Malicious - Свежие новости [ Фото в новостях ] | |
Gmail Reveals Details of its Battle with Coronavirus-Related Spam
Google has been battling scammers and hackers targetting people via email and app exploits for years. Earlier last week Google had to remove 49 malicious Chrome extensions that contained cryptocurrency-data stealing malware. дальше »
2020-4-21 04:10 | |
Google Takes Down Malicious Chrome Extensions that Steal Cryptocurrency Wallet Credentials
Google has done a little spring cleaning in its Chrome Web Store leading to the removal of a swath of malicious cryptocurrency-stealing app extensions in a single sweep. The internet giant has shut down 49 malicious Chrome extensions from the app marketplace. дальше »
2020-4-17 00:10 | |
Sneaky Android Malware Camouflaged in Kids’ Apps Committing Ad Fraud
The Google Play Store has found itself in yet another malicious app scandal. This time, researchers have found a new malware nesting in several apps available on the marketplace. Researchers from cybersecurity firm Check Point revealed in a recent blog post that they conducted an extensive search across the Play Store that yielded the discovery […] The post Sneaky Android Malware Camouflaged in Kids’ Apps Committing Ad Fraud appeared first on BeInCrypto. дальше »
2020-3-27 06:15 | |
Telegram users can now use PolySwarm’s free malware detection bot to guard against threats
PolySwarm, a crowd-sourced cyber threat detection platform, announced today that Telegram users and channel mods can now use a free tool called the Scanbot – to stay protected from malicious content. дальше »
2020-3-25 20:28 | |
Vimeo Steps in to Protect Users from Targeted Ransomware Attacks
Vimeo, one of the most popular video-sharing platforms, has announced that several user accounts are at risk of being compromised by malicious actors. Online news media The Register reported that one of their readers had gotten a notification from Vimeo that his account had been inappropriately accessed by a third-party and frozen as a result. дальше »
2020-3-19 04:10 | |
Hackers are Using Coronavirus Maps to Spread Malware
Online security researchers warn that hackers have found another way to use the coronavirus outbreak — by infecting people through malicious coronavirus maps. Hackers have been using the fear of the coronavirus to spread an infection of their own in the form of malware that has been discovered within coronavirus tracking maps. дальше »
2020-3-18 02:10 | |
Foul Play? OKEx CEO Blames Competing Crypto Platforms for Recent DDoS Attacks
This past Friday, top cryptocurrency trading platforms Bitfinex and OKEx were both subjected to malicious Distributed Denial-of-Service attacks (DDoS) aimed at disrupting the platforms’ operational efficiency by overwhelming the targeted servers with a flood of fraudulent traffic. дальше »
2020-3-6 01:35 | |
Scammers Used Janet Jackson’s Billionaire Ex In Crypto Ads; He’s Now Suing Facebook
Wissam Al Mana, the Qatari billionaire who has been married to Janet Jackson, is suing Facebook for promoting a crypto scam that used his image. He claims false advertising, malicious falsehood and defamation by a crypto firm that hasn’t been named yet. дальше »
2020-2-25 19:46 | |
DeFi Platform bZx Says Lenders Unaffected by Recent Incident
Decentralized finance (DeFi) protocol bZx has clarified reports of lost funds from a malicious exploit of its Fulcrum trading platform stating that lenders were not affected by the incident. Friday’s protocol exploit has meanwhile ignited some debate over the degree of decentralization in DeFi products. дальше »
2020-2-17 18:00 | |
SecureBrain joins the PolySwarm decentralized cyber threat intel marketplace
PolySwarm, a crowd-sourced marketplace for threat intelligence and malware detection, has announced SecureBrain Corporation as its latest threat detection partner. SecureBrain’s threat detection technology will be active on PolySwarm starting this month February, detecting threats and helping users get determinations on potentially malicious files and URLs. дальше »
2020-2-10 14:06 | |
US Lawmakers Seeking to Ban Companies From Using End-to-End Encryption With a New Draft Bill
US lawmakers and the Department of Justice are looking to ban end-to-end encryption, making Internet users vulnerable to a host of attacks on their privacy from both malicious hackers and from the government. дальше »
2020-2-6 21:24 | |
Monero's ex-lead maintainer asserts Trezor prone to 'glitching attacks'
Over the years, breaching attacks in the cryptocurrency industry has made headlines. Even established platforms had their security compromised at the hands of malicious attackers. But with the rising The post Monero's ex-lead maintainer asserts Trezor prone to 'glitching attacks' appeared first on AMBCrypto. дальше »
2020-2-3 02:00 | |
Crypto Ransomware Paralyzes California School District
A crypto ransomware attack shut down the Mountain View-Los Altos school district servers and phone system on Wednesday. The malicious software demanded Bitcoin as ransom to restore service. District Operations Have Been Frozen By shutting down file access on the district’s servers, the crypto ransomware has created tremendous problems for teachers and administrators. дальше »
2020-2-2 22:00 | |
Hackers Insert Monero (XMR) Mining Script in Late Basketball Great Kobe Bryant’s Wallpaper
A hidden cryptocurrency mining malware was found in a wallpaper of late basketball player Kobe Bryant, reported the security intelligence unit of technology giant Microsoft on Jan. 31st. Microsoft Security Intelligence tweeted that cybercriminals are taking advantage of the tragedy of Bryant’s tragic death “as expected” by running a malicious HTML file in the late […] дальше »
2020-2-1 22:37 | |
Hackers Embed Crypto Mining Script in Late Kobe Bryant’s Wallpaper
Cybercriminals are reportedly exploiting the death of former basketball star Kobe Bryant, by preying on the sentiments of unsuspecting victims looking to download images of the late sports legend. Microsoft’s security team recently found a malicious crypto-mining script embedded in the wallpaper of late Kobe Bryant. дальше »
2020-2-1 22:00 | |
Cybercriminals Hide Crypto Mining Script Behind Kobe Bryant Wallpaper
Cybercriminals have been capitalizing on fans’ grief by hiding malicious coin mining scripts in Kobe Bryant desktop wallpaper
дальше »2020-2-1 13:22 | |
Uncovering the Motives Behind North Korea’s Crypto Conference
Experts warn not to attend North Korea’s upcoming crypto conference, saying the intentions behind the event are malicious
дальше »2020-1-18 00:52 | |
PayPal Rewards Hacker Who Discovers Its Vulnerability
Coinspeaker PayPal Rewards Hacker Who Discovers Its VulnerabilityAccording to PayPal’s summary of the problem, if users had entered their PayPal credentials after following a login link from a malicious site, hackers could have completed the security challenge on their own and got hold of users' passwords. дальше »
2020-1-11 15:06 | |
Fake Ledger Chrome Extension Causes Major Problems
It appears that there are a fair few of malicious Chrome extensions out there. Albeit Google removed two of them, a new fake offering claiming to be a Ledger product has shown up. Ledger is one of the most popular hardware wallet manufacturers in the world. дальше »
2020-1-3 01:30 | |
Ethereum network survives malicious attack, but raises serious security concerns
The Ethereum (ETH) blockchain survived what appeared to be an intentional attack on December 31, which reportedly came very close to bringing down the entire network. Liam Aharon, an Australia-based blockchain developer, confirmed that the attack exploited a software glitch in a widely-used Ethereum client, called Parity. дальше »
2020-1-2 13:59 | |
The ShitCoin Wallet Browser Extension Injects Malicious JavaScript Code
Cryptocurrency users are often the victim of malicious software. One particular browser extension, known as ShitCoin Wallet, needs to be avoided at all cost. With a name such as ShitCoin Wallet, it is rather apparent nothing good will come of it. дальше »
2020-1-1 02:00 | |
Taylor Swift Photo Hides Malicious Crypto-Mining Code
Concealed crypto mining – using infected computers to produce hashes for specific types of coins – is using more ingenious methods to hide from operating systems. The latest exploit involves an infected image of Taylor Swift. дальше »
2019-12-19 15:57 | |
Developer says $340M of collateral in MakerDAO could have been easily wiped out
The Maker Foundation is introducing a new security proposal after a well-known software engineer revealed that a malicious actor with enough Maker (MKR) could steal all of the collateral in MakerDAO, taking with him over $340 million. дальше »
2019-12-11 02:50 | |
Monero Website Hacked as Key-Stealing Wallet Was Uploaded
Monero’s official website appears to have been hacked this week. Malicious actors were able to upload a compromised version of Monero’s Command Line Interface wallet that sent private keys to an external server. дальше »
2019-11-22 17:20 | |
Visa’s Latest Blockchain Solution Protects Permissioned Ledgers Against Malicious Actors
Visa unveiled its newest innovation this week: a trusted execution environment (TEE) that can help induce a fair and just computational layer that maintains privacy and wards off bad actors. According to Ledger Insights, there are a wide range of use cases for this that can help improve customer privacy without affecting process efficiency, NovemberRead MoreRead More. дальше »
2019-11-19 22:00 | |
Oleg Tinkov “shills” crypto
Big Russian-American businessman Oleg Tinkov, the head of Tinkoff Bank, posted a lengthy post on Facebook with malicious attacks on the blockchain and cryptocurrencies. The reason is obvious difficulties in the implementation of the Libra and TON (Gram) projects. дальше »
2019-10-21 21:20 | |
Zcash (ZEC) Warns Users Against a Malicious Copy Of The Native ZecWallet In GitHub
The Zcash Community is among the latest projects within the crypto industry to be targeted by scammers creating duplicate wallets. Officials from Zcash made it public that they had detected a malicious software operating as a ZecWallet. дальше »
2019-10-21 20:28 | |
Bitcoin theft carried out for 3 years via malware-infected Tor Browser
A malware-laden unofficial version of Tor Browser was being used by hackers to spy on Bitcoin users and steal their crypto. This compromised version of the privacy-focused Tor Browser was loaded with malicious tools which helped criminals to steal small amounts of Bitcoin since 2017 when the victims tried to pay on darknet websites. дальше »
2019-10-19 19:00 | |
Fake Russian Tor Browser Wants Your Bitcoin and QIWI Funds
Seeking online privacy is both easy and difficult in this day and age. It is almost impossible to do so without utilizing a third-party solution. For some, that solution is a VPN, whereas others use the Tor Browser. дальше »
2019-10-19 01:59 | |
Hackers Are Distributing a Vulnerable Tor Browser Version to Spy and Steal User’s Bitcoin
The researchers of the IT security company ESET have recently discovered a new way that hackers use to invade people’s computers. According to them, several hackers have been distributing a malicious version of the Tor Browser, which is generally used to access the deep web or to browse incognito. This malicious version, however, is set […] дальше »
2019-10-19 01:13 | |
Sucuri Discovers Fake WordPress Plugins Privately Mining Cryptocurrencies
The researchers of Sucuri just discovered a new threat that affects WordPress users. According to them, new malicious plugins for WordPress are appearing at a fast rate. These plugins are exploiting an issue by running the Linux binary code. дальше »
2019-10-19 22:51 | |
BlackBerry’s Cylance: Malicious Code Used By Hackers In WAV Audio Files To Mine Cryptos
Researchers of BlackBerry Cylance – a software company that creates anti-virus programs, uncovered a malicious code used by hackers to mine digital currencies in WAV audio files. Each WAV file was combined with a loader part for decoding and executing the infected content while subtly work through the data of the audio file. At the […] дальше »
2019-10-18 18:26 | |
Researchers find fake WordPress plugins that secretly mine cryptocurrency
Researchers have discovered several malicious WordPress plugins that are being used to surreptitiously mine cryptocurrency by running Linux binary code. According to the researchers at website security company Sucuri, the plugins are also being used to maintain access to compromised servers. дальше »
2019-10-18 17:24 | |
Fake Russian Tor browser purloins $40,000 in Bitcoin from dark web shoppers
Researchers from cybersecurity firm ESET have uncovered a malicious version of the Tor browser – the program used to access the dark web – and it’s been stealing user‘s Bitcoin. According to ESET, the bad actors were able to steal more than $40,000 worth of Bitcoin. дальше »
2019-10-18 14:04 | |
New cryptomining malware uses WAV audio files to conceal its tracks
A new campaign discovered by security researchers shows that cybercriminals are hiding malware inside WAV audio files. This technique of obfuscating malicious code in plain sight — a method called steganography — was uncovered by BlackBerry’s cybersecurity subsidiary Cylance. дальше »
2019-10-17 14:00 | |
Cryptojacking worm uses Docker to infect over 2,000 systems to secretly mine Monero
Researchers have uncovered the first instance case of a cryptojacking worm that propagates via malicious Docker images, according to Palo Alto Networks’ threat intelligence team Unit 42. Dubbed “Graboid,” the worm infects compromised hosts with malware that covertly abuses the systems to mine privacy-focused cryptocurrency Monero before randomly spreading to the next target. дальше »
2019-10-16 16:03 | |
‘Save Yourself’ sextortion campaign targets 27 million victims in their inboxes
A well-established botnet and malware agent is now engaged in a new large-scale sextortion campaign by acting as a spambot to target innocent recipients. According to Check Point Research, the creators of the Phorpiex (aka Trik) botnet added this revenue generation ability to trick victims into transferring more than 11BTC (~$89,370) to the threat actors’ wallets over the course of five months. дальше »
2019-10-16 16:00 | |
Microsoft rolls out Windows Tamper Protection for Windows antivirus to keep hackers at bay
Microsoft has officially announced the general availability of a new Tamper Protection feature for its Windows Defender Antivirus service. The security feature is essentially meant to thwart any attempts made by cybercriminals to break the real-time anti-malware defenses incorporated in Windows. дальше »
2019-10-15 13:24 | |