Thursday, May 24, 2018
Facebook conspiracy theories after Android app tries to “get root”

Facebook conspiracy theories after Android app tries to “get root”

Facebook's Android app suddenly started making a bid for superuser access. Conspiracy theories popped up like fungi. (It's now fixed.)
Latin American ‘Biñeros’ Bond Over Fraudulent Purchase Scheme

Latin American ‘Biñeros’ Bond Over Fraudulent Purchase Scheme

A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible.
CIA’s “Vault 7” mega-leak was an inside job, claims FBI

CIA’s “Vault 7” mega-leak was an inside job, claims FBI

The suspect worked for a CIA group that designed hacking tools at the time the cyber-spying arsenal was given to WikiLeaks.
Hurdles Remain After Senate Votes To Restore Net Neutrality

Hurdles Remain After Senate Votes To Restore Net Neutrality

The U.S. Senate gave the nod to restoring the 2015 Open Internet Order, putting net neutrality on the fast track to a House vote.
Don’t invest! The ICO scam that doesn’t want your money

Don’t invest! The ICO scam that doesn’t want your money

The HoweyCoins scheme sounds too good to be true... it is, and it knows it!
Senate votes to restore net neutrality… but don’t get your hopes up

Senate votes to restore net neutrality… but don’t get your hopes...

It's people-pleasing, but it's probably just symbolic.
Facebook crushes 583 million fake accounts in 3 months

Facebook crushes 583 million fake accounts in 3 months

On a daily basis, it disables millions of fake accounts before they ever hatch.
New Cryptominer Distributes XMRig in Aggressive Attacks

New Cryptominer Distributes XMRig in Aggressive Attacks

Cryptominer WinstarNssmMiner is an aggressive malware strain that has launched 500,000 attacks in the past three days earning criminals $28,000.
RedHat admins, patch now – don’t let your servers get pwned!

RedHat admins, patch now – don’t let your servers get pwned!

A command injection bug in Red Hat's DHCP client could allow an attacker to run any command on your computer. As root.
Attackers Use UPnP to Sidestep DDoS Defenses

Attackers Use UPnP to Sidestep DDoS Defenses

Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations.

Recent Posts