Category: hackers

Government hackers reportedly broke into Russian search company Yandex

[ad_1] In the fall of 2018, the hackers deployed a type of malware called Reign, which is linked to “Five Eyes,” an intelligence-sharing alliance comprised of the US, Britain, Australia, New Zealand and Canada. It’s unclear which of those countries might be behind the breach, though. A Yandex spokesperson told Reuters that the hack was […]

Cloudflare wants to protect the internet from quantum computing

[ad_1] While Cloudflare hasn’t solved the problems that cryptography raises for encryption, it’s been trying to “quantum-proof” TLS, the encryption technology formerly called SSL, which protects connections between web browsers and servers. Cloudflare plans to continue this work, and it hopes that by sharing CIRCL, it will help other researchers prepare for a post-quantum world. […]

US charges China-based hacking group for massive 2015 Anthem breach

[ad_1] Wang and Doe reportedly used “extremely sophisticated techniques,” including specially-tailored spear-phishing emails with embedded hyperlinks. When employees of the targeted businesses clicked the hyperlinks, a file downloaded and deployed malware, which created a backdoor to the computer systems. In some cases, the defendants waited months before taking further action. Then, they allegedly encrypted the […]

Hackers hijacked update server to install backdoors on ASUS machines

[ad_1] With access to the update server, the attackers were able to distribute malicious files that appeared legitimate because they were given an ASUS digital certificate to make them appear to be authentic. Instead, the phony software updates gave the attackers a backdoor to access infected devices. Kaspersky estimates that about half a million Windows […]

A 19-year-old WinRAR bug is being used to install malware

[ad_1] By renaming an ACE file with a RAR extension, hackers can manipulate WinRAR and extract a malicious program to a computer’s startup folder, explained Check Point, the company that discovered the bug. Without the user knowing, the program then runs automatically when the computer is restarted. According to McAfee, one exploit uses a bootleg […]