Exfiltrating Data from Air-Gapped Computers via Wi-Fi Signals (Without Wi-Fi Hardware) – Tempemail

A security researcher has demonstrated that sensitive data could be exfiltrated from air-gapped computers via a novel technique that leverages Wi-Fi signals as a covert channel—surprisingly, without requiring the presence of Wi-Fi hardware on the targeted systems. Dubbed “AIR-FI,” the attack hinges on deploying a specially designed malware in a Continue Reading

Browsers Bugs Exploited to Install 2 New Backdoors on Targeted Computers – Tempemail

Cybersecurity researchers have disclosed details about a new watering hole attack targeting the Korean diaspora that exploits vulnerabilities in web browsers such as Google Chrome and Internet Explorer to deploy malware for espionage purposes. Dubbed “Operation Earth Kitsune” by Trend Micro, the campaign involves the use of SLUB (for SLack Continue Reading

Coles supermarkets across Australia closed after computers go offline | Coles

A nationwide IT shutdown has forced Coles supermarkets across Australia to clear out customers and close their doors. A Coles spokeswoman confirmed the outage on Friday afternoon, saying it had affected all 800 of the grocery giant’s stores across Australia. “Coles supermarkets are being closed temporarily due to a technical Continue Reading

New Flaws in Top Antivirus Software Could Make Computers More Vulnerable – Tempemail

Cybersecurity researchers today disclosed details of security vulnerabilities found in popular antivirus solutions that could enable attackers to elevate their privileges, thereby helping malware sustain its foothold on the compromised systems. According to a report published by CyberArk Labs today and shared with The Hacker News, the high privileges often Continue Reading

The 20 greatest home computers – ranked! | Games

20. Dragon 32 (1982) Manufactured by Swansea-based Dragon Data (an offshoot of traditional toy company, Mettoy), this 32k machine featured an advanced Motorola MC6809E central processor, decent keyboard and excellent analogue joypads. However, its eccentric graphics hardware gave every game a garish green tinge, and its most iconic gaming character Continue Reading

Apple ditches Intel for ARM processors in Mac computers with Big Sur | Technology

Apple has announced the biggest change heading to its Mac computers in 14 years: the dumping of Intel Inside. The company is ditching Intel’s traditional so-called x86 desktop chips for Apple’s own processors based on ARM designs – those used in smartphones and mobile tablets, including the iPhone and iPad. Continue Reading

New USBCulprit Espionage Tool Steals Data From Air-Gapped Computers – Tempemail

A Chinese threat actor has developed new capabilities to target air-gapped systems in an attempt to exfiltrate sensitive data for espionage, according to a newly published research by Kaspersky yesterday. The APT, known as Cycldek, Goblin Panda, or Conimes, employs an extensive toolset for lateral movement and information stealing in Continue Reading

7 New Flaws Affect All Thunderbolt-equipped Computers Sold in the Last 9 Years – Tempemail

A cybersecurity researcher today uncovers a set of 7 new unpatchable hardware vulnerabilities that affect all desktops and laptops sold in the past 9 years with Thunderbolt, or Thunderbolt-compatible USB-C ports. Collectively dubbed ‘ThunderSpy,’ the vulnerabilities can be exploited in 9 realistic evil-maid attack scenarios, primarily to steal data or Continue Reading

Malicious USB Drives Infect 35,000 Computers With Crypto-Mining Botnet – Tempemail

Cybersecurity researchers from ESET on Thursday said they took down a portion of a malware botnet comprising at least 35,000 compromised Windows systems that attackers were secretly using to mine Monero cryptocurrency. The botnet, named “VictoryGate,” has been active since May 2019, with infections mainly reported in Latin America, particularly Continue Reading