cyber criminals

Fri
09
Apr
John Lister's picture

500M Phone Numbers Exposed in Facebook Leak

A data leak has exposed the phone numbers of an estimated 500 million Facebook users. The data comes from a breach in 2019, but has just been made public. According to Facebook, the breach was "found and fixed" in 2019, which has raised some ... eyebrows given the company never warned users their details may have been compromised. It argues the data wasn't hacked but rather "scraped" from publicly accessible information through a bug in its feature that lets users find the Facebook accounts of people in their phone contacts. That may not be enough to satisfy data protection officials in several ... (view more)

Mon
07
Dec
Dennis Faas's picture

Acronis True Image 2021 Review

If you lost all of the data on your PC, would you be devastated? According to a recent report, cyber crimes are booming thanks to the covid-19 pandemic . That's because cyber criminals are counting on the fact that most users are working remotely at ... home and/or retired, increasing their chances in converting a "sale". The Federal Bureau of Investigation (FBI) said that in 2019, cyber criminals raked in $3.5 billion targeting individuals and businesses in the USA. Of that, $8.9 million was attributed to ransomware attacks, while scammers posing as fake technical support stole $54 ... (view more)

Thu
12
Nov
John Lister's picture

Beware of Bogus Microsoft Teams 'Update'

If you use Microsoft Teams, watch out for bogus advertisements offering an "update". It's a scam designed to install malware that tries to steal personal data. The group chat and video conferencing tool has understandably become more popular this ... year with the increase in remote desktop connections to workplaces. That's attracted the attention of scammers who have put together a creative strategy to steal data. It's important to note that the attack doesn't aim to exploit any vulnerability in Teams itself. Instead, it's simply aimed at people using it, particularly those who have only started ... (view more)

Tue
16
Jun
John Lister's picture

New Ransomware: Pay Up Or Files Go Public

A new form of ransomware named after a Marvel super villain has some particularly evil features. The Thanos malware uses an approach more reminiscent of "physical world" blackmail. Despite the name, the malware thankfully doesn't imitate the ... character Thanos by - spoiler alert - deleting half the files in the entire universe. That said, it's still quite scary thanks to a couple of features beyond the usual tactic of encrypting files and demanding a ransom. Instead, the ransomware also seeks to spread across an entire local network and encrypt all the computers it can reach. This is especially ... (view more)

Wed
25
Mar
John Lister's picture

Critical Security Flaw Hits Windows 7 and 8 Hardest

Microsoft has warned users of a significant unpatched security flaw in Windows. It's offered some key steps to take while the problem is being fixed. The problem affects all currently supported versions of Windows, though Windows 7 and 8 machines ... are affected 'critically' according to the Microsoft advisory bulletin. Attacks on Windows 10 machines are considerably more constrained due to its enhanced security features. Microsoft says its currently only aware of targeted attacks on Windows 7 machines, though that could change now the bug has been made public. (Source: microsoft.com ) Adobe ... (view more)

Wed
26
Feb
John Lister's picture

Chrome Users: Update Now to Patch Critical Bug

Google has issued a critically important update to its Chrome browser due to a nasty zero day bug. The browser should update automatically for most users, but the bug is serious enough that it's a case of checking to ensure that the update has been ... successfully applied. The update fixes three security problems, one of which is a critical. It means hackers were actively exploiting the problem before Google fixed it - meaning the update process gave users a zero day head start on the bad guys (hence the term, ' zero day exploit '). Perhaps unsurprisingly, Google isn't saying much at all about ... (view more)

Mon
24
Feb
John Lister's picture

Gas Pipeline Shut Down After Ransomware Attack

Ransomware forced an unplanned shutdown of a US gas pipeline for two days. It's not yet clear if the attackers intended to have that effect. The full details, including the identity of the pipeline and its operators, have been kept under wraps. The ... only official information that's been made public comes from a security alert bulletin by the Department of Homeland Security (DoHS). (Source: us-cert.gov ) The attack started as an all-too-familiar "spear phishing" attack. That's a deliberately targeted email that tries to fool somebody (that typically works for a corporation) into clicking on a ... (view more)

Tue
28
Jan
John Lister's picture

State Could Ban Gov't Ransomware Payments

New York state senators want a legal ban on local governments paying ransomware demands. The bipartisanship move is based on the idea that paying up simply incentivises the attacks. Ransomware is malicious software that encrypts files on a hard ... drive so that they become unusable. Cyber criminals then demand a hefty ransom to unlock the files. Two state senators, one Democrat and one Republican, have each proposed broadly similar bills. They are currently in the committee stage and its likely that one will go ahead to a full vote of the New York State Senate. Both bills are based on similar ... (view more)

Wed
08
Jan
John Lister's picture

New Clop Ransomware Encrypts Windows Processes

Researchers have spotted new ransomware with a nasty new twist. "Clop," as it's called, doesn't just encrypt files, but deliberately attempts to screw up applications as well. The move is most likely intended to reduce the chances of the ransomware ... being blocked, but also means an attack could be even more disruptive and make it more likely a complete rebuild of the affected PC is necessary. Normally ransomware's main task is to encrypt as many files as possible on a computer. The idea here is to extort the user by forcing them to pay a ransom to regain access to the locked files. ... (view more)

Fri
03
Jan
John Lister's picture

North Korea Accused of Attacking Windows Users

Microsoft has warned users to pay particularly close attention to emails that appear to come from "microsoft.com". A simple trick involving spelling was the key to a security attack that Microsoft believes was instigated by North Korea. A US court ... has given Microsoft legal control of 50 web domains it says were used to carry out cyber attacks on Windows users. It's said to be the work of a group dubbed Thallium operating out of North Korea. Microsoft says the attacks were targeted at "government employees, think tanks, university staff members, members of organizations ... (view more)

Pages

Subscribe to RSS - cyber criminals