Hacker Group Defaces Hundreds of Websites After Hacking UK Hosting Firm
[...]
https://www.bleepingcomputer.com/news/security/hacker-group-defaces-hundreds-of-websites-after-hacking-uk-hosting-firm/
[...]
https://www.bleepingcomputer.com/news/security/hacker-group-defaces-hundreds-of-websites-after-hacking-uk-hosting-firm/
BleepingComputer
Hacker Group Defaces Hundreds of Websites After Hacking UK Hosting Firm
Mozilla's Plans for Firefox Themes in 2017
Mozilla plans to deprecated support for complete themes and focus on lightweight themes instead. No official cut-off date has been provided yet. [...]
https://www.bleepingcomputer.com/news/software/mozillas-plans-for-firefox-themes-in-2017/
Mozilla plans to deprecated support for complete themes and focus on lightweight themes instead. No official cut-off date has been provided yet. [...]
https://www.bleepingcomputer.com/news/software/mozillas-plans-for-firefox-themes-in-2017/
BleepingComputer
Mozilla's Plans for Firefox Themes in 2017
Mozilla plans to deprecated support for complete themes and focus on lightweight themes instead. No official cut-off date has been provided yet.
SHA1 Collision Attack Makes Its First Victim: Subversion Repositories
It took only one day for the SHA1 collision attack revealed by Google on Thursday to make its first victims after developers of the WebKit browser engine broke their Subversion (SVN) source code repository on Friday. [...]
https://www.bleepingcomputer.com/news/security/sha1-collision-attack-makes-its-first-victim-subversion-repositories/
It took only one day for the SHA1 collision attack revealed by Google on Thursday to make its first victims after developers of the WebKit browser engine broke their Subversion (SVN) source code repository on Friday. [...]
https://www.bleepingcomputer.com/news/security/sha1-collision-attack-makes-its-first-victim-subversion-repositories/
BleepingComputer
SHA1 Collision Attack Makes Its First Victim: Subversion Repositories
It took only one day for the SHA1 collision attack revealed by Google on Thursday to make its first victims after developers of the WebKit browser engine broke their Subversion (SVN) source code repository on Friday.
Mininova Torrent Portal Will Be Shutting Down on April 4th, 2017
Mininova, a veteran of the torrenting scene, announced today it was shutting down via a message on its homepage, closing its doors after 13 years of existence. [...]
https://www.bleepingcomputer.com/news/legal/mininova-torrent-portal-will-be-shutting-down-on-april-4th-2017/
Mininova, a veteran of the torrenting scene, announced today it was shutting down via a message on its homepage, closing its doors after 13 years of existence. [...]
https://www.bleepingcomputer.com/news/legal/mininova-torrent-portal-will-be-shutting-down-on-april-4th-2017/
BleepingComputer
Mininova Torrent Portal Will Be Shutting Down on April 4th, 2017
Mininova, a veteran of the torrenting scene, announced today it was shutting down via a message on its homepage, closing its doors after 13 years of existence.
Upcoming Windows 10 Feature Will Block Installation of Win32 Apps
Starting with Windows 10 build number 15042, Microsoft will allow administrators to block the installation of Win32 applications on their computer. [...]
https://www.bleepingcomputer.com/news/microsoft/upcoming-windows-10-feature-will-block-installation-of-win32-apps/
Starting with Windows 10 build number 15042, Microsoft will allow administrators to block the installation of Win32 applications on their computer. [...]
https://www.bleepingcomputer.com/news/microsoft/upcoming-windows-10-feature-will-block-installation-of-win32-apps/
BleepingComputer
Upcoming Windows 10 Feature Will Block Installation of Win32 Apps
Starting with Windows 10 build number 15042, Microsoft will allow administrators to block the installation of Win32 applications on their computer.
Google Open-Sources Chrome Extension to Make PGP Encryption Easier in Gmail
Late Friday, last week, Google announced a new tool for security-minded users, called E2EMail, a Chrome extension that simplifies the installation of PGP encryption for Gmail. [...]
https://www.bleepingcomputer.com/news/google/google-open-sources-chrome-extension-to-make-pgp-encryption-easier-in-gmail/
Late Friday, last week, Google announced a new tool for security-minded users, called E2EMail, a Chrome extension that simplifies the installation of PGP encryption for Gmail. [...]
https://www.bleepingcomputer.com/news/google/google-open-sources-chrome-extension-to-make-pgp-encryption-easier-in-gmail/
BleepingComputer
Google Open-Sources Chrome Extension to Make PGP Encryption Easier in Gmail
Late Friday, last week, Google announced a new tool for security-minded users, called E2EMail, a Chrome extension that simplifies the installation of PGP encryption for Gmail.
87% of Millennials Engage in Password Reuse
Password reuse is rampant among people aged 18 to 31, a category also referred to as millennials, according to a recent survey carried out by Keeper, the company behind the eponymous password manager application. [...]
https://www.bleepingcomputer.com/news/security/87-percent-of-millennials-engage-in-password-reuse/
Password reuse is rampant among people aged 18 to 31, a category also referred to as millennials, according to a recent survey carried out by Keeper, the company behind the eponymous password manager application. [...]
https://www.bleepingcomputer.com/news/security/87-percent-of-millennials-engage-in-password-reuse/
BleepingComputer
87% of Millennials Engage in Password Reuse
Password reuse is rampant among people aged 18 to 31, a category also referred to as millennials, according to a recent survey carried out by Keeper, the company behind the eponymous password manager application.
Mozilla Buys Pocket in Its First Ever Business Acquisition
Mozilla has acquired Pocket, formerly known as Read It Later, a company founded in 2007 that allows users to save links and then read them later via their website, browser add-ons, or mobile applications. [...]
https://www.bleepingcomputer.com/news/software/mozilla-buys-pocket-in-its-first-ever-business-acquisition/
Mozilla has acquired Pocket, formerly known as Read It Later, a company founded in 2007 that allows users to save links and then read them later via their website, browser add-ons, or mobile applications. [...]
https://www.bleepingcomputer.com/news/software/mozilla-buys-pocket-in-its-first-ever-business-acquisition/
BleepingComputer
Mozilla Buys Pocket in Its First Ever Business Acquisition
Mozilla has acquired Pocket, formerly known as Read It Later, a company founded in 2007 that allows users to save links and then read them later via their website, browser add-ons, or mobile applications.
Severe SQL Injection Flaw Discovered in WordPress Plugin with Over 1 Million Installs
A WordPress plugin installed on over one million sites has just fixed a severe SQL injection vulnerability that can allow attackers to steal data from a website's database. [...]
https://www.bleepingcomputer.com/news/security/severe-sql-injection-flaw-discovered-in-wordpress-plugin-with-over-1-million-installs/
A WordPress plugin installed on over one million sites has just fixed a severe SQL injection vulnerability that can allow attackers to steal data from a website's database. [...]
https://www.bleepingcomputer.com/news/security/severe-sql-injection-flaw-discovered-in-wordpress-plugin-with-over-1-million-installs/
BleepingComputer
Severe SQL Injection Flaw Discovered in WordPress Plugin with Over 1 Million Installs
A WordPress plugin installed on over one million sites has just fixed a severe SQL injection vulnerability that can allow attackers to steal data from a website's database.
Tens of Thousands of Chromebooks Fail Due to Bug in Security Product
A large chunk of the 120,000 Chromebooks deployed at Maryland's Montgomery County schools went down last week after computers using Symantec BlueCoat security software weren't able to handle TLS 1.3 connections that Google started supporting with the release of Chrome and Chrome OS 56. [...]
https://www.bleepingcomputer.com/news/security/tens-of-thousands-of-chromebooks-fail-due-to-bug-in-security-product/
A large chunk of the 120,000 Chromebooks deployed at Maryland's Montgomery County schools went down last week after computers using Symantec BlueCoat security software weren't able to handle TLS 1.3 connections that Google started supporting with the release of Chrome and Chrome OS 56. [...]
https://www.bleepingcomputer.com/news/security/tens-of-thousands-of-chromebooks-fail-due-to-bug-in-security-product/
BleepingComputer
Tens of Thousands of Chromebooks Fail Due to Bug in Security Product
A large chunk of the 120,000 Chromebooks deployed at Maryland's Montgomery County schools went down last week after computers using Symantec BlueCoat security software weren't able to handle TLS 1.3 connections that Google started supporting with the releaseβ¦
Google Security Researcher Finds Security Hole in ESET's Mac Antivirus
Mac users utilizing ESET's endpoint antivirus are advised to update to version 6.4.168.0 as soon as possible in order to mitigate a serious issue that allows attackers to execute arbitrary code on their machines. [...]
https://www.bleepingcomputer.com/news/security/google-security-researcher-finds-security-hole-in-esets-mac-antivirus/
Mac users utilizing ESET's endpoint antivirus are advised to update to version 6.4.168.0 as soon as possible in order to mitigate a serious issue that allows attackers to execute arbitrary code on their machines. [...]
https://www.bleepingcomputer.com/news/security/google-security-researcher-finds-security-hole-in-esets-mac-antivirus/
BleepingComputer
Google Security Researcher Finds Security Hole in ESET's Mac Antivirus
Mac users utilizing ESET's endpoint antivirus are advised to update to version 6.4.168.0 as soon as possible in order to mitigate a serious issue that allows attackers to execute arbitrary code on their machines.
Web Cache Deception Attack Tricks Servers Into Caching Pages with Personal Data
Caching servers commonly deployed with big-name services will often cache the incorrect page content, including personal details, when the user accesses a non-existent resource, such as CSS or JavaScript files. [...]
https://www.bleepingcomputer.com/news/security/web-cache-deception-attack-tricks-servers-into-caching-pages-with-personal-data/
Caching servers commonly deployed with big-name services will often cache the incorrect page content, including personal details, when the user accesses a non-existent resource, such as CSS or JavaScript files. [...]
https://www.bleepingcomputer.com/news/security/web-cache-deception-attack-tricks-servers-into-caching-pages-with-personal-data/
BleepingComputer
Web Cache Deception Attack Tricks Servers Into Caching Pages with Personal Data
Caching servers commonly deployed with big-name services will often cache the incorrect page content, including personal details, when the user accesses a non-existent resource, such as CSS or JavaScript files.
AWS Goes Down, and So Do Millions of Websites, Apps, and Other Services
Millions of small websites, app backends, and various high-profile services are offline or experiencing severe issues because of a mysterious problem that hit Amazon's S3 (Simple Storage Service) a few hours ago. [...]
https://www.bleepingcomputer.com/news/hardware/aws-goes-down-and-so-do-millions-of-websites-apps-and-other-services/
Millions of small websites, app backends, and various high-profile services are offline or experiencing severe issues because of a mysterious problem that hit Amazon's S3 (Simple Storage Service) a few hours ago. [...]
https://www.bleepingcomputer.com/news/hardware/aws-goes-down-and-so-do-millions-of-websites-apps-and-other-services/
BleepingComputer
AWS Goes Down, and So Do Millions of Websites, Apps, and Other Services
Millions of small websites, app backends, and various high-profile services are offline or experiencing severe issues because of a mysterious problem that hit Amazon's S3 (Simple Storage Service) a few hours ago.
Dridex Becomes First Malware Family to Integrate AtomBombing Technique
Bad news from malware-land after security researchers from IBM reported today they'd discovered the first samples of version 4.0 of the infamous and highly-active Dridex banking trojan. [...]
https://www.bleepingcomputer.com/news/security/dridex-becomes-first-malware-family-to-integrate-atombombing-technique/
Bad news from malware-land after security researchers from IBM reported today they'd discovered the first samples of version 4.0 of the infamous and highly-active Dridex banking trojan. [...]
https://www.bleepingcomputer.com/news/security/dridex-becomes-first-malware-family-to-integrate-atombombing-technique/
BleepingComputer
Dridex Becomes First Malware Family to Integrate AtomBombing Technique
Bad news from malware-land after security researchers from IBM reported today they'd discovered the first samples of version 4.0 of the infamous and highly-active Dridex banking trojan.
Border Agents Detain Programmer, Give Him Quiz to Prove He's a Software Engineer
President Trump's heightened security protocols at US borders are at the center of another controversy after border agents have resorted to giving a Nigerian man a quiz on computer science to evaluate if he was a software engineer as he proclaimed. [...]
https://www.bleepingcomputer.com/news/government/border-agents-detain-programmer-give-him-quiz-to-prove-hes-a-software-engineer/
President Trump's heightened security protocols at US borders are at the center of another controversy after border agents have resorted to giving a Nigerian man a quiz on computer science to evaluate if he was a software engineer as he proclaimed. [...]
https://www.bleepingcomputer.com/news/government/border-agents-detain-programmer-give-him-quiz-to-prove-hes-a-software-engineer/
BleepingComputer
Border Agents Detain Programmer, Give Him Quiz to Prove He's a Software Engineer
President Trump's heightened security protocols at US borders are at the center of another controversy after border agents have resorted to giving a Nigerian man a quiz on computer science to evaluate if he was a software engineer as he proclaimed.
Net Neutrality Looks Dead as FCC Chairman Calls It a "Mistake"
Speaking at the Mobile World Congress in Barcelona, Spain, new FCC chairman Ajit Pai has expressed his views on net neutrality once again, calling the 2015 legislation a "mistake." [...]
https://www.bleepingcomputer.com/news/gaming/net-neutrality-looks-dead-as-fcc-chairman-calls-it-a-mistake-/
Speaking at the Mobile World Congress in Barcelona, Spain, new FCC chairman Ajit Pai has expressed his views on net neutrality once again, calling the 2015 legislation a "mistake." [...]
https://www.bleepingcomputer.com/news/gaming/net-neutrality-looks-dead-as-fcc-chairman-calls-it-a-mistake-/
BleepingComputer
Net Neutrality Looks Dead as FCC Chairman Calls It a "Mistake"
Speaking at the Mobile World Congress in Barcelona, Spain, new FCC chairman Ajit Pai has expressed his views on net neutrality once again, calling the 2015 legislation a "mistake."
Sysadmin Says He Was "Authorized" to Damage Employer's Network
Michael Thomas, a systems administrators who was convicted in 2016 for destroying his employer's network before resigning his job, has filed an appeal in which his lawyers are arguing that in reality he actually was authorized to trash the company's IT network, in a criminal case that might change the way judges look at the CFAA. [...]
https://www.bleepingcomputer.com/news/legal/sysadmin-says-he-was-authorized-to-damage-employers-network/
Michael Thomas, a systems administrators who was convicted in 2016 for destroying his employer's network before resigning his job, has filed an appeal in which his lawyers are arguing that in reality he actually was authorized to trash the company's IT network, in a criminal case that might change the way judges look at the CFAA. [...]
https://www.bleepingcomputer.com/news/legal/sysadmin-says-he-was-authorized-to-damage-employers-network/
BleepingComputer
Sysadmin Says He Was "Authorized" to Damage Employer's Network
Michael Thomas, a systems administrators who was convicted in 2016 for destroying his employer's network before resigning his job, has filed an appeal in which his lawyers are arguing that in reality he actually was authorized to trash the company's IT networkβ¦
Windows Insider Build 15046 Introduces Application Installation Control
Microsoft released Insider Preview Build 15046 for PC to insiders in the fast ring, For the most part, this release is a bug fix with cosmetic changes. The most notable new feature, though, is the introduction of Application Installation Control, which allows admins to control what types of applications can be installed in Windows. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15046-introduces-application-installation-control/
Microsoft released Insider Preview Build 15046 for PC to insiders in the fast ring, For the most part, this release is a bug fix with cosmetic changes. The most notable new feature, though, is the introduction of Application Installation Control, which allows admins to control what types of applications can be installed in Windows. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15046-introduces-application-installation-control/
BleepingComputer
Windows Insider Build 15046 Introduces Application Installation Control
Microsoft released Insider Preview Build 15046 for PC to insiders in the fast ring, For the most part, this release is a bug fix with cosmetic changes. The most notable new feature, though, is the introduction of Application Installation Control, which allowsβ¦
Researcher Breaks reCATPCHA Using Google's Speech Recognition API
A researcher has discovered what he calls a "logic vulnerability" that allowed him to create a Python script that is fully capable of bypassing Google's reCAPTCHA fields using another Google service, the Speech Recognition API. [...]
https://www.bleepingcomputer.com/news/security/researcher-breaks-recatpcha-using-googles-speech-recognition-api/
A researcher has discovered what he calls a "logic vulnerability" that allowed him to create a Python script that is fully capable of bypassing Google's reCAPTCHA fields using another Google service, the Speech Recognition API. [...]
https://www.bleepingcomputer.com/news/security/researcher-breaks-recatpcha-using-googles-speech-recognition-api/
BleepingComputer
Researcher Breaks reCATPCHA Using Google's Speech Recognition API
A researcher has discovered what he calls a "logic vulnerability" that allowed him to create a Python script that is fully capable of bypassing Google's reCAPTCHA fields using another Google service, the Speech Recognition API.
Safe Browsing on Mac Will Warn Users of Apps That Modify Chrome Settings
Google said today that starting March 31, 2017, Safe Browsing will show a special message if the user is attempting to download software known to modify Google Chrome settings, or attempting to inject ads in the user's browsing experience. [...]
https://www.bleepingcomputer.com/news/apple/safe-browsing-on-mac-will-warn-users-of-apps-that-modify-chrome-settings/
Google said today that starting March 31, 2017, Safe Browsing will show a special message if the user is attempting to download software known to modify Google Chrome settings, or attempting to inject ads in the user's browsing experience. [...]
https://www.bleepingcomputer.com/news/apple/safe-browsing-on-mac-will-warn-users-of-apps-that-modify-chrome-settings/
BleepingComputer
Safe Browsing on Mac Will Warn Users of Apps That Modify Chrome Settings
Google said today that starting March 31, 2017, Safe Browsing will show a special message if the user is attempting to download software known to modify Google Chrome settings, or attempting to inject ads in the user's browsing experience.