North Korean caught secretly mining bitcoin rival

North Korean hackers are secretly mining a cryptocurrency rival to bitcoin as Kim Jong Un aims to cash in on the booming virtual cash economy and skirt the sanctions that are crippling his regime. According to a report, the rogue state is using foreign computers to funnel the cryptocurrency

North Korean caught secretly mining bitcoin rival

North Korean hackers are secretly mining a cryptocurrency rival to bitcoin as Kim Jong Un aims to cash in on the booming virtual cash economy and skirt the sanctions that are crippling his regime. According to a report, the rogue state is using foreign computers to funnel the cryptocurrency

The new, clever way hackers can get into your bank account

According to a blog post by Cisco-owned Talos, the Zeus Panda malware essentially “poisons” Google search results to push fake bank-related results to the top of a key word search. Then, the unwary user, looking for quick answers to a search related to their bank, is fooled into

World’s most popular porn site infected by digital STD

It’s a filthy habit that could leave you at risk of catching a nasty virus. Porn watchers have been urged to check their computers immediately after “millions” of grubby smuthounds were infected by a piece of malware called Kovter. Researchers from the tech firm Proofpoint said that visitors to the wildly popular

Searching for these celebrities may destroy your computer

One-time pop-punk princess Avril Lavigne has beaten superstar Beyonce at something, but she may not be totally happy with her victory — she’s been named the most dangerous celebrity on the internet. Cybersecurity firm McAfee said Tuesday that Lavigne, whose last album came out in 2013, was the most likely celebrity

Your cellphone porn habit isn’t as secret as you think

Porn lovers who visit X-rated websites on their mobile phones could soon have their filthy secrets exposed to the world. Adult websites are much more likely to expose your viewing habits if they’re accessed on a cell, smut-lovers have been warned. Tech firm Wandera issued this warning: “Watching mobile porn on your

Cyber criminals use fake profiles as “honey pot’ traps to lure men

Mia Ash is young, attractive and popular, with hundreds of social media connections. She shares your favorite hobbies, so when she adds you, you’re flattered and a little bit excited. After exchanging messages on LinkedIn, you’re happy to continue the conversation on Facebook and WhatsApp. There’s just one problem: Mia Ash does not

Ukraine eyes Russian security services in massive cyberattack

Ukraine said on Saturday that Russian security services were involved in a recent cyber attack on the country, with the aim of destroying important data and spreading panic. The SBU, Ukraine’s state security service, said the attack, which started in Ukraine and spread around the world on Tuesday, was by the

Europe hit by massive cyberattack

PARIS — A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard. Company and government officials reported serious intrusions at the Ukrainian power grid, banks and government offices, where one senior official posted a photo of a darkened computer

An e-cig can hack your computer

All crooks need to do is add a small chip to an e-cig to transform it into a digital lock-pick capable of prizing open a target’s systems. This tiny modification fools the computer into thinking a mouse or keyboard is attached, making the device drop its guard. Once plugged into a computer,

An e-cig can hack your computer

All crooks need to do is add a small chip to an e-cig to transform it into a digital lock-pick capable of prizing open a target’s systems. This tiny modification fools the computer into thinking a mouse or keyboard is attached, making the device drop its guard. Once plugged into a computer,

An e-cig can hack your computer

All crooks need to do is add a small chip to an e-cig to transform it into a digital lock-pick capable of prizing open a target’s systems. This tiny modification fools the computer into thinking a mouse or keyboard is attached, making the device drop its guard. Once plugged into a computer,

There’s now malicious software that can cause power outages

Two cyber security companies said they have uncovered a sophisticated piece of malicious software capable of causing power outages by ordering industrial computers to shut down electricity transmission. Analysis of the malware, known as Crash Override or Industroyer, indicates it was likely used in a December 2016 cyber attack that cut

Russian hackers are using Britney Spears to rob you blind

Hackers have hidden nasty malware in a very peculiar place. They booby-trapped Britney Spear’s Instagram account after conducting a sophisticated “watering hole” attack. This sort of attack compromises websites likely to be visited by people the cyber criminals want to target. It appears that Russian hackers linked to Vladimir Putin’s cyber intelligence unit

Russian hackers are using Britney Spears to rob you blind

Hackers have hidden nasty malware in a very peculiar place. They booby-trapped Britney Spear’s Instagram account after conducting a sophisticated “watering hole” attack. This sort of attack compromises websites likely to be visited by people the cyber criminals want to target. It appears that Russian hackers linked to Vladimir Putin’s cyber intelligence unit

Microsoft Patches Critical Vulnerability In Its Own Antivirus Software

Microsoft has confirmed that a critical vulnerability in its Windows Defender antivirus software puts Windows computers at serious risk. Windows Defender could inadvertently install malware while scanning a PC for unwanted files. Microsoft has already released a patch for the problem. The flaw was discovered by Google cybersecurity researchers Tavis Ormandy