Security researchers found a new DDoS-for-hire service that offers easy and cheap access to sufficient power to knock down most targets. | Continue reading
We have had quite a bit of interesting news this week regarding ransomware. First we had the Kraken Cryptor deciding to connect to BleepingComputer.com during different stages of the encryption process, then we had a decryptor released by Bitdefender for GandCrab v1, v4, and v5, … | Continue reading
Microsoft has released the Windows 10 Insider Preview Build 18267 (19H1) to insiders in both the Fast and Skip Ahead rings. This build contains input and accessibility improvements. It also contains a new feature called "Enhanced Mode" for the Search Indexer. | Continue reading
The Cathay Pacific airline announced today that a system containing passenger data for up to 9.4 million passengers was breached by attackers. | Continue reading
Dropbox has announced that starting on November 7th 2018, only the ext4 filesystem will be supported in Linux for synchronizing folders in the Dropbox desktop app. Those Linux users who have synch on other filesystems such as XFS, ext2, ext3, ZFS, and many others will no longer h … | Continue reading
A mistake in the process used by the Signal Desktop application to encrypt locally stored messages leaves them wide open to an attacker. | Continue reading
Over the weekend, the Kraken Cryptor Ransomware released version 2.0.6, which now connects to BleepingComputer during different stages of their encryption process. It is not known what they are trying to achieve by doing this, but it does provide BleepingComputer with insight int … | Continue reading
FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in smart homes and critical infrastructure systems has 13 vulnerabilities, a third of them allowing remote code execution. | Continue reading
A new bug has popped up in Windows 10 Build 1809 that does not display an overwrite prompt when extracting files from a Zip archive to a location where the same file exists. | Continue reading
In an interview, Miguel Nunes, Qualcomm senior director of product management confirmed that the ARM port of Google Chrome is already in works and it would arrive in the second half of 2019. | Continue reading
An abandoned Tweet counter that was still being loaded by 800+ sites was hijacked with a malicious script that caused visitors to be redirected to scam sites. | Continue reading
FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in smart homes and critical infrastructure systems has 13 vulnerabilities, a third of them allowing remote code execution. | Continue reading
The world's famous media player app Winamp is finally back with some improvements and fixes. The new version 5.8 of Winamp is compatible with Windows 8.1 and Windows 10 but the interface is unchanged. | Continue reading
It has been another slow week, with mostly new variants of existing ransomware being released. The biggest news is that the GandCrab Ransomware developers have decided to release the decryption keys for Syrian victims. | Continue reading
Of the thousands of plugins for the jQuery framework, one of the most popular of them harbored for at least three years an oversight in code that eluded the security community, despite public availability of tutorials that explained how it could be exploited. | Continue reading
A little over a week ago, researcher promised to run a 51% attack on the blockchain of a small cryptocurrency called Einsteinium (EMC2), to show the world how easy the entire process was. | Continue reading
Today, Microsoft is rolling out Windows 10 Build 18262 to the Windows Insiders in the Fast and Skip Ahead rings. This build comes with improvements for Task Manager and Narrator. | Continue reading
A new SEO poisoning campaign has been discovered that is targeting keywords associated with the U.S. midterm elections. Users who are enticed to visit these pages will then be redirected to a variety of scam sites, adult sites, and sites pushing unwanted software. | Continue reading
Sellers have been modifying lower end NVIDIA graphics cards and selling them more powerful cards online. In a recent version of the GPU-Z graphics card information utility, TechPowerUp has added the ability to now detect these fake NVIDIA cards. | Continue reading
PlayStation 4 owners are at risk of having their console freeze on them in the middle of a game due to an issue with parsing symbols in messages received from fellow gamers. | Continue reading
Cryptocurrency miners are now being distributed by a new campaign pretending to be Adobe Flash Player installers. While this is not new, this particular campaign is going the extra mile to appear legitimate by not only installing a miner, but also updating Flash Player as well. | Continue reading
Lot's of reports are coming in that Windows 10 users are finding that their audio is no longer working on their computer after installing the latest Windows updates. Thankfully, there are solutions that can resolve this problem. | Continue reading
Google has accidentally sent out a dogfood build for the November 2018 security patches to a Google Pixel owner. This update was pushed via OTA (over-the-air) and was discovered when the user woke up the next morning. | Continue reading
A brazen phishing campaign took Iceland by surprise the last weekend, sending out malicious emails to thousands of individuals, in an attempt to fool them into installing a new threat that mixes code from different sources.Even if the number of potential victims may seem low, loc … | Continue reading
Windows updates have not been kind to Microsoft these past few weeks. First we had the file deletion bug in the October 2018 Update and now reports are coming in that HP workstations and laptops are receiving blue screen of death (BSOD) crashes that display a WDF_VIOLATION error … | Continue reading
Attorney Generals from 35 states have called on the FCC to put an end to the rising tide of the very annoying robocalls that people are receiving not only on their landlines, but also on their mobile numbers. | Continue reading
A new phishing campaign spotted this September shows increased sophistication from the operators, who take over email accounts and insert a banking trojan in conversation threads. | Continue reading
Major weapon systems developed by the US Department of Defense are riddled with vulnerabilities that make them an easy target for adversaries trying to control them or disrupt their functions. | Continue reading
Google Pixel Slate is the company's Chrome OS-based tablet and it features the stereo speakers, a USB Type-C port but there's no 3.5mm headphone jack. Here's everything you need to know. | Continue reading
In Firefox 65, Mozilla is planning on enabling a feature that will display browser subscription notifications directly in the Windows 10 Action Center. | Continue reading
As part of today's Intel's Fall Desktop Launch event, new 9th generation CPUs were announced that include hardware protection for two of the Spectre and Meltdown vulnerability variants. | Continue reading
Intel has announced that they are live streaming their 2018 Desktop Launch Tomorrow at 10am EST via the Intel Newsroom. The details are vague other than that they are announcing the "latest PC performance developments from Intel." | Continue reading
It has not been a good week for PDF programs. We had an Adobe Acrobat & Reader update released yesterday that fixed 86 vulnerabilities, including numerous critical ones. Not to be beaten, an update for Foxit PDF Reader and Foxit PhantomPDF was released last Friday that fixes a wh … | Continue reading
Telegram Messenger is a communication app that allows you to create encrypted chats and phone calls with other users over the Internet. This program describes itself as being a secure and private communication app, but a researcher has shown that in its default config it would al … | Continue reading
The Internet Crime Complaint Center (IC3), in collaboration with the Department of Homeland Security and the FBI, have issued a security alert regarding attacks being conducted through the Windows Remote Desktop Protocol. This article will provide more information about these att … | Continue reading
Today, Facebook disclosed a security vulnerability that affected 50 million people on the social media network and allowed malicious third parties to potentially access the affected users account. | Continue reading
In Chrome 71, Google is performing an experiment where the browser will show a Google search query in the address bar instead of the Google search results URL. | Continue reading
Back in July, Microsoft announced that it will discontinue the Skype Classic app on September 1st but due to public backlash, the company decided to delay the demise of the app and support it beyond September. | Continue reading
Security researchers tracking the operations of a cyber-espionage group found the first evidence of a rootkit for the Unified Extensible Firmware Interface (UEFI) being used in the wild. | Continue reading
Windows 10 October 2018 Update is likely to land in the first week of October as Microsoft has reportedly completed the development of Windows 10 version 1809. If the findings and reports are believed to be true, Windows 10 Build 17763 is the final version of October 2018 update … | Continue reading
Attacks that compromise websites with scripts that steal payment card data from checkout pages have increased to hundreds of thousands of attempts in little over a month. | Continue reading
There's a new extension in the marketplace that brings dark mode to websites like BleepingComputer, Facebook, Google, Quora and others. Called Night Eye, the extension basically tweaks the contrast within the websites to dark grey. | Continue reading
A security researcher shows on Mojave's release day that Apple's latest privacy protection implementations in macOS are not sufficiently strong. | Continue reading
Cloudflare announces today support for encrypted Server Name Indication, a mechanism that makes it more difficult to track user's browsing. | Continue reading
At the Ignite developer's conference today, Microsoft announces that the Azure cloud platform will soon integrate data protection features that keep information safe from the looming threat of a data breach. | Continue reading
Thousands of WordPress websites have been compromised and injected with JavaScript code that redirects users to tech-support scam pages. | Continue reading
This has been a busy week. We had a brewery hit, an airport's flight and arrival time displays taken out, and Dharma deciding to release three different variants in one week. The NSA CodeBreaker Challenge was also kicked off today and it has a ransomware theme this year. | Continue reading