web analytics

Fear the Reaper, or Reaper Madness?

Last week we looked at reports from China and Israel about a new “Internet of Things” malware strain called “Reaper” that researchers said infected more than a million organizations by targeting newfound security weaknesses in countless Internet routers, security cameras and digital video recorders (DVRs). Now some botnet experts are calling on people to stop the… Continue reading Fear the Reaper, or Reaper Madness?

Matrix Ransomware Being Distributed by the RIG Exploit Kit

27th October, 2017 By Lawrence Abrams     Malwarebytes security researcher Jérôme Segura discovered that Matrix Ransomware is now being distributed through the RIG exploit kit on hacked sites.   The Matrix Ransomware was first released at the end of 2016 and we covered it back in April 2017. Since then the ransomware had slowly fizzled out until yesterday’s… Continue reading Matrix Ransomware Being Distributed by the RIG Exploit Kit

2 Million Tarte Cosmetics Users Exposed in Latest Misconfig

27th October, 2017 By Tara Seals   Popular cruelty-free brand Tarte Cosmetics, found online and at major retailers like Sephora and Ulta, has become the latest company to misconfigure a database (actually two), exposing personal information for nearly two million customers to ransom specialists CRU3LTY.   The CRU3LTY cyber-criminal group specializes in finding unsecured databases,… Continue reading 2 Million Tarte Cosmetics Users Exposed in Latest Misconfig

Hackers Can Steal Windows Login Credentials Without User Interaction

27th October, 2017  By Catalin Cimpanu     Microsoft has patched only recent versions Windows against a dangerous hack that could allow attackers to steal Windows NTLM password hashes without any user interaction.   The hack is easy to carry out and doesn’t involve advanced technical skills to pull off. All the attacker needs to… Continue reading Hackers Can Steal Windows Login Credentials Without User Interaction

The iOS privacy loophole that’s staring you right in the face

And people wonder why I will stick with my Samsung 2100 and will never have a smart phone.   27th October, 2017  By Lisa Vaas     Ever use your iPhone or iPad to access social media while you’re in the bathroom?   Of course you have. But you might not have realized that you… Continue reading The iOS privacy loophole that’s staring you right in the face

Remember That Mega T-Mobile Data Exposure? The Company Starts Alerting Victims of “SIM Hijacking”

27th October, 2017  By Rafia Shaikh     We reported earlier this month a bug on T-Mobile website that enabled hackers to access personal user data with nothing but the subscriber’s phone number. The company had said it fixed the bug and that it didn’t affect anyone. T-Mobile has now alerted its customers who were… Continue reading Remember That Mega T-Mobile Data Exposure? The Company Starts Alerting Victims of “SIM Hijacking”

Please don’t buy this: smart locks

Personally I am against Amazon’s latest idea of delivering your parcels into your house as well using a key, this article explains why.   October 26, 2017 By William Tsing     We all like buying the latest and greatest tech toy. It’s fun to get new and novel features on a product that used… Continue reading Please don’t buy this: smart locks

Sage: Innovative Ransomware with Style

October 26, 2017  By Tara Seals   A revised version of the Sage ransomware has hit the scene, earning style points with a bright user interface and interactive ransom note.   “In stark contrast to the drab payment sites used by many ransomware varieties, Sage presents users with a colorful, accessible and descriptive site,” said… Continue reading Sage: Innovative Ransomware with Style

Google Chrome 62.0.3202.75 Stable

Google Chrome 62.0.3202.75 Stable Release notes:https://chromereleases.googleblog.com/   x86http://redirector.gvt1.com/edgedl/release2/chrome/AMpShQFtxIFp_62.0.3202.75/62.0.3202.75_chrome_installer.exehttps://redirector.gvt1.com/edgedl/release2/chrome/AMpShQFtxIFp_62.0.3202.75/62.0.3202.75_chrome_installer.exehttp://dl.google.com/release2/chrome/AMpShQFtxIFp_62.0.3202.75/62.0.3202.75_chrome_installer.exehttps://dl.google.com/release2/chrome/AMpShQFtxIFp_62.0.3202.75/62.0.3202.75_chrome_installer.exehttp://www.google.com/dl/release2/chrome/AMpShQFtxIFp_62.0.3202.75/62.0.3202.75_chrome_installer.exehttps://www.google.com/dl/release2/chrome/AMpShQFtxIFp_62.0.3202.75/62.0.3202.75_chrome_installer.exe x64http://redirector.gvt1.com/edgedl/release2/chrome/AMLQ1tg4WwHQ_62.0.3202.75/62.0.3202.75_chrome_installer.exehttps://redirector.gvt1.com/edgedl/release2/chrome/AMLQ1tg4WwHQ_62.0.3202.75/62.0.3202.75_chrome_installer.exehttp://dl.google.com/release2/chrome/AMLQ1tg4WwHQ_62.0.3202.75/62.0.3202.75_chrome_installer.exehttps://dl.google.com/release2/chrome/AMLQ1tg4WwHQ_62.0.3202.75/62.0.3202.75_chrome_installer.exehttp://www.google.com/dl/release2/chrome/AMLQ1tg4WwHQ_62.0.3202.75/62.0.3202.75_chrome_installer.exehttps://www.google.com/dl/release2/chrome/AMLQ1tg4WwHQ_62.0.3202.75/62.0.3202.75_chrome_installer.exe   Google Chrome Enterprise  x86https://enterprise.google.com/chrome/chrome-browser/thankyou.html?platform=win32msi x64https://enterprise.google.com/chrome/chrome-browser/thankyou.html?platform=win64msi MAC https://enterprise.google.com/chrome/chrome-browser/thankyou.html?platform=mac Linux https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.debhttps://dl.google.com/linux/direct/google-chrome-stable_current_x86_64.rpm     Take a look at the best antivirus, anti-malware, anti-spy, etc. software Powered by WPeMatico

Bug in Mobile App Lets Hackers Take Control of LG Smart Devices

October 26, 2017  By Catalin Cimpanu     LG Electronics has avoided a security disaster this summer after it worked with security researchers to patch a vulnerability in the mobile app that customers are using to control a breadth of LG smart home devices.   The vulnerability affects the LG SmartThinQ app used to control… Continue reading Bug in Mobile App Lets Hackers Take Control of LG Smart Devices