Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

Clarifiying complex chemical processes with quantum computers

Clarifiying complex chemical processes with quantum computers
As you were browsing www.sciencedaily.com something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled JavaScript in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. After completing the CAPTCHA below, y…
Rate this blog entry:
Continue reading
123 Hits
0 Comments

WannaCry Inspires Banking Trojan to Add Self-Spreading Ability

WannaCry Inspires Banking Trojan to Add Self-Spreading Ability
Although the wave of WannaCry and Petya ransomware has now been slowed down, money-motivated hackers and cyber criminals have taken lessons from the global outbreaks to make their malware more powerful.Security researchers have now discovered at least one group of cyber criminals that are attempting to give its banking Trojan the self-spreading worm-like capabilities that made recent ransomware attacks go worldwide.The new version of credential stealing TrickBot banking Trojan, known as "1000029…
Rate this blog entry:
Continue reading
129 Hits
0 Comments

Alexa, Are You Spying On Me? Not Really, Maybe, It's Complex!

Alexa, Are You Spying On Me? Not Really, Maybe, It
Do you own an Amazon Echo?So are you also worried about hackers turning out your device into a covert listening device?Just relax, if there's no NSA, no CIA or none of your above-skilled friends after you.Since yesterday there have been several reports on Amazon Echo hack that could allow a hacker to turn your smart speaker into a covert listening device, but users don’t need to worry because the hack is not simple, requires physical access to the device and does not work on all devices, as w…
Rate this blog entry:
Continue reading
180 Hits
0 Comments

Dangerous Mobile Banking Trojan Gets 'Keylogger' to Steal Everything

Dangerous Mobile Banking Trojan Gets
Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They have now shifted from traditional to more clandestine techniques that come with limitless attack vectors and are harder to detect.Security researchers have discovered that one of the most dangerous Android banking Trojan families has now been modified to add a keylogger to its recent strain, giving attackers yet another way to steal victims sensitive data.Kaspersky Lab's Senior malware analyst Roman …
Rate this blog entry:
Continue reading
209 Hits
0 Comments

HBO Hacked — 'Game of Thrones' Scripts & Other Episodes Leaked Online

HBO Hacked —
If you are a die heart fan of 'Game of Thrones' series, there's good news for you, but obviously bad for HBO.Hackers claim to have stolen 1.5 terabytes of data from HBO, including episodes of HBO shows yet to release online and information on the current season of Game of Thrones.What's more? The hackers have already leaked upcoming episodes of the shows "Ballers" and "Room 104" on the Internet.Additionally, the hackers have also released a script that is reportedly for the upcoming fourth ep…
Rate this blog entry:
Continue reading
271 Hits
0 Comments

New statistical model examines massive amounts of data to automatically spot anomalies

New statistical model examines massive amounts of data to automatically spot anomalies
As you were browsing www.sciencedaily.com something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled JavaScript in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. After completing the CAPTCHA below, y…
Rate this blog entry:
Continue reading
154 Hits
0 Comments

Someone Hijacks A Popular Chrome Extension to Push Malware

Someone Hijacks A Popular Chrome Extension to Push Malware
Phishers have recently hacked an extension for Google Chrome after compromising the Chrome Web Store account of German developer team a9t9 software and abused to distribute spam messages to unsuspecting users.Dubbed Copyfish, the extension allows users to extract text from images, PDF documents and video, and has more than 37,500 users.Unfortunately, the Chrome extension of Copyfish has been hijacked and compromised by some unknown attacker, who equipped the extension with advertisement injec…
Rate this blog entry:
Continue reading
129 Hits
0 Comments

Hacker Leaks Data From Mandiant (FireEye) Senior Security Analyst

Hacker Leaks Data From Mandiant (FireEye) Senior Security Analyst
Reportedly, at least one senior cyber security analyst working with Mandiant, a Virginia-based cybersecurity firm owned by the FireEye, appears to have had its system compromised by hackers, exposing his sensitive information on the Internet.On Sunday, an anonymous group of hackers posted some sensitive details allegedly belonged to Adi Peretz, a ‎Senior Threat Intelligence Analyst at Mandiant, claiming they have had complete access to the company's internal networks since 2016.The recent hac…
Rate this blog entry:
Continue reading
259 Hits
0 Comments

Hackers Take Over US Voting Machines In Just 90 Minutes

Hackers Take Over US Voting Machines In Just 90 Minutes
Today, election hacking is not just about hacking voting machines, rather it now also includes hacking and leaking dirty secrets of the targeted political parties—and there won’t be a perfect example than the last year's US presidential election.But, in countries like America, even hacking electronic voting machines is possible—that too, in a matter of minutes.Several hackers reportedly managed to hack into multiple United States voting machines in a relatively short period—in some cases with…
Rate this blog entry:
Continue reading
110 Hits
0 Comments

Apple removes VPN Apps from the China App Store

Apple removes VPN Apps from the China App Store
In order to comply with Chinese censorship law, Apple has started removing all virtual private network (VPN) apps from the App Store in China, making it harder for internet users to bypass its Great Firewall.VPN service providers that provide services in China has accused the United States tech giant of complying with Chinese stringent cyberspace regulations. In a blog post, the developers of ExpressVPN reported that Apple informed them that their VPN app had been pulled from the company's Ch…
Rate this blog entry:
Continue reading
113 Hits
0 Comments