Category Archives: TOP 10 STORIES

Exploit vendor Zerodium releases zero-day for old version of Tor

Exploit vendor Zerodium, which made headlines in September last year by offering a million-dollar bounty for any zero-day exploits in the Tor browser running on Tails Linux or Windows, has itself released a zero-day exploit for the browser.

View full story

ORIGINAL SOURCE: IT Wire

The post Exploit vendor Zerodium releases zero-day for old version of Tor appeared first on IT SECURITY GURU.

‘Web hackers held my data hostage,’ says Wiltshire police commissioner

The revelation came as Wiltshire Police plans to this week shine a light on its digital investigations team. Angus Macpherson, who has acted as police and crime commissioner for Swindon and Wiltshire since 2012, said: “I was actually subject to a ransomware attack on my personal computer two years ago. The criminals demanded money and effectively held some of my personal data and photographs hostage.”

View full story

ORIGINAL SOURCE: Swindon Advertiser

The post ‘Web hackers held my data hostage,’ says Wiltshire police commissioner appeared first on IT SECURITY GURU.

A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $600 worth of equipment

A savvy car thief could drive off with a Tesla Model S by using just a few, relatively inexpensive pieces of computing hardware and some radios — at least, the thief could have until recently, when Tesla fixed an overlooked vulnerability in its cars’ security systems.

View full story

ORIGINAL SOURCE: Business Insider

The post A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $600 worth of equipment appeared first on IT SECURITY GURU.

LuckyMouse Group is back and using a legitimate certificate to sign Malware

The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely related to the infamous Chinese-speaking threat actor – LuckyMouse. The most peculiar trait of this malware is its hand-picked driver, signed with a legitimate digital certificate, which has been issued by a company developing information security-related software.

View full story

ORIGINAL SOURCE: Engineering News

The post LuckyMouse Group is back and using a legitimate certificate to sign Malware appeared first on IT SECURITY GURU.