Ransomware has seen an abrupt rise in the recent years, and the present-day developments are only making this threat more infamous. If you love to keep yourself updated with the latest developments in the tech world, you might have heard about the notorious WannaCry ransomware, which is locking down people’s computers. It also goes by the other names like WannaDecrypt0r, WCry, and Wanna Decryptor.
What is WannaCry ransomware?
Till now, more than 150 countries have been affected by WannaCry ransomware, which exploits EternalBlue vulnerability and uses phishing emails. The NSA was the first to discover this flaw, and it was made public by ShadowBrokers in April.
A 7-year-old flaw in Intel chips could enable hijackers to gain total control of business computers and use them for malicious purposes.
The Intel AMT (active management technology) vulnerability is the first of its kind, according to Embedi, which released technical details about it last week.
Attackers could take advantage of the flaw to get full control over business computers, even if they were turned off, provided they were plugged into an outlet, according to the firm, which makes security products for embedded and smart devices.
John McAfee might have shifted his business to capital investments after his antivirus company was acquired by Intel. He even had to go to court as he lost rights to use the McAfee brand name. The entrepreneur still has some obsession left for security.
McAfee, who is now the CEO of MGT Capital Investments, has uploaded the first prototype image of the “John McAfee Privacy Phone” on twitter which he calls the “world’s first truly private smartphone.”
A new strain of malware targeting Linux systems, dubbed “Linux/Shishiga,” could morph into a dangerous security threat.
Eset on Tuesday disclosed the threat, which represents a new Lua family unrelated to previously seen LuaBot malware.
Linux/Shishiga uses four different protocols — SSH, Telnet, HTTP and BitTorrent — and Lua scripts for modularity, wrote Detection Engineer Michal Malik and the Eset research team in an online post.
The Intercontinental Hotels Group (IHG) thought only a handful of Holiday Inns were affected by a data breach that happened last year, but it turned out to be a much bigger deal. In a statement posted on its website, IHG has admitted that it found signs of malware designed to access credit card data used at front desks in a lot more locations. It didn’t mention a specific number, but it linked to a tool where you can look up which Holiday Inns, Intercontinentals and Crowne Plazas were affected.
A Krebs on Security reader did some digging, though, and found 1,175 properties in IHG’s tool. That’s a sizeable chunk of the 5,000 hotels it has worldwide.
Just as the Shadow Brokers hacker group started crowing about a dump of never-seen-before flaws in Windows, Microsoft announced it already had fixed most of the exploits.
“Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers,” Microsoft Principal Security Group Manager Phillip Misner wrote in a Friday post.
“Our engineers have investigated the disclosed exploits, and most of the exploits are already patched,” he added.
Screaming sirens serenaded Dallas residents in the early morning hours Saturday after a cyberattack set off the city’s emergency warning system.
All of the city’s 156 sirens were set off more than a dozen times, The Dallas Morning News reported.
Officials have not yet identified the perpetrator of the attack, the city’s Office of Emergency Management Director Rocky Vaz told the newspaper, but he expressed confidence that it was someone outside the Dallas area.
iOS 10.3, released earlier this week, fixes a major vulnerability that could cause iPhones to repeatedly dial 911, reports The Wall Street Journal. In the United States, 911 is an emergency telephone number that summons police, fire, and EMS services.
The 911 security flaw surfaced in October after an 18-year-old iOS developer in Arizona discovered and published code that would cause an iPhone to dial 911 over and over again. The teenager was arrested after the 911 system in Surprise, Arizona was overwhelmed with more than 100 hang-up calls in just minutes.
There are two personalities on display in Donald Trump’s Twitter feed. One Trump generally spells things correctly, tweets flattering news stories, and politely thanks visitors for meeting with him. The other Trump is easily provoked, capitalizes random words, and lashes out in real time at things that annoy him.
These two genres of tweets generally come from two different devices—an Android phone and an iPhone—and thus presumably from different people.
Do you remember what you were doing on Twitter in 2010? Twitter accounts have been compromised by a range of security issues lately — and in at least one case the vulnerability is tied to a decision users made years ago. It might be time to double check how secure your account really is.
Early Thursday morning, the official Twitter account for McDonald’s pinned a tweet directed at President Trump.