News Clipping

APT28 Hackers Caught Hijacking Legitimate LoJack Software [source: bleepingcomputer]

Security researchers have found tainted versions of the legitimate LoJack software that appeared to have been sneakily modified to allow hackers inside companies that use it. Researchers say domains found inside the tainted LoJack instances have been previously tied to other hacking operations carried out by APT28, a codename used to describe a nation-state-backed cyber-espionage group located in Russia, with ties to the company’s military intelligence. APT28...

Read More


Dangers of Public WiFi: What You Need to Know [source: cloudwards]

Free WiFi is available nearly everywhere these days, giving us the ability to work remotely in hotels, coffee shops, restaurants and public parks. It’s convenient and liberating, but potentially unsafe. Connecting to a public network requires little authentication — at best you’ll be greeted by a captive portal and have to check a box agreeing to the terms of service (ToS), or ask an employee for the...

Read More


GandCrab Ransomware V2 Released With New .Crab Extension [source: bleepingcomputer]

Last week, security firm Bitdefender, the Romanian Police, and Europol allegedly gained access to the GandCrab Ransomware’s Command & Control servers, which allowed them to recover some of the victim’s decryption keys. This allowed Bitdefender to release a tool that could decrypt some victim’s files. After this breach, the GandCrab developers stated that they would release a second version of GandCrab that included a more secure command & control server in order...

Read More


Flaw in Microsoft Outlook Lets Hackers Easily Steal Your Windows Password [source: thehackernews]

A security researcher has disclosed details of an important vulnerability in Microsoft Outlook for which the company released an incomplete patch this month—almost 18 months after receiving the responsible disclosure report. The Microsoft Outlook vulnerability (CVE-2018-0950) could allow attackers to steal sensitive information, including users’ Windows login credentials, just by convincing victims to preview an email with Microsoft Outlook, without requiring any additional user interaction. The...

Read More


Hacker Can Steal Data from Air-Gapped Computers [source: thehackernews]

Do you think it is possible to extract data from a computer using its power cables? If no, then you should definitely read about this technique. Researchers from Israel’s Ben Gurion University of the Negev—who majorly focus on finding clever ways to exfiltrate data from an isolated or air-gapped computer—have now shown how fluctuations in the current flow “propagated through the power lines” could be...

Read More


Page 50 of 123« First...102030...4849505152...607080...Last »