Computer Security News

Google-Chrome-Extensions

Google Bans Cryptocurrency Mining Chrome Extensions

A couple of day ago, Google announced that it will ban cryptocurrency mining extensions from the official Chrome Web Store. After finding that the crypto-mining extensions abuse users’ resources without their consent, the company decided to ban all the malicious extensions from the official Chrome Web Store. In most cases, the scripts created for mining …

Google Bans Cryptocurrency Mining Chrome Extensions Read More »

HiddenMiner-Malware

HiddenMiner Android Malware Can Brick Infected Devices

Trend Micro security experts have found a new strain of Android cryptocurrency miner called ANDROIDOS HIDDENMINER. The malware abuses device CPU to mine Monero cryptocurrency. According to the researchers, HiddenMiner has been created for mobile devices and can bypass automated analysis by checking if it’s running in a virtualized environment by abusing an Android emulator …

HiddenMiner Android Malware Can Brick Infected Devices Read More »

Apple-security-patch

Apple Patches Dozens of Vulnerabilities Across All Platforms

Last week, Apple released a brand new set of security patches to fix dozens of vulnerabilities impacting iOS, macOS, watchOS, and tvOS, as well as Windows software. The iOS 11.3 release came out on Thursday and addressed more than 40 security bugs that affected iPhone 5s and later, iPad Air and later, and iPod touch …

Apple Patches Dozens of Vulnerabilities Across All Platforms Read More »

Panda-Banker-Trojan

New Version of Panda Banker Trojan Attacks Japan

Arbor Networks security experts warned about a new threat actor which attacks financial institutions in Japan via the Panda Banker banking trojan (aka PandaBot, Zeus Panda). The security researchers at Fox-IT first noticed Panda Banker in 2016. According to them, the malware borrows code from the Zeus banking Trojan. Last November, the creators of Zeus …

New Version of Panda Banker Trojan Attacks Japan Read More »

GoScanSSH-Malware

GoScanSSH Malware Does Not Infect Government and Military Networks

Cisco Talos security experts found a brand new piece of malware called GoScanSSH. According to the experts, the new threat was used to compromise SSH servers exposed online. The GoScanSSH malware was written in Go programming language, which is rather uncommon for malware development, and it has very interesting features. Among these is the fact …

GoScanSSH Malware Does Not Infect Government and Military Networks Read More »

Android-users-data

Facebook Collected Android Users’ Call and SMS Data for Years

Shortly after the scandal with Cambridge Analytica, Facebook is under pressure again. It became clear that the social network collected Android users’ call and SMS data if not explicitly forbidden. The recent Facebook issue with Cambridge Analytica raised the discussion about the social networks’ power and the possibility of abusing them for the conditioning of …

Facebook Collected Android Users’ Call and SMS Data for Years Read More »

Atlanta-malware-attack

Computers in Atlanta Infected by Ransomware

Atlanta officials reported that the computers in the city were infected by a severe ransomware attack. Last Thursday, the mayor of Atlanta Keisha Lance Bottoms reported that a malware has paralyzed some internal systems and encrypted the city’s data. The malware attack has caused the interruption of several city’s online services, including “various internal and …

Computers in Atlanta Infected by Ransomware Read More »

Meltdown-Spectre-Patches

Google Releases Additional Meltdown and Spectre Patches for Chrome OS

Google reported that Spectre and Meltdown vulnerabilities keep infecting devices with Intel processors. Thus, the company releases additional security patches for Chrome OS. Hackers can exploit the Meltdown and Spectre attacks for bypassing memory isolation mechanisms and accessing target sensitive data. Meltdown could let hackers read the physical memory of the target computers and steal …

Google Releases Additional Meltdown and Spectre Patches for Chrome OS Read More »

TeleRAT-Android-Trojan

TeleRAT Android Trojan Uses Telegram to Exfiltrate Data

The experts at Palo Alto Networks found a brand new Android trojan called TeleRAT. The trojan uses Telegram Bot API for command and control (C&C) server communication and data exfiltration. The TeleRAT trojan is supposed to come from Iran and it attacks Iranian users mostly. According to the researchers, there are some similarities between TeleRAT …

TeleRAT Android Trojan Uses Telegram to Exfiltrate Data Read More »