Ransomware 2.0: Spora now steals your credentials and logs what you type

A vicious strain of ransomware has been upgraded to enable it to steal browsing information and record keystrokes from infected PCs. Spora ransomware — one of the most common families of the file-locking malware — appears to be following in the footsteps of Cerber, which recently gained the ability to steal passwords and currency from Bitcoin wallets. Read […]

Ransomware 2.0: Spora now steals your credentials and logs what you type Read More »

US election hack: Microsoft wins latest round in court against Fancy Bear phishers

Microsoft has won its motion for a permanent injunction against the alleged Russian government hacking group known as Fancy Bear or APT28. Fancy Bear is thought to be responsible for the hacks on the Democratic National Committee (DNC) during the US elections last year. US intelligence believe the group hacked the DNC and leaked emails to WikiLeaks to

US election hack: Microsoft wins latest round in court against Fancy Bear phishers Read More »

ROPEMAKER exploit enables attackers to modify email content—after It’s sent!

A new email exploit, called Ropemaker has been discovered by security researchers at email and cloud security firm Mimecast, the exploit enables an attacker to modify the content in an email—after it’s been sent to the recipient and made it through the necessary filters. Ropemaker stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky,

ROPEMAKER exploit enables attackers to modify email content—after It’s sent! Read More »

Windows 10 tip: Keep your Microsoft account secure and private

Signing in to Windows 10 with a Microsoft account allows you to easily sync settings and files between devices. It’s not mandatory (you can sign in using a local account or an Active Directory account on a corporate domain instead), but using a Microsoft account is convenient for anyone who regularly switches between Windows devices.

Windows 10 tip: Keep your Microsoft account secure and private Read More »

Data leak vulnerabilities patched in Fuze TPN portal

Fuze has patched a series of vulnerabilities which placed user data and networks at risk Researchers from Rapid7 disclosed the security flaws on Tuesday. In a security advisory, the company said the three issues at hand relate to access controls and authentication in the TPN Handset Portal, which is part of the Fuze platform. Read more

Data leak vulnerabilities patched in Fuze TPN portal Read More »

Over 500 Android apps with a combined 100 million down

More than 500 Android apps, collectively downloaded over 100 million times from the Google Play store, could have been used to secretly distribute spyware to users, thanks to a malicious advertising SDK (software development kit). Mobile apps — especially free ones — commonly use advertising SDKs to deliver ads to their customers through existing advertising networks,

Over 500 Android apps with a combined 100 million down Read More »

Stabbing fruits to breaking your skull: robot bugs make hacking too easy

Researchers have demonstrated how easy it is to hack consumer and industrial robots to do everything from spy to injure in the hopes of waking up vendors that dismiss security in their product cycles. On Tuesday, the security team at IOActive revealed security flaws in robotic products developed by Universal Robots, the UR3, UR5, and

Stabbing fruits to breaking your skull: robot bugs make hacking too easy Read More »

Enigma ethereum marketplace hijacked, investors duped by phishing scam

Enigma, a cryptocurrency investor platform, was compromised by an attacker who swindled investors into parting with roughly $500,000 in cryptocurrency. This week, the decentralized cryptocurrency marketplace was gearing up for its Token Sale, also known as an initial coin offering (ICO), in order to give thousands of users the chance to use their ethereum (ETH) to

Enigma ethereum marketplace hijacked, investors duped by phishing scam Read More »

The IoT-based threat of Cyber Chocolatocalypse, and worse

Unsecured Internet of Things (IoT) devices are “appearing like lice”, says Earl Perkins, a research vice president in the Security and Privacy team at Gartner. The culprits, he said, are the operational technology (OT) people. “The OT people have found a [cheaper] way to replace legacy systems for collecting data about the performance of their

The IoT-based threat of Cyber Chocolatocalypse, and worse Read More »