Ryuk Ransomware Crew Makes $640,000 in Recent Activity Surge

A new ransomware strain named Ryuk is making the rounds, and, according to current reports, the group behind it has already made over $640,000 worth of Bitcoin. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Disrupts APT28 Hacking Campaign Aimed at US Midterm Elections

Microsoft revealed last night that it successfully disrupted a hacking campaign associated with the Russian military intelligence service GRU. | Continue reading


@bleepingcomputer.com | 6 years ago

Skype's End-To-End Encryption Goes Live

Support for end-to-end encrypted chats has landed in the stable versions of Skype for Windows, macOS, Linux, Android, and iOS. | Continue reading


@bleepingcomputer.com | 6 years ago

USBHarpoon Is a BadUSB Attack with a Twist

Several security experts have built a malicious version of a USB charging cable, one that can compromise a computer in just a few seconds. Once plugged in, it turns into a peripheral device capable of typing and launching commands. | Continue reading


@bleepingcomputer.com | 6 years ago

New “Turning Tables” Technique Bypasses All Windows Kernel Mitigations

Security researchers have discovered a new exploitation technique that they say can bypass the kernel protection measures present in the Windows operating systems. | Continue reading


@bleepingcomputer.com | 6 years ago

Twitch Glitch Exposed Some Users' Private Messages

Twitch is warning users of a bug in one of its recently retired features that may have exposed some of their messages to other users. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Screen Sketch App Renamed to Snip & Sketch in Insider Builds

For Windows Insiders in the Skip Ahead ring, Microsoft has renamed their Windows 10 Screen Sketch app to Snip & Sketch.  This new build is not available to users running Windows 10 April 2018 Update or the latest Windows 10 Preview build 17741. | Continue reading


@bleepingcomputer.com | 6 years ago

Number of Third-Party Cookies on EU News Sites Dropped by 22% Post-GDPR

The number of tracking cookies on EU news sites has gone down by 22% according to a report by the Reuters Institute at the University of Oxford, who looked at cookie usage across EU news sites in two phases, in April 2018 and July 2018, pre and post the introduction of the new EU … | Continue reading


@bleepingcomputer.com | 6 years ago

HackNotice Alerts You When a Site Is Hacked or Your Info Is Leaked

HackNotice is a service that is designed to alert you when your information has been disclosed in leaked data breaches from hacked sites. HackNotice does this by collecting leaked information from data breaches and compiling it into a database that can be used to determine if yo … | Continue reading


@bleepingcomputer.com | 6 years ago

Zero-Day in Microsoft's VBScript Engine Used by Darkhotel APT

A vulnerability in the VBScript engine has been used by hackers working for North Korea to compromise systems targeted by the Darkhotel operation. | Continue reading


@bleepingcomputer.com | 6 years ago

China's National Cybersecurity Standards Considered a Risk for Foreign Firms

The Chinese government may use a collection of 300 so-called "national cybersecurity standards" to deter or sabotage the efforts of foreign tech firms trying to enter the Chinese market. | Continue reading


@bleepingcomputer.com | 6 years ago

Combating Social Engineering: Tips from Black Hat 2018

Social engineering is the use of deception to manipulate individuals into disclosing sensitive information that may be used to compromise a network, infiltrate an organization, gain access to trade secrets, or in furtherance of an espionage operation. In this article we look at w … | Continue reading


@bleepingcomputer.com | 6 years ago

Mozilla Removes 23 Firefox Add-Ons That Snooped on Users

Mozilla removed today 23 Firefox add-ons that snooped on users and sent data to remote servers, a Mozilla engineer has told Bleeping Computer today. | Continue reading


@bleepingcomputer.com | 6 years ago

Skim Reaper Device Detects Wide Range of Skimmer Devices

A trio of academics from the University of Florida has developed a device that can detect different types of payment card skimmers —devices developed by cyber-criminals to collect data from credit and debit cards inserted inside ATMs or gas pump card readers. | Continue reading


@bleepingcomputer.com | 6 years ago

Necurs Botnet Pushing New Marap Malware

Security researchers from Proofpoint have discovered a new malware strain that they named Marap and which is currently distributed via massive waves of spam emails carrying malicious attachments (malspam). | Continue reading


@bleepingcomputer.com | 6 years ago

Two DDoS Friendly Bugs Fixed in Linux Kernel

Maintainers behind the Linux kernel have rolled out patches in the past weeks for two bugs that are just ideal for causing havoc via DDoS attacks. | Continue reading


@bleepingcomputer.com | 6 years ago

Academics Discover New Bypasses for Browser Tracking Protections and Ad Blockers

Security and user privacy protections included in browsers, ad blockers, and anti-tracking extensions are not as secure as everyone believes, a team of three academics from the Catholic University in Leuven, Belgium (KU Leuven) have revealed yesterday. | Continue reading


@bleepingcomputer.com | 6 years ago

Chrome Bug Lets Attackers Steal Web Secrets via Audio or Video HTML Tags

Google has patched a vulnerability in the Chrome browser that allows an attacker to retrieve sensitive information from other sites via audio or video HTML tags. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Edge Beta on iOS Updated with Breaking News and More

Microsoft Edge Beta for iOS is getting a big update with a bunch of new features. These changes include the new breaking news alerts, the ability to reorganize the favorites folder, and much more. | Continue reading


@bleepingcomputer.com | 6 years ago

Hackers Steal $13.5M Across Three Days from Indian Bank

Representatives of Cosmos Bank, India's second-largest cooperative bank, revealed this week that hackers breached the bank's servers over the weekend and stole over 940 million rupees ($13.5 million) across three days. | Continue reading


@bleepingcomputer.com | 6 years ago

Firefox Add-On with 220,000+ Installs Caught Collecting Users’ Browsing History

A popular Firefox add-on is secretly logging users' browsing history, according to reports from the author of the uBlock Origin ad blocker and Mike Kuketz, a German privacy and security blogger. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Cortana Flaw Could Allow Browsing on Locked Systems

Security researchers have shown that having Microsoft Cortana enabled on the Windows lock screen could be a security risk. In such a configuration, users could compromise a system or lead to or impersonate a user using credentials stored in the browser cache. | Continue reading


@bleepingcomputer.com | 6 years ago

VORACLE Attack Can Recover HTTP Data from VPN Connections

A new attack named VORACLE can recover HTTP traffic sent via encrypted VPN connections under certain conditions. | Continue reading


@bleepingcomputer.com | 6 years ago

Google Chrome Gets Insertable Emojis. How to Enable It

For all of you emoji lovers out there, Google is adding a context menu to Chrome that allows you to open a emoji panel that can be used to insert emojis into any editable input field. | Continue reading


@bleepingcomputer.com | 6 years ago

Hackers Can Falsify Patient Vitals

Hackers can falsify patients' vitals by emulating data sent from medical equipment clients to central monitoring systems, a McAfee security researcher revealed over the weekend at the DEF CON 26 security conference. | Continue reading


@bleepingcomputer.com | 6 years ago

Built-In Lazy Loading Lands in Google Chrome Canary

As Bleeping Computer first reported back in January this year, Google has started rolling out support for built-in lazy loading inside Chrome. | Continue reading


@bleepingcomputer.com | 6 years ago

Linkedin Job Post Confirms Windows Core OS Is All About Devices

A new job posting on LinkedIn has given us a closer look at Windows Core development plans. The job post for a Software Engineering Manager was posted almost 11 days ago and it's all about Windows Core OS. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Testing “Memberships” Subscription Section in Windows 10 Store App

Microsoft has just started rolling out the new search experience in the Windows 10 App Store on Insider Builds and it comes with a new search category called "Memberships". The new category centralizes all available memberships and offers a way for users to quickly find them and … | Continue reading


@bleepingcomputer.com | 6 years ago

Cisco Patches Its Operating Systems Against New IKE Crypto Attack

Cisco, one of the world's largest vendor of networking equipment, released security updates today to patch a vulnerability in the IOS and IOS XE operating systems that run the vast majority of its devices. | Continue reading


@bleepingcomputer.com | 6 years ago

Vulnerabilities in Fax Protocol Let Hackers Infiltrate Networks via Fax Machines

Two recently discovered vulnerabilities in the fax protocol can transform fax machines into entry points for hackers into corporate networks, two Check Point researchers revealed last week in a talk given at the DEF CON 26 security conference held in Las Vegas. | Continue reading


@bleepingcomputer.com | 6 years ago

Chromebooks May Soon Dual Boot Between Chrome OS and Windows 10

Today, a report has revealed that Google wants to bring Microsoft's Windows 10 support to Chromebooks. Reports indicate that the company is working on a new project called "Campfire" that would allow Chromebook owners to dual boot Windows 10 and Crome OS. | Continue reading


@bleepingcomputer.com | 6 years ago

Popular Android Apps Vulnerable to Man-In-the-Disk Attacks

Some of the most popular Android applications installed on your phone may be vulnerable to a new type of attack named "Man-in-the-Disk" that can grant a third-party app the ability to crash them and/or run malicious code. | Continue reading


@bleepingcomputer.com | 6 years ago

Backdoor Mechanism Discovered in VIA C3 X86 Processors

At the DEF CON 26 security conference held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc. | Continue reading


@bleepingcomputer.com | 6 years ago

Vulnerabilities Found in the Firmware of 25 Android Smartphone Models

Last week, at the DEF CON security conference held in Las Vegas, security researchers presented details about 47 vulnerabilities in the firmware and default apps of 25 Android smartphone models, 11 of which are also sold in the US. | Continue reading


@bleepingcomputer.com | 6 years ago

Hackers Exploiting DLink Routers to Redirect Users to Fake Brazilian Banks

Attackers are targeting DLink DSL modem routers in Brazil and exploiting them to change the DNS settings to a DNS server under the attacker's control. This then allows them to redirect users attempting to connect to their online banks to fake banking websites that steal the user' … | Continue reading


@bleepingcomputer.com | 6 years ago

The Week in Ransomware – August 10th 2018 – BitPaymer & KeyPass

This was a pretty quiet week with mostly small variants, one new active release, and a large organization getting hit. This article outlines what new ransomware has been released and other ransomware related stories. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Preview Build 18214 Is Now Available with One New Feature

Microsoft has released another Windows 10 "19H1" build, as the company has started to work on the next major feature update for its operating system. It comes with the same changes as the latest build for Windows 10 Redstone 5 (also known as Windows 10 October 2018 Update). | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Enterprise Getting “InPrivate Desktop” Sandboxed Execution Feature

A recent Windows 10 Insider Feedback Hub quest revealed that Microsoft is developing a new throwaway sandboxed desktop feature called "InPrivate Desktop". This feature will allow administrators to run untrusted executables in a secure sandbox without fear that it can make any cha … | Continue reading


@bleepingcomputer.com | 6 years ago

DNS Leak Fixed in Kaspersky VPN App for Android

Kaspersky has fixed a bug in their Kaspersky VPN app for Android that leaked the computer's configured DNS server while using a VPN connection. | Continue reading


@bleepingcomputer.com | 6 years ago

The PGA Possibly Infected with the BitPaymer Ransomware

According to reports, computers at the PGA have been infected with ransomware. The victims learned they were infected on Tuesday when ransom notes started appearing on their screen. | Continue reading


@bleepingcomputer.com | 6 years ago

Google Chrome Now Uses Native Windows 10 Notifications

Google Chrome has been supporting push notifications for years now but it always used its own notification system in Windows 10. The search engine giant is now rolling out a new update for Chrome which adds support for native Windows 10 notifications. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Enterprise Getting “InPrivate Deskop” Sandboxed Execution Feature

A recent Windows 10 Insider Feedback Hub quest revealed that Microsoft is developing a new throwaway sandboxed desktop feature called "InPrivate Desktop". This feature will allow administrators to run untrusted executables in a secure sandbox without fear that it can make any cha … | Continue reading


@bleepingcomputer.com | 6 years ago

Let's Encrypt Is Now Officially Trusted by All Major Root Programs

Let's Encrypt announced yesterday that they are now directly trusted by all major root certificate programs including those from Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry.  With this announcement, Let's Encrypt is now directly trusted by all major browsers and ope … | Continue reading


@bleepingcomputer.com | 6 years ago

WhatsApp for Windows 10 Updated with Forwarding Restriction to Reduce Fake News

Launched back in 2017, WhatsApp Desktop is a Windows 10 app that acts as a wrapper for the WhatsApp web version and it can be downloaded from the Microsoft Store. Facebook-owned WhatsApp has just rolled a new update that aims to stop the spread of fake news by restricting the amo … | Continue reading


@bleepingcomputer.com | 6 years ago

Let’s Encrypt Is Now Officially Trusted by All Major Root Certificates

Let's Encrypt announced yesterday that they are now directly trusted by all major root certificates including those from Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry.  With this announcement, Let's Encrypt is now directly trusted by all major browsers and operating s … | Continue reading


@bleepingcomputer.com | 6 years ago

Health Care Data of 2M People in Mexico Exposed Online

A MongoDB database was exposed online that contained health care information for 2 million patients in Mexico. This data included information such as the person's full name, gender, date of birth, insurance information, disability status, and home address. | Continue reading


@bleepingcomputer.com | 6 years ago

New Method Simplifies Cracking WPA/WPA2 Passwords on 802.11 Networks

A new technique has been discovered to easily retrieve the Pairwise Master Key Identifier (PMK) from a router using WPA/WPA2 security, which can then be used to crack the wireless password of the router. While previous WPA/WPA2 cracking methods required an attacker to wait for a … | Continue reading


@bleepingcomputer.com | 6 years ago

Anonymous Declares War on QAnon

The hacktivist collective known for operations such as Project Chanology, the Westboro Baptist Church hack, OpISIS, anti-pedophile ops and Occupy Wallstreet announced, over the weekend, a declaration of war on QAnon. | Continue reading


@bleepingcomputer.com | 6 years ago