Google Security Researcher Finds Security Hole in ESET's Mac Antivirus
Mac users utilizing ESET's endpoint antivirus are advised to update to version 6.4.168.0 as soon as possible in order to mitigate a serious issue that allows attackers to execute arbitrary code on their machines. [...]
https://www.bleepingcomputer.com/news/security/google-security-researcher-finds-security-hole-in-esets-mac-antivirus/
Mac users utilizing ESET's endpoint antivirus are advised to update to version 6.4.168.0 as soon as possible in order to mitigate a serious issue that allows attackers to execute arbitrary code on their machines. [...]
https://www.bleepingcomputer.com/news/security/google-security-researcher-finds-security-hole-in-esets-mac-antivirus/
BleepingComputer
Google Security Researcher Finds Security Hole in ESET's Mac Antivirus
Mac users utilizing ESET's endpoint antivirus are advised to update to version 6.4.168.0 as soon as possible in order to mitigate a serious issue that allows attackers to execute arbitrary code on their machines.
Web Cache Deception Attack Tricks Servers Into Caching Pages with Personal Data
Caching servers commonly deployed with big-name services will often cache the incorrect page content, including personal details, when the user accesses a non-existent resource, such as CSS or JavaScript files. [...]
https://www.bleepingcomputer.com/news/security/web-cache-deception-attack-tricks-servers-into-caching-pages-with-personal-data/
Caching servers commonly deployed with big-name services will often cache the incorrect page content, including personal details, when the user accesses a non-existent resource, such as CSS or JavaScript files. [...]
https://www.bleepingcomputer.com/news/security/web-cache-deception-attack-tricks-servers-into-caching-pages-with-personal-data/
BleepingComputer
Web Cache Deception Attack Tricks Servers Into Caching Pages with Personal Data
Caching servers commonly deployed with big-name services will often cache the incorrect page content, including personal details, when the user accesses a non-existent resource, such as CSS or JavaScript files.
AWS Goes Down, and So Do Millions of Websites, Apps, and Other Services
Millions of small websites, app backends, and various high-profile services are offline or experiencing severe issues because of a mysterious problem that hit Amazon's S3 (Simple Storage Service) a few hours ago. [...]
https://www.bleepingcomputer.com/news/hardware/aws-goes-down-and-so-do-millions-of-websites-apps-and-other-services/
Millions of small websites, app backends, and various high-profile services are offline or experiencing severe issues because of a mysterious problem that hit Amazon's S3 (Simple Storage Service) a few hours ago. [...]
https://www.bleepingcomputer.com/news/hardware/aws-goes-down-and-so-do-millions-of-websites-apps-and-other-services/
BleepingComputer
AWS Goes Down, and So Do Millions of Websites, Apps, and Other Services
Millions of small websites, app backends, and various high-profile services are offline or experiencing severe issues because of a mysterious problem that hit Amazon's S3 (Simple Storage Service) a few hours ago.
Dridex Becomes First Malware Family to Integrate AtomBombing Technique
Bad news from malware-land after security researchers from IBM reported today they'd discovered the first samples of version 4.0 of the infamous and highly-active Dridex banking trojan. [...]
https://www.bleepingcomputer.com/news/security/dridex-becomes-first-malware-family-to-integrate-atombombing-technique/
Bad news from malware-land after security researchers from IBM reported today they'd discovered the first samples of version 4.0 of the infamous and highly-active Dridex banking trojan. [...]
https://www.bleepingcomputer.com/news/security/dridex-becomes-first-malware-family-to-integrate-atombombing-technique/
BleepingComputer
Dridex Becomes First Malware Family to Integrate AtomBombing Technique
Bad news from malware-land after security researchers from IBM reported today they'd discovered the first samples of version 4.0 of the infamous and highly-active Dridex banking trojan.
Border Agents Detain Programmer, Give Him Quiz to Prove He's a Software Engineer
President Trump's heightened security protocols at US borders are at the center of another controversy after border agents have resorted to giving a Nigerian man a quiz on computer science to evaluate if he was a software engineer as he proclaimed. [...]
https://www.bleepingcomputer.com/news/government/border-agents-detain-programmer-give-him-quiz-to-prove-hes-a-software-engineer/
President Trump's heightened security protocols at US borders are at the center of another controversy after border agents have resorted to giving a Nigerian man a quiz on computer science to evaluate if he was a software engineer as he proclaimed. [...]
https://www.bleepingcomputer.com/news/government/border-agents-detain-programmer-give-him-quiz-to-prove-hes-a-software-engineer/
BleepingComputer
Border Agents Detain Programmer, Give Him Quiz to Prove He's a Software Engineer
President Trump's heightened security protocols at US borders are at the center of another controversy after border agents have resorted to giving a Nigerian man a quiz on computer science to evaluate if he was a software engineer as he proclaimed.
Net Neutrality Looks Dead as FCC Chairman Calls It a "Mistake"
Speaking at the Mobile World Congress in Barcelona, Spain, new FCC chairman Ajit Pai has expressed his views on net neutrality once again, calling the 2015 legislation a "mistake." [...]
https://www.bleepingcomputer.com/news/gaming/net-neutrality-looks-dead-as-fcc-chairman-calls-it-a-mistake-/
Speaking at the Mobile World Congress in Barcelona, Spain, new FCC chairman Ajit Pai has expressed his views on net neutrality once again, calling the 2015 legislation a "mistake." [...]
https://www.bleepingcomputer.com/news/gaming/net-neutrality-looks-dead-as-fcc-chairman-calls-it-a-mistake-/
BleepingComputer
Net Neutrality Looks Dead as FCC Chairman Calls It a "Mistake"
Speaking at the Mobile World Congress in Barcelona, Spain, new FCC chairman Ajit Pai has expressed his views on net neutrality once again, calling the 2015 legislation a "mistake."
Sysadmin Says He Was "Authorized" to Damage Employer's Network
Michael Thomas, a systems administrators who was convicted in 2016 for destroying his employer's network before resigning his job, has filed an appeal in which his lawyers are arguing that in reality he actually was authorized to trash the company's IT network, in a criminal case that might change the way judges look at the CFAA. [...]
https://www.bleepingcomputer.com/news/legal/sysadmin-says-he-was-authorized-to-damage-employers-network/
Michael Thomas, a systems administrators who was convicted in 2016 for destroying his employer's network before resigning his job, has filed an appeal in which his lawyers are arguing that in reality he actually was authorized to trash the company's IT network, in a criminal case that might change the way judges look at the CFAA. [...]
https://www.bleepingcomputer.com/news/legal/sysadmin-says-he-was-authorized-to-damage-employers-network/
BleepingComputer
Sysadmin Says He Was "Authorized" to Damage Employer's Network
Michael Thomas, a systems administrators who was convicted in 2016 for destroying his employer's network before resigning his job, has filed an appeal in which his lawyers are arguing that in reality he actually was authorized to trash the company's IT networkβ¦
Windows Insider Build 15046 Introduces Application Installation Control
Microsoft released Insider Preview Build 15046 for PC to insiders in the fast ring, For the most part, this release is a bug fix with cosmetic changes. The most notable new feature, though, is the introduction of Application Installation Control, which allows admins to control what types of applications can be installed in Windows. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15046-introduces-application-installation-control/
Microsoft released Insider Preview Build 15046 for PC to insiders in the fast ring, For the most part, this release is a bug fix with cosmetic changes. The most notable new feature, though, is the introduction of Application Installation Control, which allows admins to control what types of applications can be installed in Windows. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15046-introduces-application-installation-control/
BleepingComputer
Windows Insider Build 15046 Introduces Application Installation Control
Microsoft released Insider Preview Build 15046 for PC to insiders in the fast ring, For the most part, this release is a bug fix with cosmetic changes. The most notable new feature, though, is the introduction of Application Installation Control, which allowsβ¦
Researcher Breaks reCATPCHA Using Google's Speech Recognition API
A researcher has discovered what he calls a "logic vulnerability" that allowed him to create a Python script that is fully capable of bypassing Google's reCAPTCHA fields using another Google service, the Speech Recognition API. [...]
https://www.bleepingcomputer.com/news/security/researcher-breaks-recatpcha-using-googles-speech-recognition-api/
A researcher has discovered what he calls a "logic vulnerability" that allowed him to create a Python script that is fully capable of bypassing Google's reCAPTCHA fields using another Google service, the Speech Recognition API. [...]
https://www.bleepingcomputer.com/news/security/researcher-breaks-recatpcha-using-googles-speech-recognition-api/
BleepingComputer
Researcher Breaks reCATPCHA Using Google's Speech Recognition API
A researcher has discovered what he calls a "logic vulnerability" that allowed him to create a Python script that is fully capable of bypassing Google's reCAPTCHA fields using another Google service, the Speech Recognition API.
Safe Browsing on Mac Will Warn Users of Apps That Modify Chrome Settings
Google said today that starting March 31, 2017, Safe Browsing will show a special message if the user is attempting to download software known to modify Google Chrome settings, or attempting to inject ads in the user's browsing experience. [...]
https://www.bleepingcomputer.com/news/apple/safe-browsing-on-mac-will-warn-users-of-apps-that-modify-chrome-settings/
Google said today that starting March 31, 2017, Safe Browsing will show a special message if the user is attempting to download software known to modify Google Chrome settings, or attempting to inject ads in the user's browsing experience. [...]
https://www.bleepingcomputer.com/news/apple/safe-browsing-on-mac-will-warn-users-of-apps-that-modify-chrome-settings/
BleepingComputer
Safe Browsing on Mac Will Warn Users of Apps That Modify Chrome Settings
Google said today that starting March 31, 2017, Safe Browsing will show a special message if the user is attempting to download software known to modify Google Chrome settings, or attempting to inject ads in the user's browsing experience.
Crypt0L0cker Ransomware is Back with Campaigns Targeting Europe
Crypt0L0cker, otherwise known as TorrentLocker, has started to make resurgence as it performs targeted campaigns at European countries. These attacks are also now using Italy's PEC system to digitaly sign SPAM emails in order to make them look more official. [...]
https://www.bleepingcomputer.com/news/security/crypt0l0cker-ransomware-is-back-with-campaigns-targeting-europe/
Crypt0L0cker, otherwise known as TorrentLocker, has started to make resurgence as it performs targeted campaigns at European countries. These attacks are also now using Italy's PEC system to digitaly sign SPAM emails in order to make them look more official. [...]
https://www.bleepingcomputer.com/news/security/crypt0l0cker-ransomware-is-back-with-campaigns-targeting-europe/
BleepingComputer
Crypt0L0cker Ransomware is Back with Campaigns Targeting Europe
Crypt0L0cker, otherwise known as TorrentLocker, has started to make resurgence as it performs targeted campaigns at European countries. These attacks are also now using Italy's PEC system to digitaly sign SPAM emails in order to make them look more official.
Alleged Master Keys for the Dharma Ransomware Released on BleepingComputer.com
Out of the blue, someone posted in the BleepingComputer.com forums the supposed master decryption keys for the Dharma Ransomware. This post was created at 1:42 PM EST by a member named gektar in the Dharma Ransomware Support Topic and contained a Pastebin link to a C header file that supposedly contains these master decryption keys. [...]
https://www.bleepingcomputer.com/news/security/alleged-master-keys-for-the-dharma-ransomware-released-on-bleepingcomputer-com/
Out of the blue, someone posted in the BleepingComputer.com forums the supposed master decryption keys for the Dharma Ransomware. This post was created at 1:42 PM EST by a member named gektar in the Dharma Ransomware Support Topic and contained a Pastebin link to a C header file that supposedly contains these master decryption keys. [...]
https://www.bleepingcomputer.com/news/security/alleged-master-keys-for-the-dharma-ransomware-released-on-bleepingcomputer-com/
BleepingComputer
Alleged Master Keys for the Dharma Ransomware Released on BleepingComputer.com
Out of the blue, someone posted in the BleepingComputer.com forums the supposed master decryption keys for the Dharma Ransomware. This post was created at 1:42 PM EST by a member named gektar in the Dharma Ransomware Support Topic and contained a Pastebinβ¦
132 Google Play Store Apps Infected by Windows Malware
Security researchers have found traces of Windows malware inside 132 Android apps hosted on the official Google Play Store. According to security experts, all 132 apps contained a tiny iframe inside the source code of HTML pages showed at some point or another to their users. [...]
https://www.bleepingcomputer.com/news/security/132-google-play-store-apps-infected-by-windows-malware/
Security researchers have found traces of Windows malware inside 132 Android apps hosted on the official Google Play Store. According to security experts, all 132 apps contained a tiny iframe inside the source code of HTML pages showed at some point or another to their users. [...]
https://www.bleepingcomputer.com/news/security/132-google-play-store-apps-infected-by-windows-malware/
BleepingComputer
132 Google Play Store Apps Infected by Windows Malware
Security researchers have found traces of Windows malware inside 132 Android apps hosted on the official Google Play Store. According to security experts, all 132 apps contained a tiny iframe inside the source code of HTML pages showed at some point or anotherβ¦
Yahoo CEO Gives Annual Bonus to Employees After Company Confirms New Hacks
Yahoo CEO Marissa Mayer announced she'll forgo her annual bonus and equity grant, which she'll be redistributing to Yahoo employees instead. [...]
https://www.bleepingcomputer.com/news/security/yahoo-ceo-gives-annual-bonus-to-employees-after-company-confirms-new-hacks/
Yahoo CEO Marissa Mayer announced she'll forgo her annual bonus and equity grant, which she'll be redistributing to Yahoo employees instead. [...]
https://www.bleepingcomputer.com/news/security/yahoo-ceo-gives-annual-bonus-to-employees-after-company-confirms-new-hacks/
BleepingComputer
Yahoo CEO Gives Annual Bonus to Employees After Company Confirms New Hacks
Yahoo CEO Marissa Mayer announced she'll forgo her annual bonus and equity grant, which she'll be redistributing to Yahoo employees instead.
50 Google Engineers Volunteered to Patch Thousands of Java Open Source Projects
A year ago, several Google engineers got together and lay the foundation of Operation Rosehub, a project during which Google employees used some of their official work time to patch thousands of open source projects against a severe and widespread Java vulnerability. [...]
https://www.bleepingcomputer.com/news/security/50-google-engineers-volunteered-to-patch-thousands-of-java-open-source-projects/
A year ago, several Google engineers got together and lay the foundation of Operation Rosehub, a project during which Google employees used some of their official work time to patch thousands of open source projects against a severe and widespread Java vulnerability. [...]
https://www.bleepingcomputer.com/news/security/50-google-engineers-volunteered-to-patch-thousands-of-java-open-source-projects/
BleepingComputer
50 Google Engineers Volunteered to Patch Thousands of Java Open Source Projects
A year ago, several Google engineers got together and lay the foundation of Operation Rosehub, a project during which Google employees used some of their official work time to patch thousands of open source projects against a severe and widespread Java vulnerability.
Kaspersky Releases Decryptor for the Dharma Ransomware
Kaspersky has tested a set of Dharma master decryption keys posted to BleepingComputer and has confirmed they are legitimate. These keys have been included in their RakhniDecryptor, which I have tested against a Dharma infection. The decryptor worked flawlessly! [...]
https://www.bleepingcomputer.com/news/security/kaspersky-releases-decryptor-for-the-dharma-ransomware/
Kaspersky has tested a set of Dharma master decryption keys posted to BleepingComputer and has confirmed they are legitimate. These keys have been included in their RakhniDecryptor, which I have tested against a Dharma infection. The decryptor worked flawlessly! [...]
https://www.bleepingcomputer.com/news/security/kaspersky-releases-decryptor-for-the-dharma-ransomware/
BleepingComputer
Kaspersky Releases Decryptor for the Dharma Ransomware
Kaspersky has tested a set of Dharma master decryption keys posted to BleepingComputer and has confirmed they are legitimate. These keys have been included in their RakhniDecryptor, which I have tested against a Dharma infection. The decryptor worked flawlessly!
Cerber Ransom Note Found in Two Android Apps on Google Play Store
Ransom notes from Cerber ransomware infections have been found inside the source code of two Android applications available on the official Google Play Store. [...]
https://www.bleepingcomputer.com/news/security/cerber-ransom-note-found-in-two-android-apps-on-google-play-store/
Ransom notes from Cerber ransomware infections have been found inside the source code of two Android applications available on the official Google Play Store. [...]
https://www.bleepingcomputer.com/news/security/cerber-ransom-note-found-in-two-android-apps-on-google-play-store/
BleepingComputer
Cerber Ransom Note Found in Two Android Apps on Google Play Store
Ransom notes from Cerber ransomware infections have been found inside the source code of two Android applications available on the official Google Play Store.
Hidden Backdoor Found in Chinese-Made Equipment. Nothing New! Move Along!
Security researchers have discovered a hidden backdoor in the firmware of DblTek GoIP GSM gateways that allows Telnet access to affected devices. [...]
https://www.bleepingcomputer.com/news/security/hidden-backdoor-found-in-chinese-made-equipment-nothing-new-move-along/
Security researchers have discovered a hidden backdoor in the firmware of DblTek GoIP GSM gateways that allows Telnet access to affected devices. [...]
https://www.bleepingcomputer.com/news/security/hidden-backdoor-found-in-chinese-made-equipment-nothing-new-move-along/
BleepingComputer
Hidden Backdoor Found in Chinese-Made Equipment. Nothing New! Move Along!
Security researchers have discovered a hidden backdoor in the firmware of DblTek GoIP GSM gateways that allows Telnet access to affected devices.
HackerOne Offers Free Bug Bounty Programs for Open Source Projects
HackerOne, a platform that is offering hosting for bug bounty programs, announced today that open-source projects can now sign up for a free bug bounty program if they meet a few simple conditions. [...]
https://www.bleepingcomputer.com/news/security/hackerone-offers-free-bug-bounty-programs-for-open-source-projects/
HackerOne, a platform that is offering hosting for bug bounty programs, announced today that open-source projects can now sign up for a free bug bounty program if they meet a few simple conditions. [...]
https://www.bleepingcomputer.com/news/security/hackerone-offers-free-bug-bounty-programs-for-open-source-projects/
BleepingComputer
HackerOne Offers Free Bug Bounty Programs for Open Source Projects
HackerOne, a platform that is offering hosting for bug bounty programs, announced today that open-source projects can now sign up for a free bug bounty program if they meet a few simple conditions.
Command Input Typo Caused Massive AWS S3 Outage
In a postmortem status report, Amazon blamed a command input typo for the massive AWS S3 outage that took out a large chunk of the Internet three days ago. [...]
https://www.bleepingcomputer.com/news/hardware/command-input-typo-caused-massive-aws-s3-outage/
In a postmortem status report, Amazon blamed a command input typo for the massive AWS S3 outage that took out a large chunk of the Internet three days ago. [...]
https://www.bleepingcomputer.com/news/hardware/command-input-typo-caused-massive-aws-s3-outage/
BleepingComputer
Command Input Typo Caused Massive AWS S3 Outage
In a postmortem status report, Amazon blamed a command input typo for the massive AWS S3 outage that took out a large chunk of the Internet three days ago.