Categories
Anti-malware

Internet’s Largest Bitcoin Mixer Shuts Down Realizing Bitcoin Is Not Anonymous

July 30, 2017  By Catalin Cimpanu     BitMixer, the world’s most popular Bitcoin mixing service has announced last weekend it was shutting down operations effective immediately.   Bitcoin mixing is a process of taking money from one account and breaking it into hundreds or thousands of smaller transactions to transfer it to another account. […]

Categories
Anti-malware

Apple removed iOS VPN apps from Chinese App Store in compliance to censorship law

July 30, 2017  By Pierluigi Paganini     In compliance with Chinese Internet monitoring law, Apple has started removing all IOS VPN apps from it App Store in China.   The company complies with a request from the Chinese Government that wants to strict censorship making it harder for netizens to bypass the Great Firewall system (aka […]

Categories
Anti-malware

Australian police seek the right to install malware on home devices during “emergencies”

By Cory Doctorow July 27th, 2017     The Queensland Police have asked the Australian Parliament to give them the right to covertly install malicious software on your home devices in order to conduct mass surveillance during times of “national emergency”   The plan neatly demonstrates the ignorance and indifference of law enforcement to the […]

Categories
Anti-malware

Banking Trojans Add Self-Spreading Worm Components… Because WannaCry

  July 28, 2017  By Catalin Cimpanu     Two banking trojans — Emotet and Trickbot — have added support for a self-spreading component to improve their chances of infecting other victims on the same network.   This is something new because until recently, banking trojans didn’t come with self-spreading modules, being focused mainly on remaining […]

Categories
Anti-malware

Broadcom chip bug opened 1 billion phones to a Wi-Fi-hopping worm attack

Wi-Fi chips used in iPhones and Android may revive worm attacks of old.     Dan Goodin – 7/28/2017   LAS VEGAS—It’s not often that a security researcher devises an attack that can unleash a self-replicating attack that, with no user interaction, threatens 1 billion smartphones. But that’s just what Nitay Artenstein of Exodus Intelligence […]

Categories
Anti-malware

Triada Trojan Found in Firmware of Low-Cost Android Smartphones

July 28th 2017  By Catalin Cimpanu   Security researchers have found malware inside the firmware of several low-cost Android smartphones, such as Leagoo M5 Plus, Leagoo M8, Nomu S10, and Nomu S20.   Not all devices of these specific model lines are affected, but only a few, presumably the result of a supply chain compromise […]

Categories
Anti-malware

North Korea Turns Cyber-Attention to Hacking for Profit

28th July 2017  By Tara Seals   North Korea’s gaggle of state hackers appears to have a new objective: Money.   The hermit kingdom’s cadre of cyber-spies—estimated by South Korea to number around 1,700—are working overtime to steal cash from flush targets like international banking systems, according to a report from the South Korean government-backed […]

Categories
Anti-malware

Wallet-snatch hack: ApplePay ‘vulnerable to attack’, claim researchers

Are you using payment system over public Wi‑Fi? By John Leyden 28 Jul 2017     Black Hat USA Security researchers say they have come up with two separate “attacks” against ApplePay, highlighting what they claim are weaknesses in the mobile payment method.   One of the attacks developed by the white hats, and presented […]

Categories
Anti-malware

How machine learning enables your best employees to work 24/7

A recent incent industry report states that artificial intelligence and machine learning have great potential, but can’t yet match the breadth of human intelligence.    By Hal Lonas   While I would argue you can’t have one without the other, meaning humans are an integral part of both AI and machine learning, both of these […]

Categories
Anti-malware

Rurktar Malware: An Espionage Tool in Development

By Ionut Arghire on July 27, 2017   A newly discovered spyware family that appears designed for cyber-espionage is still under development, G DATA security researchers say.   Dubbed Rurktar, the tool hasn’t had all of its functionality implemented yet, but G DATA says “it is relatively safe to say [it] is intended for use […]