Author Archives: admin

Symantec CEO: Get Commercial Software Off National Security Systems

He makes an extremely good point.   September 20, 2017 By Joseph Marks   The biggest security vulnerability in U.S. national security computer systems may be the commercial software they’re built on, Symantec’s CEO Greg Clark said Wednesday.   The … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Symantec CEO: Get Commercial Software Off National Security Systems

Malware Uses Security Cameras With Infrared Capabilities to Steal Data

By Catalin Cimpanu   Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators. Named aIR-Jumper, the malware … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Malware Uses Security Cameras With Infrared Capabilities to Steal Data

Russian Authorities Announce Takedown of RAMP Dark Web Marketplace

September 19, 2017 By Catalin Cimpanu   Russian police acknowledged today that they were responsible for taking down RAMP [Russian Anonymous Marketplace] — a Tor-based market that primarily sold drugs — a Russian Interior Ministry official told Russian news agency … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Russian Authorities Announce Takedown of RAMP Dark Web Marketplace

How to go ‘Incognito’ on your web browser, and what it means

Just don’t confuse incognito mode with “true” privacy!   September 19, 2017 By David Bisson     Internet Explorer, Firefox, Chrome, Safari, Opera… these are just some of the web browsers available to today’s internet users. While each browser might … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How to go ‘Incognito’ on your web browser, and what it means

Cybercriminals Start Focusing on CPU Mining Tools – Continue to Hijack Machines for Cryptocurrency M

See Also – First Chrome extension with JavaScript Crypto Miner detected   September 19, 2017 By Rafia Shaikh   “Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold”   With an increasing success and profitability of cryptocurrency, criminals have also … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Cybercriminals Start Focusing on CPU Mining Tools – Continue to Hijack Machines for Cryptocurrency M

Webroot Exec: Partners Should Get Back To Security Basics And Double Down on Backup, Patch Managemen

September 19, 2017 By Michael Novinson   A Webroot vice president urged solution providers to avoid the hype around far-fetched threats and instead focus on defending against vulnerabilities that can be monetized and automated.      The Broomfield, Colo.-based company … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Webroot Exec: Partners Should Get Back To Security Basics And Double Down on Backup, Patch Managemen

Blueborne Vulnerability Can Affect Many Devices

It’s hard to come across a device which is not Bluetooth enabled these days. Therefore the blueborne bug, which exploits a security flaw or weakness in the Bluetooth technology, has the potential to affect millions of devices across the globe. … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Blueborne Vulnerability Can Affect Many Devices

TfL hackathon showed data can keep transport running and people safe

By Danny Bradbury 18 Sep 2017 at 13:19   Security TfL hackathon showed data can keep transport running and people safe Analytics is about the journey AND destination By Danny Bradbury 18 Sep 2017 at 13:19 5 SHARE ▼ Sponsored If software is eating the world, then hackathons … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on TfL hackathon showed data can keep transport running and people safe

FBI Looking for Hacker Terrorizing Montana High Schools

By Catalin Cimpanu   The FBI and Montana law enforcement are looking for a hacker who’s been terrorizing local high schools for the past five days, threatening both students’ families and teachers alike. According to a police statement, an unidentified hacker … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on FBI Looking for Hacker Terrorizing Montana High Schools

Researchers steal bitcoin by exploiting SS7 vulnerabilities

September 18, 2017  By Patrick Howell O’Neill   Hackers have exploited a security weakness in global telecom networks to break into a GMail account, take control of a bitcoin wallet and steal over $4,000 in the cryptocurrency.   Researchers from … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Researchers steal bitcoin by exploiting SS7 vulnerabilities