The latest version of PuTTY SSH and Telnet client adds protection against spoofing the terminal authentication prompt to steal login info. Recently released, the update comes after a 20-month hiatus and fixes a total of eight security issues.
0
A vulnerability in the web version of Google Photos allowed websites to learn a user's location history based on the images they stored in the account.
0
Google today temporarily removed KDE Connect from Play store because it violated a newly-imposed policy for SMS and Call Logs permissions, which the companion app needs in order to offer a full-featured experience.
0
One of the largest aluminum producers in the world, Norsk Hydro, has been forced to switch to partial manual operations due to a cyber attack that is allegedly pushing LockerGoga ransomware.
1
Researchers are warning about a hacking technique that enables attacks on the local network using JavaScript on a public website. Using the victim's browser as a proxy, the code can reach internal hosts and do reconnaissance activity or even compromise vulnerable services.
0
Opportunistic actors are seeking to turn a quick profit from the tragic events last week in Christchurch, New Zealand, by engaging in online scams or by spreading malware embedded in content related to the gruesome attack.
0
A new ransomware called JNEC.a spreads through an exploit for the recently reported code execution ACE vulnerability in WinRAR. After encrypting a computer, it will generate a Gmail address that victims need to create in order to receive the file decryption key once they pay the ransom.
0
Following the Friday mass shooting in Christchurch, New Zealand, multiple internet service providers (ISP) in the country have blocked access to websites that distribute gruesome content from the incident.
21
A code execution vulnerability in WinRAR generated over a hundred distinct exploits in the first week since its disclosure, and the number of exploits keeps on swelling.
1
Payment card data of thousands of online shoppers has been stolen at checkout via malicious JavaScript code cybercriminals embedded in seven websites and which continues to collect and deliver the information the crooks.
1
Servers controlled by Chinese IT and services giant Hangzhou Shunwang Technology collect phone contact lists, geolocation, and QQ messenger login info through a data-stealing component present in up to a dozen Android apps available from major third-party stores in the country.
0
A database left unprotected online reveals a creepy set of details collected on more than 1.8 million women in China. Apart from the regular info one would expect, like name, age, and date of birth, the data set also includes a "BreedReady" status.
2
A ransomware attack hit the computers of Jackson County, Georgia, reducing government activity to a crawl until officials decided to pay cybercriminals $400,000 in exchange for the file decryption key.
0
Google recommends users of Windows 7 to give it up and move to Microsoft's latest operating system if they want to keep systems safe from a zero-day vulnerability exploited in the wild.
9
Scammers pretending to be employees of the Social Security Administrations (SSA) have caused last year losses of at least $16.6 million.
1