A method of stealing data from offline PCs discovered

The researchers managed to decipher PC’s data by studying its electro-magnetic emanation. Israeli security researchers have discovered a method of hacking computers, which are not connected to the Internet. These experts managed to steal crypto keys by means of measuring electro-magnetic emanation during the data decoding. They used the attack method known as “side channel …

Comodo Antivirus allows remote access to the PC

Comodo Internet Security installs and launches a VNC server by default. Tavis Ormandy, a security researcher from Google Project Zero, has discovered yet another problem with a software product from Colomo. This time software at issue is Comodo Internet Security, which installs and launches a VNC server, allowing remote access to the PC, by default. …

The coders’ algorithm of hydracrypt and umbrecrypt cracked

The security researcher from Emsisoft Fabian Wosar managed to crack the encryption algorithms of numerous ransomware thus making many hackers angry. Nevertheless, Wosar is not going to stop, but on the contrary – recently, he has managed to decipher the ransomware families HydraCrypt and UmbreCrypt and has released a new decrypter. HydraCrypt and UmbreCrypt are …

Android malware steals voice two factor authentication

Experts from Symantec have recently reported about discovery of a new version of the banking Trojan called Android.Banksy, which steals Android users’ financial information. The difference between this Trojan and other malware of this kind is in that Android.Banksy is capable of intercepting two-factor authentication codes transmitted by voice calls. Malware is constantly evolving, and …

BlackEnergy Trojan gets into the system through a vulnerability in Microsoft Office 2013

Information security experts from SentinelOne exposed a new tactic of spreading BlackEnergy malware, which has been attacking SCADA-system throughout Europe. It turns out that the latest version of this software is distributed together with Microsoft Office, and targets inattentive and careless employees of energy companies, who unintentionally bring malware to the system. A team of …

eBay Administration is not going to fix a dangerous bug

Researchers from Check Point recently discovered a serious vulnerability in the eBay online platform. The technique used by the bug got the name JSF ** k. It allows attackers to circumvent eBay filters. It means that an attacker can open his or her own shop on eBay, add malicious JavaScript into the item description, and …

Linux Trojan spyware has a Windows version

Experts from Kaspersky Lab reported about discovery of “twin brother” of Linux.Ekocms trojan, the malware that had previously been found by “Doctor Web”. According to a new report, this malware now has a Windows version. Generally, the Windows version of this Trojan works similarly to its Linux counterpart. Of course, there are certain differences in …