New victim of the miners became a torrent client
Researchers from cybersecurity company F5 spoke about a new way of hidden prey . This time hackers were able to access the free console torrent client rTorrent. Because before the application of the vulnerability, attackers could ...
Avast has developed an AI system for the protection of IoT from the rest of the miners
Hidden cryptocurrency is starting to become more rampant. Hackers earn money using for mining other people's computers, smartphones and other «smart» device. At the world mobile Congress company Avast said about the exte...
Microsoft Word became assistant of "black" miners
Hackers wish to get hold of the cryptocurrency at the expense of others, do not stop by any means trying to use any, even the most dubious loophole to access the capacities of other computers. This time the attackers used a new tr...
Hackers mainile cryptocurrency cloud account Tesla
Hackers broke into the account of Tesla in the cloud Amazon Web Services and set up the cloud on cryptocurrency — according to the company Redlock, specializing in cyber security. Access account Tesla hackers were able to ob...
In the Telegram discovered a vulnerability that allows hackers to mine cryptocurrencies
using the popular Telegram messenger hackers almost a year had the ability to access users ' computers, infecting a PC with malware capable of covertly produce . About the problem reported «Kaspersky Lab», which experts ...
Hackers have infected miner public sites US and UK
Followed by sites with high traffic and YouTube attacks «black miners» were the sites of state bodies of the USA and the UK. Expert on cyber security Scott Helme reports that at this point in latent production involved t...
In hardware crypto Ledger discovered a critical vulnerability
it is considered that the crypto hardware wallets are very reliable, and therefore better suited to store their savings and conducting various transactions. One of the most successful devices in the past year were French hardware ...
Proxy service for Tor browser stole users ' Bitcoins
security Experts from Proofpoint, the company conducted an investigation, which found that proxies onion.top which allows you to access the Tor network from a standard web browser, substitute the address of the bitcoin wallets and...
We were watching YouTube, the scammers mainily on our PC
While you are engaged in watching videos on YouTube, your personal computers and other gadgets, probably secretly mainily for attackers. About this cyber safety specialist Troy Marsh. Marsh writes that for mining in this case we...
"Kaspersky lab" has detected a Trojan stealing bitcoin
Experts «Kaspersky Lab» found Trojan Mezzo, substituting the details in the file exchange between the Bank and accounting systems. Malicious software attacks the fresh text files accounting software. If after a few minut...
Opera released a browser with protection from mining for smart devices and PC
the Developers of the Opera browser long ago drew attention to the problem of hidden , so I decided to protect users PCs and smart devices from hackers. First they released a secure version for computers, and recently arrived, and...
14% of all stocks bitcoin and ether earned by criminal means
the Staff analysis company Autonomous Research conducted a study which found that since the emergence of years, hackers were able to steal more than $ 1.2 billion in balinova and essential equivalent. At the same time, the researc...
Servers on Linux and Windows massively affects virus-miner
cybersecurity Experts from companies Check Point, Ixia and Certego found that more than 700 servers on Windows and Linux infected by malicious software RubyMiner used for covert cryptocurrency. The first attack was noticed last we...
Despite the development of new methods of cyber security, e-wallets and payment systems will always be a tasty morsel for hackers and other dishonest people that live on the world wide web. Have repeatedly made attempts of hacking...
A serious vulnerability in Intel processors can lead to data leakage
Programmers who first discovered the vulnerability, which writes the edition , reporting that it allows any software, including viruses, to access passwords, usernames and other confidential user information. The scale of the prob...
Hackers used Facebook Messenger for covert mining Monero
Unknown vlasici has created a bot that can without the knowledge of the Monero cryptocurrency. To spread malicious code used by the app Facebook Messenger, — soobshaet TrendLabs. Bot-miner called Digmine. The first mention...
The Opera browser will be a function lock of miners on the sites
In the last six months and only heard about how the owners of some web sites embed in their program-miners who use computing power of visitors . Earlier this sin pirate torrent Piratebay, then pulled up, and other major resources....
DARPA resumed work on the "uncrackable" computer Morpheus
Cybersecurity in recent years has become particularly relevant for investment not only large corporations, but also the military. In light of recent events, when the worm WannaCry suddenly knocked out more than 300 000 computers w...
Hackers demand from the creators of "Game of thrones" $ 6 million in bitcoins
a Few days ago, the Internet community stirred up information about what an unknown group managed to steal from the HBO huge amount of confidential information including yet not aired a series of television series "Game of thrones...
Becoming cyborgs, if we can protect our brains from cracking?
Rapid development of brain-machine interfaces and neuroprotective gradually leads us to a revolution in the methods of treatment and support paralyzed people. At the same time these technologies in the future can find a more unive...