Catalin Cimpanu

1,933 Added | 6 Magazines | 8 Likes | 4 Followers | @CatalinCimpanu | Keep up with Catalin Cimpanu on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Catalin Cimpanu”

FDA Wants Medical Devices to Have Mandatory Built-In Update Mechanisms

The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards medical device safety, …

Medical Technology

LinkedIn Fixes AutoFill Button That Allowed Rogue Harvesting of User Data

A prodigious 18-year-old bug hunter from Chicago has discovered and reported a critical vulnerability in a LinkedIn social button that could have …

Information Security

RansSIRIA Ransomware Takes Advantage of the Syrian Refugee Crisis

A new ransomware called RansSIRIA has been discovered by MalwareHunterTeam that encrypts your files and then states it will donate your ransom …

Ransomware

Flash Used on 5% of All Websites, Down From 28.5% Seven Years Ago

Only 4.9 percent of today's websites utilize Flash code, a number that has plummeted from a 28.5 percent market share recorded at the start of …

Information Security

Denial-of-Spending and Inflation Bugs Found in Several Cryptocurrencies

A team of academics has identified an issue with the Zeroicoin protocol scheme, along with two security flaws in libzerocoin, the software library …

Information Security

Data Firm Left Profiles of 48 Million Users on a Publicly Accessible AWS Server

LocalBlox, a company that scrapes data from public web profiles, has left the details of over 48 million users on a publicly accessible Amazon Web …

Cambridge Analytica

JavaScript Trackers Caught Siphoning Data From "Login With Facebook" Feature

JavaScript libraries from various advertising and analytics services are siphoning user data from web pages where the "Login with Facebook" feature …

JavaScript

Finding & Activating Hidden Features in Windows 10 Using Mach2

Windows 10 builds contain many hidden features that are used by Microsoft to debug code or test applications that have not been officially released …

Cybersecurity

Minecraft & CS:GO Ransomware Strive For Media Attention

When ransomware developers achieve huge media buzz like we saw with the PUBG Ransomware, it is not surprising to see other developers creating …

Ransomware

iOS Trustjacking Attack Exposes iPhones to Remote Hacking

Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this …

Information Security

Microsoft Ports Anti-Phishing Technology to Google Chrome

Microsoft has released a Chrome extension named "Windows Defender Browser Protection" that ports Windows Defender's —and inherently Edge's— …

Google Chrome

Stresspaint Malware Steals Facebook Credentials and Session Cookies

Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and …

Chrome Browser

Google Chrome 66 Released Today Focuses on Security

Google has moved Chrome 66 to the stable channel and starting earlier today has begun updating users to the browser's new major version — Chrome …

Information Security

Drupalgeddon 2 Vulnerability Used to Infect Servers With Backdoors & Coinminers

Hackers haven't wasted their time in deciding what to do with the proof-of-concept (PoC) code that was published online last week for a major Drupal …

Information Security

Guild Wars 2 Monitored All Running Process in Order To Ban Users

While nobody likes a cheater in online games, sometimes how a company monitors and bans cheaters can go wrong. Such is the case with a recent ban …

Guild Wars

XiaoBa Ransomware Retooled as Coinminer But Manages to Ruin Your Files Anyway

The authors of the XiaoBa ransomware have retooled their malware's code into a cryptocurrency miner (coinminer).<p>Unfortunately, despite not encrypting …

Ransomware

34 Tech Firms Sign Accord Not to Assist Government Hacking Operations

An industry group of 34 high-tech companies led by Microsoft, have signed today a tech accord, agreeing to defend customers at all costs from …

Cybersecurity

Microsoft Announces Custom Chip and Linux Distro to Secure IoT Devices

Yesterday, at the RSA 2018 security conference, Microsoft announced a new security-focused product named Azure Sphere.<p>According to Microsoft chief …

Internet of Things

Windows 10 Spring Creators Update Delayed Because of Higher Percentage of BSODs

Microsoft admitted yesterday that the reason it did not launch the Spring Creators Update for Windows 10 last week was because of technical issues …

Windows 10

Intel to Allow Antivirus Engines to Use Integrated GPUs for Malware Scanning

Intel announced yesterday at the RSA 2018 security conference several new security-focused technologies, among which is a feature that will let …

Engines

US, UK Accuse Russia of Hacking Home Routers and ISPs to Conduct MitM Attacks

A joint alert issued by the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the United Kingdom's National Cyber …

Cybersecurity

Russia Bans 1.8 Million Amazon and Google IPs in Attempt to Block Telegram

Roskomnadzor, Russia's telecommunications watchdog, banned today over 1.8 million IP addresses belonging to Amazon and Google's cloud infrastructure. …

Amazon Web Services

TaskRabbit Takes Down App and Website After Getting Hacked

TaskRabbit, a web-based service that connects freelance handymen with clients in various local US markets, has emailed customers admitting it …

Cybersecurity

More Than Half of Android Apps for Kids Are Violating US Privacy Laws

Privacy experts have analyzed 5,855 child-directed Android apps and have found that more than half —57%— are potentially violating the Children's …

Apps

Crooks Hijack Router DNS Settings to Redirect Users to Android Malware

Malware authors have hijacked DNS settings on vulnerable routers to redirect users to sites hosting Android malware. [...]

Routers

Retired Airline Manager Who Hacked Former Employer Caught Thanks to VPN Logs

An Alaska judge sentenced a 59-year-old woman, a former director at Peninsula Airlines (PenAir), for hacking her former employer and wreaking havoc …

Hacking

Windows Servers Targeted for Cryptocurrency Mining via IIS Flaw

Hackers are leveraging an IIS 6.0 vulnerability to take over Windows servers and install a malware strain that mines the Electroneum cryptocurrency. …

Information Security

Intel SPI Flash Flaw Lets Attackers Alter or Delete BIOS/UEFI Firmware

Intel has addressed a vulnerability in the configuration of several CPU series that allow an attacker to alter the behavior of the chip's SPI Flash …

Information Security

Old JavaScript Crypto Flaw Puts Bitcoin Funds at Risk

Security researchers are warning that old Bitcoin addresses generated in the browser or through JavaScript-based wallet apps might be affected by a …

Information Security

FTC: "Warranty Void If Removed" Stickers Are Illegal

The US Federal Trade Commission (FTC) sent letters this week to six major companies containing warnings that using "warranty void if removed" or …

Repairs