Cryptomining hacks aren’t new by any stretch, but a string of recent incidents is raising eyebrows. ZDNet reports that culprits infected multiple European supercomputers with Monero mining malware in the past week, including the University of Edinburgh’s ARCHER, five of bwHPC’scomputer clusters and most recently a cluster at Munich’s Ludwig-Maximilians University. That’s unusual by itself, but there appears to be a common thread between the hacks. Continue reading Supercomputers across Europe have fallen to cryptomining hacks
It’s almost impossible to read the news these days without seeing yet another articleon the rising threat of Android malware. But at the same time, a new report from AV-Comparatives has been making the rounds for its finding that most Android antivirus apps are terrible scams. So what’s a security-conscious user to do?
You don’t need an elaborate crime ring (or a government agency) to write malware that spies on others — sometimes, just one person can be responsible. The US Department of Justice has charged Ohio resident Philip Durachinsky with 16 crimes for allegedly writing malware, nicknamed “Fruitfly,” that gave him unfettered access to the PCs of “thousands” of individuals and institutions between 2003 and January 2017. Reportedly, he not only stole sensitive data to use for fraud and blackmail (such as logins, embarrassing chats and medical records) but took screenshots, logged keystrokes and spied on people through their webcams.
On Monday, reports emerged that the head of the Ukrainian Cyber Police is seeking criminal charges against the Ukrainian tax software company that was the first victim of the crippling NotPetya malware attack. Now, it has come to light that the firm’s servers have been seized by authorities.
Disaster has struck—an unwanted piece of malware took root on your computer. So what’s your next step? While the potential damage viruses can cause shouldn’t be underestimated, you might be able to get your computer back on its feet without too much difficulty, thanks to an array of helpful tools at your disposal.
It’s been a rough week in Mac security. First, Checkpoint warned users of a Trojan spreading in Europe that was the first of its kind. And now, one of the most prominent video transcoding apps for Mac has a malware problem.
A FEW HOURS after dark one evening earlier this month, a small quadcopter drone lifted off from the parking lot of Ben-Gurion University in Beersheba, Israel. It soon trained its built-in camera on its target, a desktop computer’s tiny blinking light inside a third-floor office nearby. The pinpoint flickers, emitting from the LED hard drive indicator that lights up intermittently on practically every modern Windows machine, would hardly arouse the suspicions of anyone working in the office after hours. But in fact, that LED was silently winking out an optical stream of the computer’s secrets to the camera floating outside.