FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayZDNet | security RSS

Misfortune Cookie vulnerability returns to impact medical devices

The four-year-old security flaw has reared its head once again but this time medical equipment, and not routers, are at risk.
  • August 30th 2018 at 11:02

Former Qualys exec charged with insider trading after protecting brothers from financial loss

The former Chief Commercial Officer tipped off his family in advance of poor financial results.
  • August 31st 2018 at 09:45

Why is Google selling potentially compromised Chinese security keys?

Opinion: To sign up for Google's Advanced protection program, you must buy security keys from a Chinese vendor. Security questions have since been raised considering current intelligence laws in China.
  • August 31st 2018 at 19:36

Meet ransomware which wears the face of former president Barack Obama

The peculiar malware asks victims for a "tip" in return for a decryption key.
  • September 3rd 2018 at 09:26

SonarSnoop attack can steal smartphone unlock patterns

SonarSnoop technique transforms smartphones into mini sonar systems to track a user's finger across the screen and steal phone unlock patterns.
  • September 3rd 2018 at 09:43

Wireshark fixes serious security flaws that can crash systems through DoS

Proof-of-concept code detailing related exploits has been released to the public.
  • September 3rd 2018 at 10:03

Windows utility used by malware in new information theft campaigns

WMIC-based payloads highlight how attackers are turning to innocuous system processes to compromise Windows machines.
  • September 3rd 2018 at 11:06

New Hakai IoT botnet takes aim at D-Link, Huawei, and Realtek routers

Security researchers have spotted a new strain of IoT malware that has been growing in sophistication and silently infecting more and more devices online.
  • September 3rd 2018 at 14:12

Premera Blue Cross accused of destroying evidence in data breach lawsuit

Class-action lawsuit plaintiffs claim US health insurer Premera Blue Cross intentionally destroyed evidence despite ongoing litigation.
  • September 3rd 2018 at 20:07

Bitcoin Gold delisted from major cryptocurrency exchange after refusing to pay hack damages

Cryptocurrency exchange Bittrex removes Bitcoin Gold trading options after BTG team refuses to pay $256,000 as reparations for May 2018 cyber-attacks
  • September 4th 2018 at 00:29

Department of Labour denies server compromise in recent cyberattack

The government department says the attack did not expose any sensitive or confidential information.
  • September 4th 2018 at 07:55

Google open-sources internal tool for finding font-related security bugs

Google Project Zero releases BrokenType, a tool that found nearly 40 security bugs in Windows font rasterization components
  • September 4th 2018 at 09:21

Google's campus door security blasted wide open by its own engineer

Malicious code sent across Google's network had some interesting results.
  • September 4th 2018 at 09:28

This malware disguises itself as bank security to raid your account

CamuBot takes advantage of your trust in your bank to hide in plain sight.
  • September 4th 2018 at 10:00

Facebook's 'war room' hunts and destroys election meddling, fake news

The physical room will be tasked with protecting the network against insidious attempts to tamper with the US midterm elections.
  • September 4th 2018 at 10:47

Thousands of 3D printers may be leaking private product designs online

Nearly 3,800 3D printers with an OctaPrint interface were left exposed online with no password authentication, inadvertently leaking 3D models and webcam feeds.
  • September 4th 2018 at 19:12

MEGA.nz Chrome extension caught stealing passwords, cryptocurrency private keys

Tainted extension caught stealing passwords for Google, Microsoft, GitHub and Amazon accounts, but also Monero and Ethereum private keys.
  • September 4th 2018 at 23:57

Chrome 69 released with new UI and random password generator

Google revamps Chrome main user interface with new white rounded tabs, replacing classic gray angled tabs after a decade.
  • September 5th 2018 at 00:08

Cryptojacking campaign exploiting Apache Struts 2 flaw kills off the competition

Proof-of-concept (PoC) exploits have been quickly adopted to compromise Linux systems.
  • September 5th 2018 at 08:59

FIN6 returns to attack retailer point of sale systems in US, Europe

The secretive cyberattackers are known for stealing credit card data to sell on the Dark Web.
  • September 5th 2018 at 10:00

Thousands of MikroTik routers are snooping on user traffic

The routers susceptible to hijacking at being exploited through a known vulnerability.
  • September 5th 2018 at 10:31

New Silence hacking group suspected of having ties to cyber-security industry

New Russian-speaking "Silence" group linked to the theft of at least $800,000 from Russian and Eastern European banks and financial institutions.
  • September 5th 2018 at 11:01

Google investigating issue with blurry fonts on new Chrome 69

Font rendering appears to have broken down when Google promoted Chrome 69 from the Beta to the Stable channel. Windows users affected.
  • September 5th 2018 at 15:00

Recent Windows ALPC zero-day has been exploited in the wild for almost a week

ESET says it detected PowerPool group using recently disclosed Windows ALPC zero-day to improve the efficiency of its malware.
  • September 5th 2018 at 17:08

Google fixes Chrome issue that allowed theft of WiFi logins

New Wi-Jacking attack can recover WPA2 pre-shared keys by abusing a Google Chrome design issue. Issue was correct in Chrome 69.
  • September 5th 2018 at 23:08

Vodafone: You used 1234 as your password and were hacked? You cover the cost

Updated: Hackers are behind bars for stealing $30,000 from accounts, but Vodafone wants their victims to pay the tab.
  • September 6th 2018 at 08:14

Cisco warns customers of critical security flaws, advisory includes Apache Struts

The massive security update includes a patch for the recently-disclosed Apache bug -- but not all products will be fixed yet.
  • September 6th 2018 at 09:02

Schneider Electric Modicon vulnerability impacts ICS operation in industrial settings

The security flaw, if left unpatched, has the potential to cause unnecessary reboots.
  • September 6th 2018 at 10:00

The ultimate guide to finding and killing spyware and stalkerware on your smartphone

Surveillance isn't just the purview of nation-states and government agencies -- sometimes, it is closer to home.
  • September 6th 2018 at 10:21

Tor Browser gets a redesign, switches to new Firefox Quantum engine

Tor Browser finally updated to use new-and-improved Firefox Quantum codebase. This includes new Photon UI.
  • September 6th 2018 at 11:12

Vulnerabilities found in the remote management interface of Supermicro servers

Eclypsium researchers disclose second vulnerability affecting Supermicro servers in the past three months
  • September 6th 2018 at 13:01

DOJ to charge North Korean officer for Sony hack and WannaCry ransomware

After charging Chinese, Iranian, and Russian cyberspies, US prepares indictment against North Korean officer.
  • September 6th 2018 at 15:35

Tesla modifies product policy to accommodate "good-faith" security research

Tesla promises to reset car firmware and software damaged during security research. Also promises not to go after "good-faith" researchers in court.
  • September 6th 2018 at 17:32

How US authorities tracked down the North Korean hacker behind WannaCry

US authorities put together four years worth of malware samples, domain names, email and social media accounts to track down one of the Lazarus Group hackers.
  • September 6th 2018 at 21:43

Alex Stamos: Pretty clear GRU's goal was to weaken a future Clinton presidency

Former Facebook CSO breaks down differences between fake news, GRU operations, and IRA troll farms
  • September 7th 2018 at 00:22

Hacker uses ProtonMail VPN. Hacker DDoSes ProtonMail. Hacker gets arrested.

Braggadocio teen part of up-and-coming Apophis Squad hacking squad fails to protect his identity. Gets promptly arrested by UK police. Pleads guilty.
  • September 7th 2018 at 01:58

Schneider Electric may have shipped USB drives infested with malware

The flash drives were "contaminated" during the manufacturing process.
  • September 7th 2018 at 07:18

Top Mac anti-adware software in App Store steals your browsing history

A Mac app ranked in the top App Store tiers secretly sends the browsing history of users to a server in China.
  • September 7th 2018 at 14:13

US government releases post-mortem report on Equifax hack

GAO report takes us inside Equifax from March 2017 onward, showing how a few slip-ups led to one of the biggest breaches in US history.
  • September 7th 2018 at 18:17

Tor Project releases first alpha of Android mobile browser

After yesterday the Tor Project released Tor Browser v8, today, the organization had another surprise in store for its loyal fanbase β€”an Android mobile browser.
  • September 7th 2018 at 19:48

Tens of iOS apps caught collecting and selling location data

Apps collect data such as GPS coordinates, WiFi network IDs and more, and pass all of it to advertising and monetization firms.
  • September 7th 2018 at 23:03

Bill that would have the White House create a database of APT groups passes House vote

US hopes that a name-and-shame strategy would deter foreign nation-state hacking groups to attack US infrastructure as often as now.
  • September 8th 2018 at 00:39

Peeled onions and a Minus Touch: Verizon data breach digest lifts the lid on theft tactics

The 2018 report gives us a glimpse of tactics hackers are using today in the name of data exfiltration.
  • September 8th 2018 at 16:43

Worries arise about security of new WebAuthn protocol

Cryptography experts point out that new WebAuthn protocol recommends or requires the implementation of old and weak algorithms known to be vulnerable to attacks for years
  • September 9th 2018 at 01:06

Standard to protect against BGP hijack attacks gets first official draft

NIST and DHS project publishes first draft of new BGP Route Origin Validation (ROV) standard that will help ISPs and cloud providers protect against BGP hijack attacks.
  • September 9th 2018 at 15:21

Popular VPNs contained code execution security flaws, despite patches

Updated: Patches applied to a vulnerability in ProtonVPN and NordVPN builds led to the discovery of separate bugs which had to be resolved quickly in recent updates.
  • September 10th 2018 at 06:59

Mirai, Gafgyt IoT botnets stab systems with Apache Struts, SonicWall exploits

Updated: The IoT botnets are back with a new arsenal containing a vast array of vulnerabilities.
  • September 10th 2018 at 09:05

These are the warning signs of a fraudulent ICO

Initial Coin Offerings (ICOs) are part of the cryptocurrency Wild West, but how do you know what is fake and what is legitimate?
  • September 10th 2018 at 10:45

Researcher finds new malware persistence method leveraging Microsoft UWP apps

New malware persistence method works only on Windows 10 and abuses built-in UWP apps like the Cortana and People apps.
  • September 10th 2018 at 10:47

LuckyMouse uses malicious NDISProxy Windows driver to target gov't entities

The hacking group is covertly infecting Windows machines with Trojans by way of stolen certificates belonging to a Chinese security company.
  • September 10th 2018 at 13:24

Exploit vendor drops Tor Browser zero-day on Twitter

A company that sells exploits to government agencies drops Tor Browser zero-day on Twitter after recent Tor Browser update renders exploit less valuable.
  • September 10th 2018 at 14:29

Microsoft details for the first time how it classifies Windows security bugs

The Microsoft Security Response Center publishes two documents detailing internal procedures used by its staff to prioritize and classify security bugs.
  • September 10th 2018 at 20:46

Tech support scammers find a home on Microsoft TechNet pages

Security researcher finds over 3,000 TechNet pages flooded with tech support scams pushing shady phone numbers for cryptocurrency exchanges and social media platforms.
  • September 10th 2018 at 23:28

British Airways breach caused by the same group that hit Ticketmaster

Security researchers find clues connecting the Magecart group to the breach at British Airways.
  • September 11th 2018 at 07:00

How to steal a Tesla Model S in seconds

An attack technique has been revealed which allows threat actors to unlock a Tesla vehicle in no time at all.
  • September 11th 2018 at 09:28

Alexa's land-and-expand strategy is racking up the numbers

While Google is outselling Amazon in global units of smart speakers, other numbers show Amazon is doing just fine in expanding Alexa's reach and usage
  • September 11th 2018 at 12:00

'Father of Zeus' Kronos malware exploits Office bug to hijack your bank account

The $7000 malware shows there is serious money to be made in the banking Trojan market.
  • September 11th 2018 at 12:00

Online security 101: Tips for protecting your privacy from hackers and spies

This simple advice will help to protect you against hackers and government surveillance.
  • September 11th 2018 at 13:18

First IoT security bill reaches governor's desk in California

California IoT security bill criticized by security researcher. Expert says bill "is based upon an obviously superficial understanding of the problem."
  • September 11th 2018 at 15:53
❌