Sunday, December 17, 2017
Computer Security News

Computer Security News

macOS-root-access

macOS Flaw Doesn’t Need a Password to Gain Root Access

A bug can exploit the macOS High Sierra to gain root access to the system without entering any password. Since the remote exploitation is also possible, users expect that Apple will...
malicious macros hidden

Malicious Macros Find a New Way to Evade Detection

The developers of malware are placed among the most creative and talented programmers you'll find. Probably, this is the reason why malware infections are spreading faster and faster all over the...
marsjoke ransomware

Educational Institutions and the Government Attacked by MarsJoke Ransomware

A brand new ransomware family called MarsJoke ransomware has been targeting the government and the K-12 Educational Sector these days. The infection was found a month ago but it has just...
locked smartphone

Adult Porn App Blackmails Its Victims Using Their Own Photos

Adult Player, a vicious pornography Android application, blackmails its users by taking photos of them. The app, which can`t be found on the official Google Play store, secretly takes a picture of...
Magnitude-EK

Hackers Use Magnitude EK for Distributing Magniber Ransomware

PC users in South Korea are seriously threatened by the Magniber ransomware which hackers distribute via the Magnitude Exploit Kit. Security experts from FireEye said that the Magnitude EK has been missing...

Vicious Google Chrome Extension Is Spying on You

Google Chrome browser is famous for some of the best security tools ever made. Among its pupular features is Safebrowsing which protects users from malicious websites. Actually, ChromeOS, which powers the...
smart tv

Got Android Smart TV? Prepare to Pay the Ransom!

The threat called FLocker (short for “Frantic Locker”) has been on the scene for a year already, and its creators are trying hard to keep it alive. Usually, Flocker is delivered...
cerber ransomware

The Updated Cerber Ransomware v4.0 Sold Through Malvertising Campaigns On The Darkweb

Cerber ranks in the top 3 for ransomware infections in 2016 with fellow tiers Locky and CryptXXX. The creators of these malicious viruses have earned this recognition through hard work, culminating...
Windows DRM Files

Windows DRM Files Deanonymize Tor Browser Users

The Hacker House security experts have warned that downloading and opening Windows DRM-protected files can decloak Tor Browser users and reveal their IP addresses. The attacks via DRM-protected multimedia files in Windows...
iOS-bug

Apple iOS Safari Bug Used In A Ransom Scam

The iOS security bug that was used by cybercriminals to blackmail users into paying a ransom fee to unlock their Mobile Safari browsers has been fixed by Apple. This week, the...