A new ransomware strain named Ryuk is making the rounds, and, according to current reports, the group behind it has already made over $640,000 worth of Bitcoin. | Continue reading
Microsoft revealed last night that it successfully disrupted a hacking campaign associated with the Russian military intelligence service GRU. | Continue reading
Support for end-to-end encrypted chats has landed in the stable versions of Skype for Windows, macOS, Linux, Android, and iOS. | Continue reading
Several security experts have built a malicious version of a USB charging cable, one that can compromise a computer in just a few seconds. Once plugged in, it turns into a peripheral device capable of typing and launching commands. | Continue reading
Security researchers have discovered a new exploitation technique that they say can bypass the kernel protection measures present in the Windows operating systems. | Continue reading
Twitch is warning users of a bug in one of its recently retired features that may have exposed some of their messages to other users. | Continue reading
For Windows Insiders in the Skip Ahead ring, Microsoft has renamed their Windows 10 Screen Sketch app to Snip & Sketch. This new build is not available to users running Windows 10 April 2018 Update or the latest Windows 10 Preview build 17741. | Continue reading
The number of tracking cookies on EU news sites has gone down by 22% according to a report by the Reuters Institute at the University of Oxford, who looked at cookie usage across EU news sites in two phases, in April 2018 and July 2018, pre and post the introduction of the new EU … | Continue reading
HackNotice is a service that is designed to alert you when your information has been disclosed in leaked data breaches from hacked sites. HackNotice does this by collecting leaked information from data breaches and compiling it into a database that can be used to determine if yo … | Continue reading
A vulnerability in the VBScript engine has been used by hackers working for North Korea to compromise systems targeted by the Darkhotel operation. | Continue reading
The Chinese government may use a collection of 300 so-called "national cybersecurity standards" to deter or sabotage the efforts of foreign tech firms trying to enter the Chinese market. | Continue reading
Social engineering is the use of deception to manipulate individuals into disclosing sensitive information that may be used to compromise a network, infiltrate an organization, gain access to trade secrets, or in furtherance of an espionage operation. In this article we look at w … | Continue reading
Mozilla removed today 23 Firefox add-ons that snooped on users and sent data to remote servers, a Mozilla engineer has told Bleeping Computer today. | Continue reading
A trio of academics from the University of Florida has developed a device that can detect different types of payment card skimmers —devices developed by cyber-criminals to collect data from credit and debit cards inserted inside ATMs or gas pump card readers. | Continue reading
Security researchers from Proofpoint have discovered a new malware strain that they named Marap and which is currently distributed via massive waves of spam emails carrying malicious attachments (malspam). | Continue reading
Maintainers behind the Linux kernel have rolled out patches in the past weeks for two bugs that are just ideal for causing havoc via DDoS attacks. | Continue reading
Security and user privacy protections included in browsers, ad blockers, and anti-tracking extensions are not as secure as everyone believes, a team of three academics from the Catholic University in Leuven, Belgium (KU Leuven) have revealed yesterday. | Continue reading
Google has patched a vulnerability in the Chrome browser that allows an attacker to retrieve sensitive information from other sites via audio or video HTML tags. | Continue reading
Microsoft Edge Beta for iOS is getting a big update with a bunch of new features. These changes include the new breaking news alerts, the ability to reorganize the favorites folder, and much more. | Continue reading
Representatives of Cosmos Bank, India's second-largest cooperative bank, revealed this week that hackers breached the bank's servers over the weekend and stole over 940 million rupees ($13.5 million) across three days. | Continue reading
A popular Firefox add-on is secretly logging users' browsing history, according to reports from the author of the uBlock Origin ad blocker and Mike Kuketz, a German privacy and security blogger. | Continue reading
Security researchers have shown that having Microsoft Cortana enabled on the Windows lock screen could be a security risk. In such a configuration, users could compromise a system or lead to or impersonate a user using credentials stored in the browser cache. | Continue reading
A new attack named VORACLE can recover HTTP traffic sent via encrypted VPN connections under certain conditions. | Continue reading
For all of you emoji lovers out there, Google is adding a context menu to Chrome that allows you to open a emoji panel that can be used to insert emojis into any editable input field. | Continue reading
Hackers can falsify patients' vitals by emulating data sent from medical equipment clients to central monitoring systems, a McAfee security researcher revealed over the weekend at the DEF CON 26 security conference. | Continue reading
As Bleeping Computer first reported back in January this year, Google has started rolling out support for built-in lazy loading inside Chrome. | Continue reading
A new job posting on LinkedIn has given us a closer look at Windows Core development plans. The job post for a Software Engineering Manager was posted almost 11 days ago and it's all about Windows Core OS. | Continue reading
Microsoft has just started rolling out the new search experience in the Windows 10 App Store on Insider Builds and it comes with a new search category called "Memberships". The new category centralizes all available memberships and offers a way for users to quickly find them and … | Continue reading
Cisco, one of the world's largest vendor of networking equipment, released security updates today to patch a vulnerability in the IOS and IOS XE operating systems that run the vast majority of its devices. | Continue reading
Two recently discovered vulnerabilities in the fax protocol can transform fax machines into entry points for hackers into corporate networks, two Check Point researchers revealed last week in a talk given at the DEF CON 26 security conference held in Las Vegas. | Continue reading
Today, a report has revealed that Google wants to bring Microsoft's Windows 10 support to Chromebooks. Reports indicate that the company is working on a new project called "Campfire" that would allow Chromebook owners to dual boot Windows 10 and Crome OS. | Continue reading
Some of the most popular Android applications installed on your phone may be vulnerable to a new type of attack named "Man-in-the-Disk" that can grant a third-party app the ability to crash them and/or run malicious code. | Continue reading
At the DEF CON 26 security conference held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc. | Continue reading
Last week, at the DEF CON security conference held in Las Vegas, security researchers presented details about 47 vulnerabilities in the firmware and default apps of 25 Android smartphone models, 11 of which are also sold in the US. | Continue reading
Attackers are targeting DLink DSL modem routers in Brazil and exploiting them to change the DNS settings to a DNS server under the attacker's control. This then allows them to redirect users attempting to connect to their online banks to fake banking websites that steal the user' … | Continue reading
This was a pretty quiet week with mostly small variants, one new active release, and a large organization getting hit. This article outlines what new ransomware has been released and other ransomware related stories. | Continue reading
Microsoft has released another Windows 10 "19H1" build, as the company has started to work on the next major feature update for its operating system. It comes with the same changes as the latest build for Windows 10 Redstone 5 (also known as Windows 10 October 2018 Update). | Continue reading
A recent Windows 10 Insider Feedback Hub quest revealed that Microsoft is developing a new throwaway sandboxed desktop feature called "InPrivate Desktop". This feature will allow administrators to run untrusted executables in a secure sandbox without fear that it can make any cha … | Continue reading
Kaspersky has fixed a bug in their Kaspersky VPN app for Android that leaked the computer's configured DNS server while using a VPN connection. | Continue reading
According to reports, computers at the PGA have been infected with ransomware. The victims learned they were infected on Tuesday when ransom notes started appearing on their screen. | Continue reading
Google Chrome has been supporting push notifications for years now but it always used its own notification system in Windows 10. The search engine giant is now rolling out a new update for Chrome which adds support for native Windows 10 notifications. | Continue reading
A recent Windows 10 Insider Feedback Hub quest revealed that Microsoft is developing a new throwaway sandboxed desktop feature called "InPrivate Desktop". This feature will allow administrators to run untrusted executables in a secure sandbox without fear that it can make any cha … | Continue reading
Let's Encrypt announced yesterday that they are now directly trusted by all major root certificate programs including those from Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry. With this announcement, Let's Encrypt is now directly trusted by all major browsers and ope … | Continue reading
Launched back in 2017, WhatsApp Desktop is a Windows 10 app that acts as a wrapper for the WhatsApp web version and it can be downloaded from the Microsoft Store. Facebook-owned WhatsApp has just rolled a new update that aims to stop the spread of fake news by restricting the amo … | Continue reading
Let's Encrypt announced yesterday that they are now directly trusted by all major root certificates including those from Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry. With this announcement, Let's Encrypt is now directly trusted by all major browsers and operating s … | Continue reading
A MongoDB database was exposed online that contained health care information for 2 million patients in Mexico. This data included information such as the person's full name, gender, date of birth, insurance information, disability status, and home address. | Continue reading
A new technique has been discovered to easily retrieve the Pairwise Master Key Identifier (PMK) from a router using WPA/WPA2 security, which can then be used to crack the wireless password of the router. While previous WPA/WPA2 cracking methods required an attacker to wait for a … | Continue reading
The hacktivist collective known for operations such as Project Chanology, the Westboro Baptist Church hack, OpISIS, anti-pedophile ops and Occupy Wallstreet announced, over the weekend, a declaration of war on QAnon. | Continue reading