Monday , 11 December 2017
Home » Tech And Security News (page 2)

Tech And Security News

Bitcoin Value Plummets After Hacking Heist

The Bitcoin currency experienced a bump in the road this morning as it was revealed that Hong Kong based Bitcoin exchange Bitfinex reported that hackers had stolen 119,756 Bitcoins.  This is one of the largest hack in the Bitcoin’s history, and highlights one of the flaws of the digital currency–namely the varying security of the different Bitcoin exchanges. The theft …

Read More »

Pokemon Go Malware Strikes Phones

The big success of Pokemon Go has seeded a lot of good and a lot of bad.  One of the biggest stories to come out of this latest craze is the existence of malware that is disguised as a real Pokemon app.  These seem to mostly affect Android users, and one of the most recent ones locks users phones in …

Read More »

Tesla Autopilot Feature In First Fatal Accident

It was bound to happen sooner or later; the first fatal accident involving an autopilot feature.  These new technological improvements are simply steps towards driverless cars.  The Tesla version is like a souped up cruise control – the car follows the lines of the road and maintains speed, stopping for any obstacles and slowing down as traffic conditions change.  Tesla …

Read More »

What’s The Bounty On A Windows Zero Day Bug? Try $90,000

Zero Day bugs are “original” and undocumented security holes in software that nobody – not even the creators of the software – knows about yet.  They are typically found by one person or a team of people working on finding these vulnerabilities.  They are either then sold to the black market criminals for a bounty, given to the software developers …

Read More »

DDoS Scam Targets Online Businesses

A recent DDoS “scam” has been circulating the internet and targeting online businesses.  The email is from a group that sends emails to businesses threatening to take down their services via a DDoS (Distributed Denial Of Service) attack on their website.  The letter asks for money from the business in the form of bitcoins in order to “protect” the business …

Read More »

PSA: Uninstall Quicktime For Windows

Unless you use websites or programs that make use of Quicktime then it is highly recommended that if you’re running Windows and have Quicktime installed, you should uninstall it immediately.  The reason is that Apple has publicly stated that it is done with Quicktime for Windows, and is no longer updating or patching it. Trend Micro has reported that there …

Read More »

Hospitals Are Huge Targets For Ransomware

Hospitals are quickly becoming the hot target for ransomware attacks.  There has been a rash of attacks on hospitals in the United States recently, with ransomware locking up patient files and preventing the hospitals from scheduling appointments, surgeries, and more.  The hackers have been asking for modest sums of money — probably in hopes that the hospitals will simply pay …

Read More »

Reddit Latest Site Hit With National Security Letter

It has recently come to light that the popular online conglomeration website Reddit has most likely been hit with a National Security Letter recently.  A NSL, as they are often referred to, is a secret direct order for a company to disclose information such as information about its users and their activities. The interesting thing is that Reddit didn’t quite …

Read More »

Should The FBI Disclose The iPhone Vulnerability?

The hoopla surrounding the question of whether or not Apple should create a “backdoor” for the FBI in order to access the phone used by San Bernardino gunman Syed Rizwan Farook gave way to the announcement that the FBI had gone ahead and somehow gained access anyway.  After delaying the court order that Apple create a backdoor, the Justice Department …

Read More »

Microsoft Office “Macro Hacks” On The Rise

In the late 1990’s when the internet as still a young thing, hacking into computers using vulnerable Microsoft Office macros was quite popular.  Macros are simply a set of instructions designed to operate in order without any need for user input.  They would secretly install malware on the unsuspecting users computers, opening them up to a host of vulnerabilities.  Eventually …

Read More »