Samsung Service Centers in Italy Targeted in Malware Campaign

Security researchers have discovered ongoing malware campaigns targeting Samsung service centers in Italy, campaigns that appear to be the counterparts of attacks that have previously targeted similar electronics service centers in Russia this year. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Releases New Office Update for Android with New Features

Microsoft today released the July 2018 Office update for Android that brings the app to build 16.0.10325.20043. | Continue reading


@bleepingcomputer.com | 6 years ago

Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems

Academics say they've mounted a successful GPS spoofing attack against road navigational systems that can trick humans into driving to incorrect locations. | Continue reading


@bleepingcomputer.com | 6 years ago

Passwords for Tens of Thousands of Dahua Devices Cached in IoT Search Engine

Login passwords for tens of thousands of Dahua devices have been cached inside search results returned by ZoomEye, a search engine for discovering Internet-connected devices (also called an IoT search engine). | Continue reading


@bleepingcomputer.com | 6 years ago

Compromised JavaScript Package Caught Stealing NPM Credentials

A hacker has gained access to a developer's npm account and injected malicious code into a popular JavaScript library, code that was designed to steal the npm credentials of users who utilize the poisoned package inside their projects. | Continue reading


@bleepingcomputer.com | 6 years ago

New Spectre 1.1 and Spectre 1.2 CPU Flaws Disclosed

Two security researchers have revealed details about two new Spectre-class vulnerabilities, which they've named Spectre 1.1 and Spectre 1.2. | Continue reading


@bleepingcomputer.com | 6 years ago

Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password

A hacker is selling sensitive military documents on online hacking forums, a security firm has discovered. | Continue reading


@bleepingcomputer.com | 6 years ago

New Spectre 1.1 and Spectre 1.2 CPU Flaws Disclosed

Two security researchers have revealed details about two new Spectre-class vulnerabilities, which they've named Spectre 1.1 and Spectre 1.2. | Continue reading


@bleepingcomputer.com | 6 years ago

Internet Transit Providers Disconnect Infamous "BGP Hijack Factory"

Several Internet transit providers —companies that route global Internet traffic between local ISPs, end users, and data centers— have banded together to ban a fellow transit provider that has carried out at least 130 Internet route (BGP) hijacks in the past few years, most of wh … | Continue reading


@bleepingcomputer.com | 6 years ago

Chinese Censorship Bug Caused iPhone Crashes When Receiving Taiwan Flag Emoji

In a bizarre case of what appears to be Chinese censorship gone wrong, Apple introduced a bug in iOS that could cause an app to crash if a user received the Taiwan flag emoji and had their region set to China. | Continue reading


@bleepingcomputer.com | 6 years ago

Malware Found in Arch Linux AUR Package Repository

Malware has been discovered in at least three Arch Linux packages available on AUR (Arch User Repository), the official Arch Linux repository of user-submitted packages. The malicious code has been removed thanks to the quick intervention of the AUR team. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft July 2018 Patch Tuesday Fixes 53 Security Bugs Across 15 Products

The Microsoft July 2018 Patch Tuesday is out! This month, the OS maker fixed 53 security flaws in 15 different products. | Continue reading


@bleepingcomputer.com | 6 years ago

Security Firm Sued for Failing to Detect Malware That Caused a 2009 Breach

Two insurance companies are suing a cyber-security firm to recover insurance fees paid to a customer after the security firm failed to detect malware on the client's network for months, an issue that led to one of the biggest security breaches of the 2000s. The security firms say … | Continue reading


@bleepingcomputer.com | 6 years ago

Thermanator Attack Steals Passwords by Reading Thermal Residue on Keyboards

A person's fingers leave thermal residue on keyboard keys that a malicious observer could record and later determine the text a user has entered on the keyboard, according to a recently published research paper by three scientists from the University of California, Irvine (UCI). | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft’s $399 Surface Go Is the Smallest and Cheapest Surface Available

After a week of rumors, Microsoft has finally unveiled the latest Surface model called the Surface Go. This new version is the smallest version available with a 10" screen and also the cheapest at $399.  | Continue reading


@bleepingcomputer.com | 6 years ago

Timehop Security Breach Affects the Company’s Entire 21M Userbase

­Timehop, a mobile app that surfaces old social media posts from the same day but from previous years, has announced a security breach affecting its entire userbase of over 21 million users. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Insider Build 17711 Released. Whats New

Today Microsoft released Windows 10 Insider Preview Build 17711 (Redstone 5) to insiders in the fast and skip ahead rings. This build adds new features to Microsoft Edge, a new HD Color settings screen, Fluent design changes, and an autocomplete function to the Registry Editor ad … | Continue reading


@bleepingcomputer.com | 6 years ago

Rakhni Ransomware Adds Coinminer Component

An old foe and one of the first ransomware strains is still around and making new victims, but this malware is keeping up with the times and has added a cryptocurrency-mining component that it deploys on carefully selected computers. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Launcher for Android Gets a Big Update with Lots of New Features

Today, Microsoft is rolling out a new update for its Android Launcher app that comes with a set of new features. The update advances Microsoft Launcher app to version 4.11 and with this release, the company is adding several new exciting features after previously testing them wit … | Continue reading


@bleepingcomputer.com | 6 years ago

Fake Adult Sites Pushing Unwanted Extensions, Miners, and Adware

Adware, PUPs, and unwanted extensions are being promoted through fake sites that pretend to be adult video sites. When you click play on the video, a fake video player popup will be displayed that states you must download and install an updated media player to see the video. | Continue reading


@bleepingcomputer.com | 6 years ago

Chrome and Firefox Pull Stylish Add-On After Report It Logged Browser History

Google and Mozilla have removed the Stylish browser extension from their respective add-on stores after the publication of a report this week that accused the extension of logging users' browser histories and sending the data to remote servers. | Continue reading


@bleepingcomputer.com | 6 years ago

Someone Is Playing Pranks on GTA Gamers by Fake-Announcing GTA 6

The makers of Grand Theft Auto (GTA) Online mods have played a cruel prank on GTA gamers this week after they used their mods to show fake GTA 6 launch announcements to online gamers. | Continue reading


@bleepingcomputer.com | 6 years ago

German Police Accused of Carrying Out Some Pretty Stupid Raids

Two privacy-focused organizations have accused today German police of carrying out raids at their offices and members' private homes on some pretty shoddy reasoning that makes no sense and hints at the police's abuse of power. | Continue reading


@bleepingcomputer.com | 6 years ago

New Stealth Material Can Hide Objects from Infrared Scans

Scientists from the University of Wisconsin-Madison (UWM) have developed a new type of material that can hide an object's heat signature from infrared sensors. | Continue reading


@bleepingcomputer.com | 6 years ago

Cisco Removes Backdoor Account, Fourth in the Last Four Months

For the fourth time in as many months, Cisco has removed hardcoded credentials that were left inside one of its products, which an attacker could have exploited to gain access to devices and inherently to customer networks. | Continue reading


@bleepingcomputer.com | 6 years ago

Download Bomb Trick Returns in Chrome Plus Firefox, Opera, Vivaldi and Brave

The release of Google Chrome 67 has reopened a "download bomb" bug that was exploited by tech support scammers last winter, and which had been fixed with the release of Chrome 65 in March 2018. | Continue reading


@bleepingcomputer.com | 6 years ago

Iranian APT Poses as Israeli Cyber-Security Firm That Exposed Its Operations

An Iranian cyber-espionage group attempted to pose as one of the cyber-security firms that exposed its previous hacking campaigns in an effort to spear-phish people interested in reading reports about it. | Continue reading


@bleepingcomputer.com | 6 years ago

Facebook Acknowledges It Shared User Data with 61 Companies

In a 747-page document provided to the US House of Representatives' Energy and Commerce Committee on Friday, Facebook admitted that it granted special access to users' data to 61 tech companies. | Continue reading


@bleepingcomputer.com | 6 years ago

App Masks Hidden Printer Tracking Dots to Keep Whistleblowers Safe

Four academics from the Technical University in Dresden, Germany (TU Dresden) have created an app that detects and masks the hidden dot patterns that laser color printers secretly hide on all printed documents. | Continue reading


@bleepingcomputer.com | 6 years ago

DNS Poisoning or BGP Hijacking Suspected Behind Trezor Wallet Phishing Incident

The team behind the Trezor wallet service has discovered a phishing attack against some of its users that took place over the weekend. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Fixes Faulty Debian Package That Messes with User Settings

Microsoft fixed yesterday a faulty Debian package that was messing with users' OS settings during its installation routine. The faulty package that was causing all the problems was Open R v3.5. Open R is an enhanced version of the R programming language maintained by Microsoft. | Continue reading


@bleepingcomputer.com | 6 years ago

Typeform Announces Breach After Hacker Grabs Backup File

Barcelona-based online survey and form building service Typeform announced a data breach today after an unknown attacker downloaded a backup file containing sensitive customer information. | Continue reading


@bleepingcomputer.com | 6 years ago

Security Flaws Disclosed in LTE (4G) Mobile Telephony Standard

A team of academics has published research yesterday that describes three attacks against the mobile communication standard LTE (Long-Term Evolution), also known as 4G. | Continue reading


@bleepingcomputer.com | 6 years ago

Thousands of Apps Leak Sensitive Data via Misconfigured Firebase Back Ends

Thousands of iOS and Android mobile applications are exposing over 113 GBs of data via over 2,271 misconfigured Firebase databases, according to a report released this week by mobile security firm Appthority. | Continue reading


@bleepingcomputer.com | 6 years ago

Rewards of Up to $500,000 Offered for FreeBSD, OpenBSD, NetBSD, Linux Zero-Days

Exploit broker Zerodium is offering rewards of up to $500,000 for zero-days in UNIX-based operating systems like OpenBSD, FreeBSD, NetBSD, but also for Linux distros such as Ubuntu, CentOS, Debian, and Tails. | Continue reading


@bleepingcomputer.com | 6 years ago

File-Wiping Malware Placed Inside Gentoo Linux Code After GitHub Account Hack

An unknown hacker has temporarily taken control over the GitHub account of the Gentoo Linux organization and embedded malicious code inside the operating system's distributions that would delete user files. | Continue reading


@bleepingcomputer.com | 6 years ago

All-Radio 4.27 Portable Can't Be Removed? Then Your PC Is Severely Infected

Starting yesterday, there have been numerous reports of people being infected with something called "All-Radio 4.27 Portable". After researching this heavily today, it has been determined that seeing this program is a symptom of a much bigger problem on your computer. | Continue reading


@bleepingcomputer.com | 6 years ago

National Security Concerns Over Hackers Commandeering Satellites

The number of satellites transmitting GPS locations, cellphone signals and other sensitive information has been rapidly increasing, which has resulted in the creation of favorable circumstances for hackers. Even with all the advances in satellite technology, much of the US milita … | Continue reading


@bleepingcomputer.com | 6 years ago

ProtonMail DDoS Attacks Are a Case Study of What Happens When You Mock Attackers

For the past two days, secure email provider ProtonMail has been fighting off DDoS attacks that have visibly affected the company's services, causing short but frequent outages at regular intervals. | Continue reading


@bleepingcomputer.com | 6 years ago

Some Spectre In-Browser Mitigations Can Be Defeated

Continue reading


@bleepingcomputer.com | 6 years ago

Cisco ASA Flaw Exploited in the Wild After Publication of Two PoCs

Hackers are exploiting a vulnerability in Cisco software to crash and/or retrieve information from affected devices. Cisco is aware of the issue and has warned customers last week, Friday, June 22. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Insider Build 17704 Is Now Available. Here’s Whats New

Microsoft just released Windows 10 Insider Preview Build 17704 (Redstone 5) to Windows Insiders in the Fast and Skip Ahead Rings. Windows 10 Insider Preview Build 17704 comes with a huge amount of improvements and new features that include ones for Microsoft Edge, new Skype exper … | Continue reading


@bleepingcomputer.com | 6 years ago

NSA Exploit “DoublePulsar” Patched to Work on Windows IoT Systems

An infosec researcher who uses the online pseudonym of Capt. Meelo has modified an NSA hacking tool known as DoublePulsar to work on the Windows IoT operating system (formerly known as Windows Embedded). | Continue reading


@bleepingcomputer.com | 6 years ago

Office of Cyberspace Reborn in Bill Approved by Senate Panel

The Senate Foreign Relations Committee voted today to advance bill H.R. 3776, the Cyber Diplomacy Act. This bill outlines the restoration of the State Department's Cyber Office under the new name of Office of Cyberspace and the Digital Economy and the reinstatement of a head of c … | Continue reading


@bleepingcomputer.com | 6 years ago

Unpatched Flaw Disclosed in WordPress CMS Core

Security researchers from RIPS disclosed today details about an unpatched security flaw impacting WordPress, the Internet's most popular content management system (CMS). | Continue reading


@bleepingcomputer.com | 6 years ago

Windows Settings Shortcuts Can Be Abused for Code Execution on Windows 10

A new file type format added in Windows 10 can be abused for running malicious code on users' computers, according to Matt Nelson, a security researcher for SpecterOps. | Continue reading


@bleepingcomputer.com | 6 years ago

Hundreds of Hotels Affected by Data Breach at Hotel Booking Software Provider

The personal details and payment card data of guests from hundreds of hotels, if not more, have been stolen this month by an unknown attacker, Bleeping Computer has learned. | Continue reading


@bleepingcomputer.com | 6 years ago

New WPA3 Wi-Fi Standard Released

On Monday, the Wi-Fi Alliance, the organization that manages Wi-Fi technologies, announced the official release of WPA3. WPA3 is the latest version of Wi-Fi Protected Access (WPA), a user authentication technology for Wi-Fi connections. | Continue reading


@bleepingcomputer.com | 6 years ago