Google rolled out today new security features for G Suite, its collection of enterprise, cloud computing, productivity, and collaboration tools. While several of the G Suite services received improvements, the most interesting additions have been made to Gmail for Business, the Google service that allows companies to use Gmail as their […]
New York Clinic Goes to Paper Charting After Ransomware Infects System
New York Medical Facility Riddled with Ransomware Finger Lakes Health, of Geneva, New York was infected with an unknown ransomware variant on March 18, 2018. Therefore, the medical facility’s systems were left completely encrypted, with an unknown third-party demanding a ransom payment. The amount of the payment has not been […]
AMD will release the patches for the recently discovered flaws very soon
AMD concluded its investigation on the vulnerabilities recently discovered by CTS Labs and announced that security patches will be released very soon. AMD has finally acknowledged 13 critical vulnerabilities and exploitable backdoors in its Ryzen and EPYC processors that were first disclosed earlier March by the researchers at the security firm CTS […]
New R2D2 Technique Protects Files Against Wiper Malware
Purdue University scientists have developed a data protection technique called Reactive Redundancy for Data Destruction (R2D2) that can protect data sitting inside a virtual machine from modern data-wiping malware and even some secure file deletion methods. Researchers say the new technique was successful in preventing wiper malware such as Shamoon (v1 and […]
Prilex ATM Malware Modified to Clone Chip-and-Pin Payment Cards
It is just another day with just another ATM malware targeting unsuspecting users – This time, the malware comes with cloning capabilities. According to the findings of Kaspersky Lab researchers, an old point-of-sale malware program Prilex has now been transformed into a full-fledged tool suite that allows cyber-crooks steal PIN card and […]
Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers
Legitimate and large-scale cryptocurrency mining operations often invest in dedicated hardware and electric consumption to make a profit. This doesn’t escape the attention of cybercriminals: Malicious cryptocurrency mining was so pervasive last year that it was the most detected network event in devices connected to home routers. Through our incident response-related monitoring, we observed intrusion attempts […]
Expedia’s Orbitz Suspects 880,000 Payment Cards Stolen
Travel fare aggregation site Orbitz on Tuesday warned that a hacker may have stolen customers’ personal information and payment card details over a two-year period. Chicago-based Orbitz, a subsidiary of Bellevue, Washington-based Expedia, says that on March 1, it discovered the suspected breach in a legacy system, noting that […]
Frost Bank announced it has suffered a data breach that exposed check images
On Friday, Frost Bank announced that it has suffered a data breach that exposed check images, crooks could use them to forge checks. Frost Bank announced on Friday that it has suffered a data breach that exposed check images. The bank is a subsidiary of Cullen/Frost Bankers, Inc., its staff discovered […]
AMD Confirms RyzenFall, MasterKey, Fallout, and Chimera Vulnerabilities
AMD has officially confirmed the validity of the RyzenFall, MasterKey, Fallout, and Chimera vulnerabilities that came to light on March 12, and said it would be releasing patches in « the coming weeks. » The company’s assessment of the four flaws is consistent with the original whitepaper published by Israeli security firm CTS […]
Supreme Court in Russia ruled Telegram must provide FSB encryption keys
A Supreme Court in Russia ruled Telegram must provide the FSB with encryption keys to access users’ messaging data to avoid being blocked. Bad news for Telegram, a Supreme Court in Russia ruled the company must provide the FSB with encryption keys to access users’ messaging data. If Telegram will refuse to […]