intel, AMD, ARM, Allwinner, Nvidia, and others. [...]

https://www.bleepingcomputer.com/news/security/javascript-attack-breaks-aslr-on-22-cpu-architectures/
Microsoft's February Patch Tuesday Moved to March 14

After Microsoft said on Tuesday that it was postponing its February Patch Tuesday indefinitely, the company issued a new statement today, announcing that February's patches will arrive on March 14, next month. [...]

https://www.bleepingcomputer.com/news/microsoft/microsofts-february-patch-tuesday-moved-to-march-14/
Researchers Create New System That Makes Bitcoin Transactions Harder to Track

Researchers from Boston University, North Carolina State University, and George Mason University have created a new protocol called TumbleBit that they say can anonymize Bitcoin transactions better than any other previously developed Bitcoin mixing service. [...]

https://www.bleepingcomputer.com/news/software/researchers-create-new-system-that-makes-bitcoin-transactions-harder-to-track/