July 30, 2017 By Catalin Cimpanu BitMixer, the world’s most popular Bitcoin mixing service has announced last weekend it was shutting down operations effective immediately. Bitcoin mixing is a process of taking money from one account and breaking it into hundreds or thousands of smaller transactions to transfer it to another account.… Continue reading Internet’s Largest Bitcoin Mixer Shuts Down Realizing Bitcoin Is Not Anonymous
Month: July 2017
Apple removed iOS VPN apps from Chinese App Store in compliance to censorship law
July 30, 2017 By Pierluigi Paganini In compliance with Chinese Internet monitoring law, Apple has started removing all IOS VPN apps from it App Store in China. The company complies with a request from the Chinese Government that wants to strict censorship making it harder for netizens to bypass the Great Firewall system (aka… Continue reading Apple removed iOS VPN apps from Chinese App Store in compliance to censorship law
Australian police seek the right to install malware on home devices during “emergencies”
By Cory Doctorow July 27th, 2017 The Queensland Police have asked the Australian Parliament to give them the right to covertly install malicious software on your home devices in order to conduct mass surveillance during times of “national emergency” The plan neatly demonstrates the ignorance and indifference of law enforcement to the… Continue reading Australian police seek the right to install malware on home devices during “emergencies”
Banking Trojans Add Self-Spreading Worm Components… Because WannaCry
July 28, 2017 By Catalin Cimpanu Two banking trojans — Emotet and Trickbot — have added support for a self-spreading component to improve their chances of infecting other victims on the same network. This is something new because until recently, banking trojans didn’t come with self-spreading modules, being focused mainly on remaining… Continue reading Banking Trojans Add Self-Spreading Worm Components… Because WannaCry
Broadcom chip bug opened 1 billion phones to a Wi-Fi-hopping worm attack
Wi-Fi chips used in iPhones and Android may revive worm attacks of old. Dan Goodin – 7/28/2017 LAS VEGAS—It’s not often that a security researcher devises an attack that can unleash a self-replicating attack that, with no user interaction, threatens 1 billion smartphones. But that’s just what Nitay Artenstein of Exodus Intelligence… Continue reading Broadcom chip bug opened 1 billion phones to a Wi-Fi-hopping worm attack
Triada Trojan Found in Firmware of Low-Cost Android Smartphones
July 28th 2017 By Catalin Cimpanu Security researchers have found malware inside the firmware of several low-cost Android smartphones, such as Leagoo M5 Plus, Leagoo M8, Nomu S10, and Nomu S20. Not all devices of these specific model lines are affected, but only a few, presumably the result of a supply chain compromise… Continue reading Triada Trojan Found in Firmware of Low-Cost Android Smartphones
North Korea Turns Cyber-Attention to Hacking for Profit
28th July 2017 By Tara Seals North Korea’s gaggle of state hackers appears to have a new objective: Money. The hermit kingdom’s cadre of cyber-spies—estimated by South Korea to number around 1,700—are working overtime to steal cash from flush targets like international banking systems, according to a report from the South Korean government-backed… Continue reading North Korea Turns Cyber-Attention to Hacking for Profit
Wallet-snatch hack: ApplePay ‘vulnerable to attack’, claim researchers
Are you using payment system over public Wi‑Fi? By John Leyden 28 Jul 2017 Black Hat USA Security researchers say they have come up with two separate “attacks” against ApplePay, highlighting what they claim are weaknesses in the mobile payment method. One of the attacks developed by the white hats, and presented… Continue reading Wallet-snatch hack: ApplePay ‘vulnerable to attack’, claim researchers
How machine learning enables your best employees to work 24/7
A recent incent industry report states that artificial intelligence and machine learning have great potential, but can’t yet match the breadth of human intelligence. By Hal Lonas While I would argue you can’t have one without the other, meaning humans are an integral part of both AI and machine learning, both of these… Continue reading How machine learning enables your best employees to work 24/7
Rurktar Malware: An Espionage Tool in Development
By Ionut Arghire on July 27, 2017 A newly discovered spyware family that appears designed for cyber-espionage is still under development, G DATA security researchers say. Dubbed Rurktar, the tool hasn’t had all of its functionality implemented yet, but G DATA says “it is relatively safe to say [it] is intended for use… Continue reading Rurktar Malware: An Espionage Tool in Development