Critical Remote Code Execution vulnerability has been discovered in the most popular and most feature-rich PDF reader, Adobe Acrobat Reader DC. The vulnerability has the power to perform a stack-based buffer overflow all the executing the orbitary code when users open the vulnerable Adobe document.This Critical RCE vulnerability affected the […]
Haythem Elmir
Un chercheur en sécurité a trouvé une méthode pour pirater n’importe quel compte Facebook
Un chercheur en sécurité a trouvé une méthode pour pirater n’importe quel compte Facebook Il a été payé 15 000 $ par le réseau social L’un des principes du test de logiciels stipule que l’absence de bogues est une utopie, c’est la raison pour laquelle les géants du web ont […]
With Android P Google Plans To Prevent Cellphone Spying Through Your Camera and Microphone
Android P, is expected to include a neat feature that prevents apps running in the background from spying on you through the camera or microphone on your cell phone. Do you cover the lens on your webcam to prevent someone from spying on you? You should, and it seems like every […]
Visa: EMV Cards Cut Down Counterfeit Card Fraud in the US by 70%
Visa said last week that two years after US retailers started deploying terminals that could read chip-based credit and debit cards, reports of counterfeit card fraud have dropped by 70%. While modern chip-based payment cards —also known as EMV (Europay, MasterCard, Visa) cards after the three organizations that promoted the new technology— […]
Threats from Mobile Ransomware & Banking Malware Are Growing
The number of unique mobile malware samples increased sharply in 2017 compared to a year ago, according to Trend Micro. After years of focusing their attention largely on desktop systems, cybercriminals have, as expected, begun ramping up attacks on mobile devices. Ransomware, banking malware, and other threats aimed at smartphones […]
Project Crostini: Chrome OS to Support Containerized Linux Apps
Google is in the process of adding support to Chrome OS for running containerized Linux applications, according to a commit spotted in the operating system’s source code last week by Reddit users. The commit adds a new device policy to allow Linux VMs on Chrome OS for the purpose of running […]
Adobe Flash Vulnerability Reappears in Malicious Word Files
CVE-2018-4878, a Flash zero-day patched earlier this month, has resurfaced in another campaign as attackers capitalize on the bug. An Adobe Flash vulnerability CVE-2018-4878 patched earlier this month is being exploited in a new phishing campaign leveraging malicious Microsoft Word documents. This critical vulnerability is a use-after-free bug that enables […]
New UpdateChecker Coinminer Package Also Displays Ads to Further Piss You Off
These days it is not uncommon to find both adware and miners being installed together through adware bundles. These programs, though, are typically not created by the same developer and are just being included as different « offers » by the software monetization company. After examining a new malware sample that was […]
The Rig Exploit Kit Has Forsaken Ransomware for Coinminers
The exploit kit landscape has continued its downfall started in the summer of 2016 and its leading player —the RIG exploit kit— has stopped delivering any ransomware strains in 2018, focusing now on spreading cryptocurrency miners (coinminers) and information-stealing trojans (infostealers). These are the main conclusions of months of observation by […]
Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption
Ransomware developers continue to release infections that are clearly not tested well and contain bugs that may make it difficult, if not impossible, for victims to recover their files. Such is the case with the new in the wild ransomware called Thanatos that has been discovered by security researcher MalwareHunterTeam. When […]