Weaponizing Princess Toys: Crafting Wi-Fi Attack Kits
… Alternate Title: “Why I Love BHIS” So, I was gifted this cute little princessy-toy thing recently. My first thought was that my daughters will love this thing. My second thoughtRead More →
… Alternate Title: “Why I Love BHIS” So, I was gifted this cute little princessy-toy thing recently. My first thought was that my daughters will love this thing. My second thoughtRead More →
A new spam wave posing as emailed fax messages is delivering a malware downloader that fetches and installs a ransomware family known as PClock, a CryptoLocker clone. The ransomware, detectedRead More →
Hardware hacker Samy Kamkar has released a new tool called PoisonTap that is capable of a plethora of malicious actions, all of which work even against password-protected computers on whichRead More →
The firm will also implement security measures to prevent further breaches and will review policies twice per year. Adobe has received a fine of $1 million for a data breachRead More →
For the second time this year, the hacker group OurMine breached one of the online accounts of the Facebook CEO Mark Zuckerberg. For the second time, this year hackers seemsRead More →
A new ransomware called CryptoLuck has been discovered by Proofpoint security researcher and exploit kit expert Kafeine that is being distributed via the RIG-E exploit kit. While it has become common toRead More →
In “mistake,” AdUps collected data from BLU Android phones in US. Security firm Kryptowire has uncovered a backdoor in the firmware installed on low-cost Android phones, including phones from BLURead More →
Security researchers from Dr.Web say they’ve identified a new malware family inside an Android app found on the Google Play Store under the name of “Multiple Accounts: 2 Accounts.” AtRead More →
WhatsApp is rolling out an update that adds Two-Step Authentication to your WhatsApp account. This feature is an essential method to ensure the safety of your WhatsApp account. WhatsApp hadRead More →
A security researcher named slipstream/RoL has discovered the Karma Ransomware, which pretends to be a Windows optimization program called Windows-TuneUp. What is worse is that this sample was discovered as software thatRead More →
The way users move fingers across a phone’s touchscreen alters the WiFi signals transmitted by a mobile phone, causing interruptions that an attacker can intercept, analyze, and reverse engineer toRead More →
In a surprise move, the master decryption keys for the CrySiS Ransomware have been released early this morning in a post on the BleepingComputer.com forums. At approximately 1 AM EST,Read More →
“BlackNurse” could turn lone attackers with modest resources into Internet bullies. Researchers said they have discovered a simple way lone attackers with limited resources can knock large servers offline whenRead More →
Russia has for the first time invoked its ban on websites storing personal data outside the country. It’s picked a high-profile target, LinkedIn – and says even bigger companies couldRead More →
Almost every account password was cracked, thanks to the company’s poor security practices. Even “deleted” accounts were found in the breach. A massive data breach targeting adult dating and entertainmentRead More →
The recently launched Google Pixel phone has been hacked by the Chinese hackers just in less than a minute! A team called White-Hat hackers from Qihoo 360, which participated inRead More →
Emails tell victims they need to download an attachment to view “suspicious activity” – then infects them with ransomware. In the immediate aftermath of a major data breach, cybercriminals willRead More →
Researchers are working on a new CPU chip design that will extend the fight against malware at the hardware level in an attempt to bolster computers, mobiles, and other devicesRead More →
A web application vulnerable to Python code injection allows you to send Python code though the application to the Python interpreter on the target server. If you can execute python,Read More →
Researcher: FBI was likely enabled to run half of all child porn sites on the servers. As Ars has reported, federal investigators temporarily seized a Tor-hidden site known as Playpen in 2015Read More →