Tagged With hackers

15

Most internet users wouldn't want to share their browsing history with the rest of the world. (It's one of the reasons 'incognito mode' is so popular - despite not actually working as advertised.)

This is especially true of people who look at questionable online material. So what would you be willing to pay if someone had a secret recording of you watching porn, taken on your webcam?

0

Google has announced the closure of its ailing social media network Google+ in response to a data leak that exposed up to 500,000 users. If you were one of the few people still using the platform - or created an account and forgot about it - here's what you need to know.

0

A massive Facebook data breach has compromised nearly 50 million accounts according to the company. Nearly 100 million users were forcibly logged out of their accounts as Facebook scrambled to fix the issue. Here's what you need to know.

0

A serious vulnerability has been disclosed in the Fortnite installer for Android phones. The vulnerability has since been patched but it allowed malware to use the Fortnite installer to install anything - including apps with full permissions - in the background.

Shared from Gizmodo

0

This week, news of massive security vulnerabilities afflicting every modern model of Intel processor went public, even as developers for practically every major platform frantically rushed to roll out fixes. Much more information has now become available about Meltdown and Spectre, a group of attack methods malicious parties could use to break into some of the most sensitive inner workings of any device using the affected CPUs.

Shared from Gizmodo

2

There's small screwups and big screwups. Here is tremendously huge screwup: Virtually all Intel processors produced in the last decade have a major security hole that could allow "normal user programs - from database applications to JavaScript in web browsers - to discern to some extent the layout or contents of protected kernel memory areas," the Register reports.

0

Most security reports are pretty dull. They tell the same story. The bad guys can get into almost any system, spend weeks or months there, exfitrate data and generally run amok. They use social engineering attacks or exploit vulnerabilities to find their way into networks. But the Carbon Black report, released today focusses on something else - the malware marketplace.

1

Famed white hat hacker Marcus Hutchins -- better known as "MalwareTech" -- was arrested by the FBI yesterday while trying to fly home to the United Kingdom from Las Vegas. The 22-year-old security researcher gained mainstream fame earlier this year as the guy who stopped the destructive WannaCry ransomware from spreading, and had been partying with friends near the Black Hat and Defcon hacker conferences before his arrest. Now, he faces serious federal charges for allegedly creating the Kronos banking trojan. But he's supposed to be the good guy!

2

We all the know the MO of threat actors who distribute malware. Deliver a nasty payload, wait for the victim to click and lock up their files, demand payment and wait for the bitcoin to flow. But some bad guys are turning to snitching in lieu of payment.

0

Scamwatch is warning Australian gamblers not to part with money they didn't plan to during Spring Racing Season, today issuing an alert that confidence tricksters are on the hunt for more victims. Australians have lost over one million dollars to con artists pushing sports investment scams in 2016 to date.

1

This morning a ton of websites and services, including Spotify and Twitter, were unreachable because of a distributed denial of service (DDoS) attack on Dyn, a major DNS provider. Details of how any the attack happened remain vague, but one thing seems certain. Our internet is frightfully fragile in the face of increasingly sophisticated hacks.

0

Last month, Microsoft launched a bug bounty program for the Edge web browser that focused on finding remote code execution vulnerabilities. The company has now expanded this program, offering hackers and researchers monetary rewards for different types of security flaws that they find. Here's what you need to know.