Hackers Steal $13.5M Across Three Days from Indian Bank

Representatives of Cosmos Bank, India's second-largest cooperative bank, revealed this week that hackers breached the bank's servers over the weekend and stole over 940 million rupees ($13.5 million) across three days. | Continue reading


@bleepingcomputer.com | 6 years ago

Firefox Add-On with 220,000+ Installs Caught Collecting Users’ Browsing History

A popular Firefox add-on is secretly logging users' browsing history, according to reports from the author of the uBlock Origin ad blocker and Mike Kuketz, a German privacy and security blogger. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Cortana Flaw Could Allow Browsing on Locked Systems

Security researchers have shown that having Microsoft Cortana enabled on the Windows lock screen could be a security risk. In such a configuration, users could compromise a system or lead to or impersonate a user using credentials stored in the browser cache. | Continue reading


@bleepingcomputer.com | 6 years ago

VORACLE Attack Can Recover HTTP Data from VPN Connections

A new attack named VORACLE can recover HTTP traffic sent via encrypted VPN connections under certain conditions. | Continue reading


@bleepingcomputer.com | 6 years ago

Google Chrome Gets Insertable Emojis. How to Enable It

For all of you emoji lovers out there, Google is adding a context menu to Chrome that allows you to open a emoji panel that can be used to insert emojis into any editable input field. | Continue reading


@bleepingcomputer.com | 6 years ago

Hackers Can Falsify Patient Vitals

Hackers can falsify patients' vitals by emulating data sent from medical equipment clients to central monitoring systems, a McAfee security researcher revealed over the weekend at the DEF CON 26 security conference. | Continue reading


@bleepingcomputer.com | 6 years ago

Built-In Lazy Loading Lands in Google Chrome Canary

As Bleeping Computer first reported back in January this year, Google has started rolling out support for built-in lazy loading inside Chrome. | Continue reading


@bleepingcomputer.com | 6 years ago

Linkedin Job Post Confirms Windows Core OS Is All About Devices

A new job posting on LinkedIn has given us a closer look at Windows Core development plans. The job post for a Software Engineering Manager was posted almost 11 days ago and it's all about Windows Core OS. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Testing “Memberships” Subscription Section in Windows 10 Store App

Microsoft has just started rolling out the new search experience in the Windows 10 App Store on Insider Builds and it comes with a new search category called "Memberships". The new category centralizes all available memberships and offers a way for users to quickly find them and … | Continue reading


@bleepingcomputer.com | 6 years ago

Cisco Patches Its Operating Systems Against New IKE Crypto Attack

Cisco, one of the world's largest vendor of networking equipment, released security updates today to patch a vulnerability in the IOS and IOS XE operating systems that run the vast majority of its devices. | Continue reading


@bleepingcomputer.com | 6 years ago

Vulnerabilities in Fax Protocol Let Hackers Infiltrate Networks via Fax Machines

Two recently discovered vulnerabilities in the fax protocol can transform fax machines into entry points for hackers into corporate networks, two Check Point researchers revealed last week in a talk given at the DEF CON 26 security conference held in Las Vegas. | Continue reading


@bleepingcomputer.com | 6 years ago

Chromebooks May Soon Dual Boot Between Chrome OS and Windows 10

Today, a report has revealed that Google wants to bring Microsoft's Windows 10 support to Chromebooks. Reports indicate that the company is working on a new project called "Campfire" that would allow Chromebook owners to dual boot Windows 10 and Crome OS. | Continue reading


@bleepingcomputer.com | 6 years ago

Popular Android Apps Vulnerable to Man-In-the-Disk Attacks

Some of the most popular Android applications installed on your phone may be vulnerable to a new type of attack named "Man-in-the-Disk" that can grant a third-party app the ability to crash them and/or run malicious code. | Continue reading


@bleepingcomputer.com | 6 years ago

Backdoor Mechanism Discovered in VIA C3 X86 Processors

At the DEF CON 26 security conference held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc. | Continue reading


@bleepingcomputer.com | 6 years ago

Vulnerabilities Found in the Firmware of 25 Android Smartphone Models

Last week, at the DEF CON security conference held in Las Vegas, security researchers presented details about 47 vulnerabilities in the firmware and default apps of 25 Android smartphone models, 11 of which are also sold in the US. | Continue reading


@bleepingcomputer.com | 6 years ago

Hackers Exploiting DLink Routers to Redirect Users to Fake Brazilian Banks

Attackers are targeting DLink DSL modem routers in Brazil and exploiting them to change the DNS settings to a DNS server under the attacker's control. This then allows them to redirect users attempting to connect to their online banks to fake banking websites that steal the user' … | Continue reading


@bleepingcomputer.com | 6 years ago

The Week in Ransomware – August 10th 2018 – BitPaymer & KeyPass

This was a pretty quiet week with mostly small variants, one new active release, and a large organization getting hit. This article outlines what new ransomware has been released and other ransomware related stories. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Preview Build 18214 Is Now Available with One New Feature

Microsoft has released another Windows 10 "19H1" build, as the company has started to work on the next major feature update for its operating system. It comes with the same changes as the latest build for Windows 10 Redstone 5 (also known as Windows 10 October 2018 Update). | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Enterprise Getting “InPrivate Desktop” Sandboxed Execution Feature

A recent Windows 10 Insider Feedback Hub quest revealed that Microsoft is developing a new throwaway sandboxed desktop feature called "InPrivate Desktop". This feature will allow administrators to run untrusted executables in a secure sandbox without fear that it can make any cha … | Continue reading


@bleepingcomputer.com | 6 years ago

DNS Leak Fixed in Kaspersky VPN App for Android

Kaspersky has fixed a bug in their Kaspersky VPN app for Android that leaked the computer's configured DNS server while using a VPN connection. | Continue reading


@bleepingcomputer.com | 6 years ago

The PGA Possibly Infected with the BitPaymer Ransomware

According to reports, computers at the PGA have been infected with ransomware. The victims learned they were infected on Tuesday when ransom notes started appearing on their screen. | Continue reading


@bleepingcomputer.com | 6 years ago

Google Chrome Now Uses Native Windows 10 Notifications

Google Chrome has been supporting push notifications for years now but it always used its own notification system in Windows 10. The search engine giant is now rolling out a new update for Chrome which adds support for native Windows 10 notifications. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Enterprise Getting “InPrivate Deskop” Sandboxed Execution Feature

A recent Windows 10 Insider Feedback Hub quest revealed that Microsoft is developing a new throwaway sandboxed desktop feature called "InPrivate Desktop". This feature will allow administrators to run untrusted executables in a secure sandbox without fear that it can make any cha … | Continue reading


@bleepingcomputer.com | 6 years ago

Let's Encrypt Is Now Officially Trusted by All Major Root Programs

Let's Encrypt announced yesterday that they are now directly trusted by all major root certificate programs including those from Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry.  With this announcement, Let's Encrypt is now directly trusted by all major browsers and ope … | Continue reading


@bleepingcomputer.com | 6 years ago

WhatsApp for Windows 10 Updated with Forwarding Restriction to Reduce Fake News

Launched back in 2017, WhatsApp Desktop is a Windows 10 app that acts as a wrapper for the WhatsApp web version and it can be downloaded from the Microsoft Store. Facebook-owned WhatsApp has just rolled a new update that aims to stop the spread of fake news by restricting the amo … | Continue reading


@bleepingcomputer.com | 6 years ago

Let’s Encrypt Is Now Officially Trusted by All Major Root Certificates

Let's Encrypt announced yesterday that they are now directly trusted by all major root certificates including those from Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry.  With this announcement, Let's Encrypt is now directly trusted by all major browsers and operating s … | Continue reading


@bleepingcomputer.com | 6 years ago

Health Care Data of 2M People in Mexico Exposed Online

A MongoDB database was exposed online that contained health care information for 2 million patients in Mexico. This data included information such as the person's full name, gender, date of birth, insurance information, disability status, and home address. | Continue reading


@bleepingcomputer.com | 6 years ago

New Method Simplifies Cracking WPA/WPA2 Passwords on 802.11 Networks

A new technique has been discovered to easily retrieve the Pairwise Master Key Identifier (PMK) from a router using WPA/WPA2 security, which can then be used to crack the wireless password of the router. While previous WPA/WPA2 cracking methods required an attacker to wait for a … | Continue reading


@bleepingcomputer.com | 6 years ago

Anonymous Declares War on QAnon

The hacktivist collective known for operations such as Project Chanology, the Westboro Baptist Church hack, OpISIS, anti-pedophile ops and Occupy Wallstreet announced, over the weekend, a declaration of war on QAnon. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Releases Remote “Push to Install” Feature in Windows 10 Store App

Microsoft has brought their remote app install feature to the Windows 10 Microsoft Store app and has officially called it "Push to Install". | Continue reading


@bleepingcomputer.com | 6 years ago

Tech Support Scams Using Call Optimization Services to Insert Phone Numbers

New research shows that browser based Tech Support Scams are starting to utilize services normally found in legitimate call center operations. These services, called call optimization services, are typically used by call centers to perform call load balancing, call routing, dynam … | Continue reading


@bleepingcomputer.com | 6 years ago

CCleaner v5.45 Pulled Due to Anger Over Usage Data Collection

It has not been a good week for Piriform's PC cleaning tool CCleaner. With the release of CCleaner version 5.45, it was quickly discovered that the program's "Active Monitoring" component, which is utilized to send anonymous usage data back to Piriform, could no longer be disable … | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Insider Build 17730 Is Now Available. Here’s Whats New

Today Microsoft released Windows 10 Insider Preview Build 17730 (Redstone 5) to the Insiders on the Fast Ring. This build continues to enhance the Your Phone experience with Android photo synching and iOS "Continue on your PC" being enabled. This build also introduces HTTP/2 to E … | Continue reading


@bleepingcomputer.com | 6 years ago

New Version of Windows 10 Your Phone App Allows Photo Transfer from Android

Microsoft has just started the rollout of the Windows 10's Your Phone app for the Windows Insiders in the Fast Ring running the latest preview build that provides photo transfer functionality in Android. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Is Updating Outlook on Android with New Feature

Microsoft has just released a new update for the Outlook app on Android that adds the highly-anticipated do-not-disturb feature. | Continue reading


@bleepingcomputer.com | 6 years ago

Malwarebytes Browser Extension Blocks Malware, Scams, Ads, & Trackers

Malwarebytes has released a Chrome and Firefox extension called "Malwarebytes Browser Extension (BETA)" that aims to protect your computer while browsing the web. When installed, this extension will block malicious sites, popups, tech support scams, and also acts as an advertisin … | Continue reading


@bleepingcomputer.com | 6 years ago

Ethereum “Giveaway” Scammers Have Tricked People Out of $4.3M

Online crooks promoting fake "giveaways" have tricked people out of 8,148 Ether, currently worth around $4.3 million, according to statistical data compiled in EtherScamDB. | Continue reading


@bleepingcomputer.com | 6 years ago

An Open Letter to Microsoft About Poor Windows 10 Update Experiences

Susan Bradley, an 18 year Microsoft MVP focused on Windows patching and patch management, has sent an open letter to Microsoft executives Satya Nadella, Carlos Picoto, and Scott Guthrie about the frustration Windows 10 users have when dealing with installing new updates. | Continue reading


@bleepingcomputer.com | 6 years ago

IE Zero-Day Adopted by RIG Exploit Kit After Publication of PoC Code

An Internet Explorer zero-day vulnerability that came to light last month has now been incorporated in the RIG exploit kit, a web-based toolkit that malware authors use to infect a site's visitors with malware. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft To-Do for Windows 10 Is Getting Another Update with New Features

The Microsoft To-Do app for Windows 10 is receiving a new update with a couple of new features. These features include the ability to exclude/hide completed items from the search results and to organize your to-do items. | Continue reading


@bleepingcomputer.com | 6 years ago

US Charges Three Members of FIN7 (Carbanak) Hacker Group

The US Department of Justice announced today charges against three Ukrainian nationals believed to be members of the infamous FIN7 (Carbanak or Cobalt) hacker group. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Begins Testing of the Your Phone App in Windows 10

Microsoft had first introduced the Your Phone app at its Build developer conference in May this year as a way to integrate a user's mobile devices with their Windows 10 PCs. The Your Phone app, which will be used to synchronize data between a mobile device and Windows 10, is now … | Continue reading


@bleepingcomputer.com | 6 years ago

Funny Google Chromebook Ad Mocks Windows and MacOS Operating Systems

In a mocking and hilarious Chromebook ad, Google takes aim at the various issues Windows and macOS users encounter while using these operating systems. | Continue reading


@bleepingcomputer.com | 6 years ago

Is Conscious AI Achievable and How Soon Might We Expect It?

Artificial general intelligence (AGI) can be defined as artificial intelligence (AI) that matches or surpasses human intelligence. It is, in brief, the type of intelligence through which a machine is able to perform any intellectual task that a human being can. And, it is current … | Continue reading


@bleepingcomputer.com | 6 years ago

SamSam Ransomware Crew Made Nearly $6M from Ransom Payments

The SamSam ransomware has earned its creator(s) more than $5.8 million in ransom payments since late 2015, according to the most comprehensive report ever published on SamSam's activity, containing information since the ransomware's launch in late 2015 and up to attacks that have … | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Is Updating Bing Maps with Customized Itineraries

Bing Maps is not as widely used as some other mapping services like Google Maps, but Microsoft's still investing resources into it in order to develop new features. Today, for instance, the company has added the ability to customize itineraries of popular travel destinations. | Continue reading


@bleepingcomputer.com | 6 years ago

Massive Malvertising Campaign Discovered Attempting 40,000 Infections per Week

A massive malvertising campaign has been exposed today in a report published by cybersecurity firm Check Point. | Continue reading


@bleepingcomputer.com | 6 years ago

DOD to Move All Websites to HTTPS by the End of the Year

The US Department of Defense plans to implement HTTPS and HSTS (HTTP Strict Transport Security) for all its public-facing websites by the end of the year. | Continue reading


@bleepingcomputer.com | 6 years ago