Zendesk chief’s Twitter account hacked
The chief executive of tech support firm Zendesk has become the latest high-profile figure to have his Twitter account hacked. Mikkel Svane’s hijacked account had its ID image changed toRead More →
The chief executive of tech support firm Zendesk has become the latest high-profile figure to have his Twitter account hacked. Mikkel Svane’s hijacked account had its ID image changed toRead More →
All Necurs activity stopped on June 1, down ever since. The Necurs botnet, the largest malware distribution botnet known today, seems to be facing some technical problems, and the direct consequenceRead More →
In related studies: Ice is cold; fire still hot. Internet file sharing has long been a prime route for malware to spread. The situation is one of the reasons (aside fromRead More →
US-CERT warns about a rise in macro malware. Following numerous reports from various security firms about a large number of malware that uses macro scripts in Office documents to spread, theRead More →
Intel Security has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious attachment or by usurping an Adobe Flash Player installation.Read More →
is the default PDF reader that is included in the Google Chrome web browser. Talos has identified an exploitable heap buffer overflow vulnerability in the Pdfium PDF reader. By simplyRead More →
While SNSLocker isn’t a stand-out crypto-ransomware in terms of routine or interface, its coarse and bland façade hid quite a surprise. After looking closer at its code, we discovered thatRead More →
Introduction Satellites have assumed a crucial role in our contemporary society; they are used in both private and public sectors for numerous purposes, from communication to research. Unfortunately, with theRead More →
Passwords for 32 Million Twitter accounts may have been hacked and leaked. After the mega hacks of last month, it is now time for Twitter. But there is a twistRead More →
Recently, I’ve had multiple people ask about port forwards with Cobalt Strike’s Beacon payload. Beacon has had SOCKS proxy pivoting support since June 2013. This feature opens a SOCKS proxy serverRead More →
VibraPhone attack turns smartphones into listening devices. Two researchers from the University of Illinois at Urbana-Champaign have devised a method for turning vibration motors, like the ones found in smartphones, intoRead More →
Ransomware! Ransom Software! Encrypting Ransomware! AHHH! No doubt the last year exposed you to this term numerous times and I doubt any of it was in reference to a good event.Read More →
Crooks use brand new potent feature to just show adware. A previously discovered and highly dangerous Android trojan has received an update in the form of a module that allows itRead More →
If it can happen to her, chances are it can happen to lots of people. In a scenario that’s growing increasingly common, the chief technologist of the US Federal Trade CommissionRead More →
Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online and mobile applications. Following Check Point’s responsible discloser, Facebook promptly fixed the vulnerability. What isRead More →
Introduction Ransomware authors are in a constant state of innovation. Two weeks ago, Invincea discovereda version of Cerber that could not only hold a victim’s machine hostage, but also potentiallyRead More →
Security experts are warning owners of Mitsubishi Outlander Plug-In Hybrid Electric Vehicle that their cars can be hacked via the automobile’s on-board WiFi network used for remote control of keyRead More →
Russia plans to leave Apple, Android behind by building its own smartphone software. Russia wants to create its own smartphone operating system in an effort to reduce its dependence on WesternRead More →
A new Jigsaw Ransomware variant was discovered today by security researcher Michael Gillespie that encrypts a victim’s data and then appends the.payms extension to them. The ransomware then requires a ransom paymentRead More →
Bad guys score a victory in their never-ending arms race with defenders. Drive-by attacks that install the once-feared TeslaCrypt crypto ransomware are now able to bypass EMET, a Microsoft-provided tool designedRead More →