Bushido-Powered DDoS Service Whipped Up from Leaked Code

Security researchers found a new DDoS-for-hire service that offers easy and cheap access to sufficient power to knock down most targets. | Continue reading


@bleepingcomputer.com | 6 years ago

The Week in Ransomware – October 26th 2018 – Decryptors, RaaS, and More

We have had quite a bit of interesting news this week regarding ransomware. First we had the Kraken Cryptor deciding to connect to BleepingComputer.com during different stages of the encryption process, then we had a decryptor released by Bitdefender for GandCrab v1, v4, and v5, … | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Build 18267 Released with a New Enhanced Mode for Search Indexer

Microsoft has released the Windows 10 Insider Preview Build 18267 (19H1) to insiders in both the Fast and Skip Ahead rings. This build contains input and accessibility improvements. It also contains a new feature called "Enhanced Mode" for the Search Indexer. | Continue reading


@bleepingcomputer.com | 6 years ago

Cathay Pacific Suffers Data Breach Impacting 9.4M Passengers

The Cathay Pacific airline announced today that a system containing passenger data for up to 9.4 million passengers was breached by attackers. | Continue reading


@bleepingcomputer.com | 6 years ago

Dropbox Will Only Support the Ext4 File System in Linux in November

Dropbox has announced that starting on November 7th 2018, only the ext4 filesystem will be supported in Linux for synchronizing folders in the Dropbox desktop app. Those Linux users who have synch on other filesystems such as XFS, ext2, ext3, ZFS, and many others will no longer h … | Continue reading


@bleepingcomputer.com | 6 years ago

Signal Desktop Leaves Message Decryption Key in Plain Sight

A mistake in the process used by the Signal Desktop application to encrypt locally stored messages leaves them wide open to an attacker. | Continue reading


@bleepingcomputer.com | 6 years ago

Kraken Cryptor Ransomware Connecting to BleepingComputer During Encryption

Over the weekend, the Kraken Cryptor Ransomware released version 2.0.6, which now connects to BleepingComputer during different stages of their encryption process. It is not known what they are trying to achieve by doing this, but it does provide BleepingComputer with insight int … | Continue reading


@bleepingcomputer.com | 6 years ago

Remote Code Execution Flaws Found in FreeRTOS – Popular OS for Embedded Systems

FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in smart homes and critical infrastructure systems has 13 vulnerabilities, a third of them allowing remote code execution. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 1809 Zip Extraction Bug Overwrites Files Without Confirmation

A new bug has popped up in Windows 10 Build 1809 that does not display an overwrite prompt when extracting files from a Zip archive to a location where the same file exists. | Continue reading


@bleepingcomputer.com | 6 years ago

Google Chrome Is Reportedly Coming to Windows on ARM PCs

In an interview, Miguel Nunes, Qualcomm senior director of product management confirmed that the ARM port of Google Chrome is already in works and it would arrive in the second half of 2019. | Continue reading


@bleepingcomputer.com | 6 years ago

Abandoned S3 Bucket Allows Malicious Script to Run on 800 Sites

An abandoned Tweet counter that was still being loaded by 800+ sites was hijacked with a malicious script that caused visitors to be redirected to scam sites. | Continue reading


@bleepingcomputer.com | 6 years ago

Remote Code Execution Flaws Found in Popular OS Powering Embedded Systems

FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in smart homes and critical infrastructure systems has 13 vulnerabilities, a third of them allowing remote code execution. | Continue reading


@bleepingcomputer.com | 6 years ago

Winamp 5.8 Media Player Released in All Its Nostalgic Glory

The world's famous media player app Winamp is finally back with some improvements and fixes. The new version 5.8 of Winamp is compatible with Windows 8.1 and Windows 10 but the interface is unchanged. | Continue reading


@bleepingcomputer.com | 6 years ago

The Week in Ransomware – October 19th 2018 – GandCrab, Birbware, and More

It has been another slow week, with mostly new variants of existing ransomware being released. The biggest news is that the GandCrab Ransomware developers have decided to release the decryption keys for Syrian victims. | Continue reading


@bleepingcomputer.com | 6 years ago

JQuery File Upload Plugin Vulnerable for 8 Years and Only Hackers Knew

Of the thousands of plugins for the jQuery framework, one of the most popular of them harbored for at least three years an oversight in code that eluded the security community, despite public availability of tutorials that explained how it could be exploited. | Continue reading


@bleepingcomputer.com | 6 years ago

Researcher Livestreams 51% Attack on Altcoin Blockchain

A little over a week ago, researcher promised to run a 51% attack on the blockchain of a small cryptocurrency called Einsteinium (EMC2), to show the world how easy the entire process was. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Build 18262 Released to Insiders with Task Manager Improvements

Today, Microsoft is rolling out Windows 10 Build 18262 to the Windows Insiders in the Fast and Skip Ahead rings. This build comes with improvements for Task Manager and Narrator. | Continue reading


@bleepingcomputer.com | 6 years ago

SEO Poisoning Campaign Targeting U.S. Midterm Election Keywords

A new SEO poisoning campaign has been discovered that is targeting keywords associated with the U.S. midterm elections. Users who are enticed to visit these pages will then be redirected to a variety of scam sites, adult sites, and sites pushing unwanted software. | Continue reading


@bleepingcomputer.com | 6 years ago

GPU-Z Can Now Detect Fake Nvidia Graphics Cards

Sellers have been modifying lower end NVIDIA graphics cards and selling them more powerful cards online. In a recent version of the GPU-Z graphics card information utility, TechPowerUp has added the ability to now detect these fake NVIDIA cards.  | Continue reading


@bleepingcomputer.com | 6 years ago

Sony Playstation 4 Crashes from Messages with Symbols, Fix the Problem

PlayStation 4 owners are at risk of having their console freeze on them in the middle of a game due to an issue with parsing symbols in messages received from fellow gamers. | Continue reading


@bleepingcomputer.com | 6 years ago

CoinMiners Use New Tricks to Impersonate Adobe Flash Installers

Cryptocurrency miners are now being distributed by a new campaign pretending to be Adobe Flash Player installers. While this is not new, this particular campaign is going the extra mile to appear legitimate by not only installing a miner, but also updating Flash Player as well. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Audio Not Working After Installing Latest Windows Updates

Lot's of reports are coming in that Windows 10 users are finding that their audio is no longer working on their computer after installing the latest Windows updates. Thankfully, there are solutions that can resolve this problem. | Continue reading


@bleepingcomputer.com | 6 years ago

Google Accidentally Pushed Internal November 2018 Security Update to Pixel User

Google has accidentally sent out a dogfood build for the November 2018 security patches to a Google Pixel owner. This update was pushed via OTA (over-the-air) and was discovered when the user woke up the next morning. | Continue reading


@bleepingcomputer.com | 6 years ago

Largest Cyber Attack Against Iceland Driven by Fareit-Remcos Combo

A brazen phishing campaign took Iceland by surprise the last weekend, sending out malicious emails to thousands of individuals, in an attempt to fool them into installing a new threat that mixes code from different sources.Even if the number of potential victims may seem low, loc … | Continue reading


@bleepingcomputer.com | 6 years ago

HP PCs Getting WDF_VIOLATION BSOD After Installing Windows 10 Updates

Windows updates have not been kind to Microsoft these past few weeks. First we had the file deletion bug in the October 2018 Update and now reports are coming in that HP workstations and laptops are receiving blue screen of death (BSOD) crashes that display a WDF_VIOLATION error … | Continue reading


@bleepingcomputer.com | 6 years ago

Attorney Generals from 35 States Call on FCC to Stop Illegal Robocalls

Attorney Generals from 35 states have called on the FCC to put an end to the rising tide of the very annoying robocalls that people are receiving not only on their landlines, but also on their mobile numbers. | Continue reading


@bleepingcomputer.com | 6 years ago

New Phishing Campaign Drops Ursnif into Conversation Threads

A new phishing campaign spotted this September shows increased sophistication from the operators, who take over email accounts and insert a banking trojan in conversation threads. | Continue reading


@bleepingcomputer.com | 6 years ago

US Advanced Weaponry Is Easy to Hack, Even by Low-Skilled Attackers

Major weapon systems developed by the US Department of Defense are riddled with vulnerabilities that make them an easy target for adversaries trying to control them or disrupt their functions. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft October 2018 Patch Tuesday Fixes 12 Critical Vulnerabilities

Continue reading


@bleepingcomputer.com | 6 years ago

Google Pixel Slate with Chrome OS Unveiled

Google Pixel Slate is the company's Chrome OS-based tablet and it features the stereo speakers, a USB Type-C port but there's no 3.5mm headphone jack. Here's everything you need to know. | Continue reading


@bleepingcomputer.com | 6 years ago

Firefox Will Show Browser Notifications in the Windows 10 Action Center

In Firefox 65, Mozilla is planning on enabling a feature that will display browser subscription notifications directly in the Windows 10 Action Center. | Continue reading


@bleepingcomputer.com | 6 years ago

Spectre and Meltdown Hardware Protection Added to Intel's 9th Gen CPUs

As part of today's Intel's Fall Desktop Launch event, new 9th generation CPUs were announced that include hardware protection for two of the Spectre and Meltdown vulnerability variants. | Continue reading


@bleepingcomputer.com | 6 years ago

Intel 2018 Desktop Launch Tomorrow, 9th Gen CPUs Expected

Intel has announced that they are live streaming their 2018 Desktop Launch Tomorrow at 10am EST via the Intel Newsroom.  The details are vague other than that they are announcing the "latest PC performance developments from Intel." | Continue reading


@bleepingcomputer.com | 6 years ago

Security Update for Foxit PDF Reader Fixes 118 Vulnerabilities

It has not been a good week for PDF programs. We had an Adobe Acrobat & Reader update released yesterday that fixed 86 vulnerabilities, including numerous critical ones. Not to be beaten, an update for Foxit PDF Reader and Foxit PhantomPDF was released last Friday that fixes a wh … | Continue reading


@bleepingcomputer.com | 6 years ago

Telegram Leaks IP Addresses by Default When Initiating Calls

Telegram Messenger is a communication app that allows you to create encrypted chats and phone calls with other users over the Internet. This program describes itself as being a secure and private communication app, but a researcher has shown that in its default config it would al … | Continue reading


@bleepingcomputer.com | 6 years ago

IC3 Issues Alert Regarding Remote Desktop Protocol (RDP) Attacks

The Internet Crime Complaint Center (IC3), in collaboration with the Department of Homeland Security and the FBI, have issued a security alert regarding attacks being conducted through the Windows Remote Desktop Protocol. This article will provide more information about these att … | Continue reading


@bleepingcomputer.com | 6 years ago

Facebook Vulnerability Affecting 50M Users Allowed Account Takeover

Today, Facebook disclosed a security vulnerability that affected 50 million people on the social media network and allowed malicious third parties to potentially access the affected users account. | Continue reading


@bleepingcomputer.com | 6 years ago

Google Experiments with Showing Search Queries in Chrome 71 Address Bar

In Chrome 71, Google is performing an experiment where the browser will show a Google search query in the address bar instead of the Google search results URL. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Is Ending Support for Skype Classic on November First

Back in July, Microsoft announced that it will discontinue the Skype Classic app on September 1st but due to public backlash, the company decided to delay the demise of the app and support it beyond September. | Continue reading


@bleepingcomputer.com | 6 years ago

APT28 Uses LoJax, First UEFI Rootkit Seen in the Wild

Security researchers tracking the operations of a cyber-espionage group found the first evidence of a rootkit for the Unified Extensible Firmware Interface (UEFI) being used in the wild. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 October 2018 Update Is RTM: Clues Leads to Final Build 17763

Windows 10 October 2018 Update is likely to land in the first week of October as Microsoft has reportedly completed the development of Windows 10 version 1809. If the findings and reports are believed to be true, Windows 10 Build 17763 is the final version of October 2018 update … | Continue reading


@bleepingcomputer.com | 6 years ago

Magecart Attacks Grow Rampant in September

Attacks that compromise websites with scripts that steal payment card data from checkout pages have increased to hundreds of thousands of attempts in little over a month. | Continue reading


@bleepingcomputer.com | 6 years ago

Night Eye Extension Adds a Dark Mode to Websites

There's a new extension in the marketplace that brings dark mode to websites like BleepingComputer, Facebook, Google, Quora and others. Called Night Eye, the extension basically tweaks the contrast within the websites to dark grey. | Continue reading


@bleepingcomputer.com | 6 years ago

MacOS Mojave Privacy Bypass Flaw Allows Access to Protected Files

A security researcher shows on Mojave's release day that Apple's latest privacy protection implementations in macOS are not sufficiently strong. | Continue reading


@bleepingcomputer.com | 6 years ago

Cloudflare Improves Privacy by Encrypting the SNI During TLS Negotiation

Cloudflare announces today support for encrypted Server Name Indication, a mechanism that makes it more difficult to track user's browsing. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Rolls Out Confidential Computing for Azure

At the Ignite developer's conference today, Microsoft announces that the Azure cloud platform will soon integrate data protection features that keep information safe from the looming threat of a data breach. | Continue reading


@bleepingcomputer.com | 6 years ago

Thousands of Compromised WordPress Sites Redirect to Tech Support Scams

Thousands of WordPress websites have been compromised and injected with JavaScript code that redirects users to tech-support scam pages. | Continue reading


@bleepingcomputer.com | 6 years ago

The Week in Ransomware – September 21st 2018 – Beer, Airports, & Dharma

This has been a busy week. We had a brewery hit, an airport's flight and arrival time displays taken out, and Dharma deciding to release three different variants in one week. The NSA CodeBreaker Challenge was also kicked off today and it has a ransomware theme this year. | Continue reading


@bleepingcomputer.com | 6 years ago