Malicious - Свежие новости [ Фото в новостях ] | |
Leveraging Blockchain for Authentic Online Reviews
Online reviews for products and services are an imperative piece of information for consumers to determine the value provided. However, with suppliers across the board inflating reviews with incentivized ratings, consumers are often misinformed and deceived into agreeing to inferior and potentially malicious offers. дальше »
2019-10-11 16:20 | |
Cybercriminals are targeting healthcare companies with phishing campaigns to steal sensitive data
Healthcare providers are facing an unprecedented level of social engineering-driven malware threats, according to new research. The findings — disclosed by California-based enterprise security solutions provider Proofpoint US — discovered at least 77 percent of email attacks on the medical sector during the first three months of 2019 involved the use of malicious links. дальше »
2019-10-9 19:00 | |
Chinese hacking group targets Southeast Asian governments with data-stealing malware
A threat group responsible for a series of malware-based espionage attacks in Singapore and Cambodia has been increasingly targeting the Southeast Asian government sector to steal confidential data, new research indicates. дальше »
2019-10-2 15:08 | |
Adware campaign exploits Chrome and Safari bugs to serve over 1B malicious ads
Threat actors have exploited “obscure” bugs in WebKit and Chrome browsers to serve over 1 billion malicious ads in less than two months, a new research has found. The attackers targeted iOS and macOS users with zero-day vulnerabilities in Chrome and Safari browsers that bypassed built-in security protections to show potential victims intrusive pop-up ads, and redirect users to malicious sites. дальше »
2019-10-2 09:16 | |
Ethereum smart contract FairWin’s account drained as critical vulnerabilities raise the question of a malicious attack
Dubbed by many the fastest growing Ponzi scheme on Ethereum, the smart contract FairWin has emptied its account, according to data from Etherscan. Just a few days ago, the account possessed almost 50,000 ETH (~$9 million). дальше »
2019-10-1 15:00 | |
172 malicious apps with 335M+ installs found on Google Play
Google desperately needs to curb the spread of Android malware. In September alone, researchers uncovered a total of 172 infected apps on the Play Store. The worst part? These apps had racked up over 335 million installs by the time they were detected by security experts. дальше »
2019-10-1 14:43 | |
Mobile malware campaign targeting Uyghur Muslims impacted Tibetans too
The mobile malware campaign targeting the Uyghur Muslim minority in China was also directed at senior members of Tibetan groups, according to new research. The details — disclosed by University of Toronto’s Citizen Lab and TechCrunch — reveal that the targets were sent specifically tailored malicious web links over WhatsApp, which, when opened, exploited browser vulnerabilities on iOS and Android devices to install spyware, and surreptitiously stole private and sensitive information. дальше »
2019-9-25 11:36 | |
2 malware-infected photo apps with 1.5M+ downloads removed from Google Play
Google has removed two malicious apps with a combined total of over 1. 5 million downloads after they were caught serving adware. The apps in question — Sun Pro Beauty Camera and Funny Sweet Beauty Selfie Camera — were also found to have “more advanced functionality than your average adware,” according to researchers at Wandera. дальше »
2019-9-23 09:00 | |
Власти США ввели санкции против хакеров из Северной Кореи
Минфин США ввел санкции против хакеров из Северной Кореи. Их обвиняют в краже $2 млрд у биткоин-бирж и банков. Treasury sanctions North Korean state-sponsored malicious cyber groups https://t.co/0CT8WltVCl — Treasury Department (@USTreasury) September 13, 2019 В документе говорится о трех крупных хакерских группировках — Lazarus, Bluenoroff и Andariel. По данным Управления по контролю над иностранными […] дальше »
2019-9-17 10:26 | |
Hacker Steals 30,000 EOS by Exploiting a Gambling dApp
Any cryptocurrency network and its underpinning code are subject to malicious intervention. This is especially true when it comes to smart contracts. Numerous projects offer this functionality, which exposes all of them to potential hacks and theft. дальше »
2019-9-15 01:59 | |
US sanctions against 3 North Korean cyber groups accused of targeting financial institutions and crypto exchanges
The US shares a complicated relationship with North Korea and it is getting, even more, complex. The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced on Friday, sanctions against three North Korean hacking groups accused of attacking important institutions, malicious cyber-attacks and stealing millions from cryptocurrency exchanges to financial institutions. дальше »
2019-9-14 13:00 | |
Litecoin Hashrate Down 40%: Are Miners Leaving LTC?
The Litecoin hashrate has dropped precipitously, suggesting that fewer miners are securing the network, and potentially exposing it to malicious agents. Data from BitInfoCharts indicate that the Litecoin hashrate has dropped by nearly 40% from mid-July. дальше »
2019-9-11 18:42 | |
Apple claps back at Google for spreading FUD in iOS exploit report
It was just last week that we covered a report by Google‘s Project Zero security researchers claiming they’d identified a malware campaign targeting iPhones for “at least two years. ” When successful, the exploit chain allowed iPhones to be compromised with no interaction from the user beyond visiting a malicious website. дальше »
2019-9-7 23:09 | |
Hackers are now attacking Android users with advanced SMS phishing techniques
Researchers have uncovered a new kind of “advanced” phishing attack targeting Android phones that can trick users into installing malicious settings on their devices that are disguised as innocuous network configuration updates. дальше »
2019-9-4 16:00 | |
Bitcoin Cash Network Experiences Significant Problems From a $290 Attack
A recently reported attack on the Bitcoin Cash network is causing a lot of confusion among the community. Some bizarre goings on with BCH transactions are raising questions about its viability as an alternative method of finance. дальше »
2019-9-4 15:00 | |
iPhone spyware campaign reportedly targeted Uyghur Muslims for 2 years
The data-stealing iPhone exploits detailed by Google last week may been used for state-sponsored campaigns targeting the Uyghur Muslim minority in China‘s autonomous region of Xinjiang. “The websites were part of a campaign to target the religious group by infecting an iPhone with malicious code simply by visiting a booby-trapped web page,” TechCrunch revealed, citing sources familiar with the matter. дальше »
2019-9-2 08:45 | |
Contradicting Reports Emphasize The Rise And Fall Cryptojacking
Following reports that the alleged Capital One hacker was using servers to mine crypto, cryptojacking is on the tip of the space's tongue. Unfortunately, there seems to be a bit of confusion as to how prevalent cryptojacking is, with a recently released study from McAfee Labs and information from the cybersecurity firm Bad Packets suggesting malicious miners are both on the rise and experiencing a downward trend. дальше »
2019-8-31 19:53 | |
Google researchers reveal data-stealing, web-based iPhone exploit that was active for years
Researchers from Google have uncovered what appears to be a concentrated malware campaign targeting iPhones for at least two years. Thankfully, this may be over now, although they warn it’s possible there are others that are yet to be seen. дальше »
2019-8-30 10:02 | |
The Dawn of Hybrid Layer 2 Protocols
Special thanks to the Plasma Group team for review and feedback Current approaches to layer 2 scaling - basically, Plasma and state channels - are increasingly moving from theory to practice, but at the same time it is becoming easier to see the inherent challenges in treating these techniques as a fully fledged scaling solution for Ethereum. дальше »
2019-9-2 04:03 | |
Cybersecurity vendor that protects firms from data breaches hit by data breach
You know it’s a bad day for cybersecurity when a leading provider of internet firewall services that helps safeguard websites from malicious attacks suffers from a security breach of its own. Imperva, a popular California-based security vendor, disclosed that data belonging to an unspecified subset of users of its cloud firewall product was exposed online. дальше »
2019-8-28 14:58 | |
Malware found in CamScanner’s document scanning Android app, which has over 100M downloads
Another day, another instance of Android malware found on the Google Play app store. Researchers from Kaspersky Lab said they found an app with 100 million downloads that housed a malicious module that then pushed ads or downloaded apps surreptitiously onto compromised Android devices. дальше »
2019-8-28 10:07 | |
Ransomware Syrk Finds Victims In Fortnite Players
Presenting itself as an app to help players cheat at the online battle royale game Fortnite, Syrk encrypts files on a user’s hard drive and demands a ransom paid in crypto. If the ransom is not paid, the malicious software begins deleting files one by one. дальше »
2019-8-28 18:50 | |
Programmer Discovers Cryptojacking Malware on GitHub
Juskoljo, a GitHub user who has eight repositories on the platform, has discovered malicious cryptojacking malware in 11 code libraries for the Ruby programming language. The libraries containing the deadly malware have reportedly been downloaded nearly four thousand times, according to reports on August 21, 2019. дальше »
2019-8-23 23:00 | |
Cryptojacking malware found in 11 RubyGem language repositories
Malware designed to surreptitiously infect victims’ computer systems and mine cryptocurrency on behalf of hackers has been found in 11 code libraries on programming language manager RubyGems. Hackers exploited RubyGems – a package manager for the Ruby programming language that devs use to upload and distribute new versions of software – by downloading Ruby libraries, adding the malicious code, and re-uploading them under new names Decrypt reports. дальше »
2019-8-22 10:20 | |
iOS 12.4 makes it possible to jailbreak your iPhone again
Apple’s most recent iOS update — 12. 4 — has reopened a vulnerability that was previously patched, making it easy to jailbreak iPhones and iPads. As reported by Motherboard, hacker Pwn20wnd exploited the flaw to release a public version of the jailbreak on Monday, making it the first time an up-to-date firmware has been unlocked in years. дальше »
2019-8-20 10:20 | |
Why Litecoin is more secure than Bitcoin Cash and Bitcoin SV
Charlie Lee announced that Litecoin controls 98 percent of the hash rate for its “Scrypt” mining algorithm. This dominance is critical for the security of LTC. Meanwhile, other coins which have minority control over their algorithm, such as Bitcoin Cash and Bitcoin SV, remain at high risk of malicious attack. дальше »
2019-8-19 11:02 | |
Hostile mining attacks on minority hash power coins
Charlie Lee announced that Litecoin controls 98 percent of the hash rate for its “Scrypt” mining algorithm. This dominance is critical for the security of LTC. Meanwhile, other coins which have minority control over their algorithm, such as Bitcoin Cash and Bitcoin SV, remain at high risk of malicious attack. дальше »
2019-8-20 11:02 | |
Litecoin users on Binance fell victim to a dusting attack—here’s how to prevent it from happening to you
Litecoin users on Binance fell victim to a large scale dust attack earlier this week, alarming the crypto community about this new type of malicious attack. While they’re not nearly as dangerous as phishing, knowing what dust attacks are can help people protect themselves and their crypto assets from danger. дальше »
2019-8-16 02:43 | |
PSA: Update your Windows machine now to fix 29 Critical security vulnerabilities
Microsoft has patched four serious vulnerabilities that could allow a malicious actor to remotely take control of Windows computers. The four remote code execution flaws — addressed as part of the company’s monthly Patch Tuesday updates — affect all in-support versions of Windows and concern the Windows Remote Desktop Services (RDS) component, enabling attackers to take over a computer and then propagate malware to other computers without any user intervention. дальше »
2019-8-14 14:35 | |
Litecoin Witnesses a Dusting Attack, Perpetrators Trying to Deanonymize Users
Litecoin has recently been targeted by malicious actors who have sought to break on-chain privacy through a dusting attack. As explained by Binance Vision, the education wing of the exchange, a dusting attack occurs when hackers send dust (an amount below the current average fee) to the personal account of a user and track itRead MoreRead More. дальше »
2019-8-11 01:00 | |
Large Scale Dusting Attack On Litecoin (LTC) Users: Binance
A large scale dusting attack has been suffered by Litecoin users, reported Binance on August 10. A dusting attack is a new kind of malicious activity where scammers and hackers try and break the privacy of the cryptocurrency users by sending tiny amounts of coins to their personal wallets. Attackers track down the transaction activity […] дальше »
2019-8-10 20:23 | |
Binance KYC Photos Data Breach “False” But Exchange Investigates, Hacker Demands 300 BTC
A malicious hacker claims to have released Binance exchange customer data and that there’s more to come unless millions of dollars in bitcoin (BTC) is handed over. Binance has issued a statement denying that it... дальше »
2019-8-7 13:05 | |
New Android ‘sex simulator’ ransomware spreads via SMS messages
If you’re using an Android phone, there’s a new family of ransomware attack that leverages SMS to spread, according to new research from Slovakia-based cybersecurity firm ESET. The ransomware — referred to as Android/Filecoder. дальше »
2019-7-31 14:19 | |
Google researchers disclose ‘interactionless’ iOS exploits valued at $5M
A duo of Google bug-hunting researchers have disclosed several ed details for only five out of the six bugs found, ZDNet reports. Four out of these bugs can lead to the execution of malicious code on remote iOS devices, without any significant user interaction. дальше »
2019-7-30 13:19 | |
Cloud Computing Attacks On The Rise As Desktop Mining Malware Falls In Popularity
A study from Skybox Security suggests that malicious crypto miners are now focused on attacking faults in cloud computing containers as the popularity of desktop crypto mining malware steadily falls off. дальше »
2019-7-24 19:11 | |
Android vulnerability lets hackers hijack your phone with malicious videos
If you use a phone running any version of Android between 7. 0 and 9. 0 (Nougat, Oreo, or Pie), you ought to immediately install the latest security update – or risk getting your handset hijacked by devious video malware. дальше »
2019-7-24 17:07 | |
Vicious malware threatens to turn search engine into crypto-mining zombie botnet
Enterprise search engine Elasticsearch is under threat of being turned into a sophisticated cryptocurrency mining botnet to be used in distributed denial of service (DDoS) attacks. Cybersecurity firm Trend Micro describes a new malware strain that launches multi-stage attacks on publicly accessible databases and servers that run old versions of Elasticsearch software. дальше »
2019-7-23 17:54 | |
QuickBit Inadvertently Leaks 300K Customer Records
Swedish crypto exchange QuickBit reportedly left up to 300,000 customer records open "for a few days," leaving a plethora of information, including email addresses, passwords, names, and user IDs, exposed to malicious actors. дальше »
2019-7-23 19:04 | |
It’s 2019 and Google still can’t keep malware out of its Android app store
Google appears to have a problem with stopping malicious apps from sneaking into the Play Store. In what appears to yet another case of malware disguised as a legitimate app, security researchers from Symantec have found a new app that advertised itself as an unofficial version of Telegram messaging app — only to push malicious websites in the background. дальше »
2019-7-16 14:40 | |
Radware’s Cloud Workload Protection Service now includes ‘crypto-jacking’ detection
CryptoNinjas - Bitcoin, Cryptocurrency & Blockchain Asset SourceRadware, a leading provider of cybersecurity and application delivery solutions, today announced that its Cloud Workload Protection Service now identifies and mitigates coin-mining malware known as ‘crypto-jacking’ operations taking place in customers’ public cloud environments. дальше »
2019-7-16 14:31 | |
Zoom’s scary webcam flaw also affects RingCentral and Zhumu
Last week, video conferencing app Zoom had to make a major change to its service to fix a frightening webcam vulnerability. But new evidence disclosed by security researcher Karan Lyons shows that other conferencing apps like RingCentral and Zhumu are susceptible to the same issue. дальше »
2019-7-16 09:22 | |
Bitpoint Suffers $32 Million Hack
Japanese crypto exchange Bitpoint announced it has been hit by a major hack, with malicious actors stealing $32 million worth of five different cryptocurrencies. A majority of the stolen funds were taken from the platform's users, with just over a quarter of the amount stolen from the exchange itself. дальше »
2019-7-12 18:58 | |
Firefox Quantum now comes with curated extensions and a Reader dark mode
Mozilla today announced a fresh update for Firefox Quantum, which focuses heavily on offering a editorially-driven approach to extensions, as well as a gorgeous new dark mode for Firefox Reader. дальше »
2019-7-9 16:04 | |
AmaZix launches blacklist of Telegram users for crypto and blockchain projects
AmaZix, a blockchain advisory firm, today launches the first global blacklist of Telegram users. It gives any Telegram group the benefit of free protection against users posting malicious content, as well as access to its blacklist of over 54,000 banned users, a list that is administered in real-time by AmaZix’s 24-7 team of channel moderators. […] дальше »
2019-7-3 17:55 | |