News

Critical vulnerability in Wi-Fi chips revealed by ESET

ESET researchers revealed a critical vulnerability in Wi-Fi chips. KrØØk, as they call it, causes vulnerable devices to use an all-zero encryption key to encrypt part of the user’s communication. So, attackers might decrypt some wireless network data transmitted by such…
News

Data breach in a US government agency

A US government agency notified its 8,000 employees that an attack compromised their personal data. The Defense Information Systems Agency (DISA) provides secure communications to the White House. Its CIO, Roger Greenwell revealed that the attackers stole the Social Security…
News

Google Play apps bombard users with annoying ads

Bitdefender revealed more than a dozen Google Play apps bombard users with annoying ads. According to the company, 17 apps used different strategies to deliver irritating ads. Still, they appear to be legitimate apps. Among the ads, which have more than half a million…
News

Bot driven traffic emails threaten website owners

An extortion email campaign threatens to bombard websites using AdSense with bot driven traffic. Thus, it would trigger Google’s anti-fraud systems. Brian Krebs, journalist and researcher, received the info from a website owner claiming he had received such a threat.
News

FBI discovered malware and blames North Korea

FBI discovered malware that is supposed to originate from North Korea. So, together with US Cyber Command, and DHS (Department of Homeland Security) issued a security statement. The document contains the information of the six malware that the North Korean Hackers are…
News

Chrome extensions stole data

Google announced it removed 500 malicious extensions. The Chrome extensions stole data of 1.7 million users. But the extensions were removed after they injected malicious ads used to send user browsing data to hacked servers. The malvertising and ad-fraud campaign using…
News

TrickBot evades Windows 10 detection

TrickBot evades Windows 10 detection, bypassing User Account Control (UAC) to deliver malware. Lately, the trojan became one of the most advanced vehicles for malware delivery. Thus, it can deliver malware across multiple workstations and endpoints on a network. UAC…