attack

Mon
09
Apr
Dennis Faas's picture

How to Fix: Remove JSCoinMiner Browser Malware (Step By Step)

Infopackets Reader Bob S. writes: " Dear Dennis, Thanks for the article on Browser Cryptomining scams . I have a related problem. I use Firefox browser and Norton keeps telling me that I'm infected with ' JSCoinminer ' for every single web page I ... visit - for example, eBay.com, Amazon.com and even Infopackets.com! I have tried to remove the infection using Norton, Malwarebytes and also Norton's 'Power Eraser' but the infection persists. The error message reads: Norton blocked an attack by: Web Attack: JSCoinminer Website / An intrusion attempt by thrillingos.herokuapp.com was blocked ... Web ... (view more)

Thu
14
Dec
John Lister's picture

Trio Admits Hijacking Home Devices

Three Americans have plead guilty to hijacking more than 100,000 internet-connected devices. The group of infected machines (known as a "botnet") was then used to attack websites using a distributed denial of service attack (DDoS) to make websites ... unavailable. While most DDoS attacks are carried out on PCs, this attack in particular targeted weaknesses in smaller devices that use the Internet. This included routers, digital video recorders and wireless cameras. That's a significant point, as the tech security community has generally treated security flaws in such devices as a lower ... (view more)

Wed
13
Sep
John Lister's picture

Billions of Bluetooth Devices at Risk of Malware Infection

The majority of Bluetooth devices could be vulnerable to a malware attack. The attack, dubbed BlueBorne, can reportedly spread to devices without needing any action from the victim. The attack takes advantage of a bug in the Bluetooth technology ... itself rather than a specific operating system. At one point this summer an estimated 5.3 billion devices were at risk, running Windows, Android or Linux, as well as Apple devices running systems before the current iOS 10. Fixing the problem will require patches for specific devices and operating systems. Microsoft has patched the issue already, ... (view more)

Wed
28
Jun
John Lister's picture

Windows Bug Exploited Again by Ransomware

Businesses around the world are reporting computer problems that appear to be another rapidly-spreading ransomware attack. It appears likely to be exploiting the same Windows flaw as the recent WannaCry attack. Details were still emerging at the ... time of writing, but high profile businesses including drug giant Merck, a British advertising agency and a Danish shipping company are known to have been compromised. Ukraine's government network also appears to have been hit. (Source: nytimes.com ) File Index Compromised As with WannaCry, the malware appears to be designed to lock up and encrypt ... (view more)

Tue
13
Jun
John Lister's picture

Malware Threatens Power Grids

Russian-backed hackers appear to have the ability to remotely shut down power stations, researchers claim. However, the cyber weapon appears to only have been successfully deployed once so far. Two companies, Dragos Inc and ESET, have revealed their ... analysis of malware that was used in an attack on a transmission station in Kiev, the Ukrainian capital, last December. The outage lasted for an hour and blacked out buildings that normally use 20 percent of the city's electricity. (Source: washingtonpost.com ) Malware Easily Customized The researchers say the malware, which they've dubbed ... (view more)

Tue
09
May
John Lister's picture

Phishing Scammers Try New Twist

An estimated one million people around the world received a recent phishing email, though it only posed a risk for around an hour before Google stepped in to stop the scam in its tracks. Victims of the scam may have inadvertently given attackers ... control of their email accounts. The attack involved a bogus email claiming that a contact tried to share a document with the recipient using Google Docs. While only a small proportion of people use Google Docs, the attackers appear to have been playing the numbers game. Attackers Accessed Emails and Contacts Unlike most phishing scams, the attackers ... (view more)

Thu
24
Nov
John Lister's picture

Report: Earphones Could Be Hijacked By Hackers

Security researchers say hackers could turn people's headphones into a microphone for surreptitious remote listening. However, the method has enough limitations that it shouldn't be a major concern for most users. The method, shown off by ... researchers at Ben Guiron University in Israel, takes advantage of a very simple element of engineering. That is that the process by which a microphone turns speech into an electronic signal is effectively the same as that by which earphones turn a speaker into sound, just with the process reversed. According to the researchers, that's a security ... (view more)

Wed
17
Feb
John Lister's picture

Hackers Demand $3.6M To Restore Hospital Computers

A California hospital has been unable to use its computer system for more than a week thanks to a ransomware attack. The hackers are said to be demanding more than $3 million in return for returning access. The Hollywood Presbytarian Medical Center ... has confirmed the attack but is keeping many of the details quiet. Local news outlets say it doesn't appear any personal data has been compromised and no patients have been put at medical risk. However, the attack has been highly disruptive. Staff are having to register new patients and update medical records on paper. Some patients and family ... (view more)

Tue
20
Oct
John Lister's picture

Facebook to Warn of Government Attacks

Facebook is to warn users when it believes a government is trying to hack their account. The company is giving few details about how it will detect such attempts, or which governments may be involved. The warnings will appear when Facebook has ... reason to believe an "account has been targeted or compromised by an attacker suspected of working on behalf of a nation-state." According to Facebook, the message is not meant as an indication that Facebook's own servers or systems have been compromised - whether by a government or anyone else. Early Warning System Instead, Facebook will ... (view more)

Thu
11
Jun
John Lister's picture

Kaspersky Labs Hacked "By Government"

Kaspersky Lab, one of the biggest security software firms, says its own internal network was attacked by hackers. The company heavily implied that a national government was behind the hack. Owner Eugene Kaspersky says the hackers were able to access ... confidential internal data relating to research and development into new and improved security techniques. The attack didn't delete or change any data, or affect any performance. The company is also quick to stress that no customers were affected by the move and that it's products continue to work as designed. Attack Method Impressive, ... (view more)

Pages

Subscribe to RSS - attack