google-site-verification: google30a059f9a075f398.html

Day: February 2, 2018

Siemens fixed three flaws in plant management product Siemens TeleControl Basic system

CyberWisdom Safe Harbor Commentary: This story from securityaffairs.co reviews that Siemens has fixed three security holes in its plant management product, the Siemens TeleControl base system.The system is used in water treatment facilities, traffic monitoring systems, and energy distribution plants. TeleControl Basic Control Center runs TeleControl Server Basic software. Siemens TeleControl Basic system enables organizations

Spritecoin ransomware masquerades as cryptocurrency wallet and also harvests victim’s data

CyberWisdom Safe Harbor Commentary on Spritecoin Ransomware Securityaffairs.co mentions a hidden ransomware called Spritecoin ransomware. Fortinet discovered a ransomware called Spritecoin ransomware that only allows Monero, the victim, to pay and pretend to be a cryptocurrency-related password store. Researchers from the Fortinet FortiGuard lab discovered a ransomware that only allows victims Monero to pay and pretend to be

Cryptocurrency HACKERS use YOUTUBE to target computers for bitcoin and ripple mining

CyberWisdom Safe Harbor Commentary on Cryptocurrency HACKERS use YOUTUBE Express.co.uk reveals an interesting fact that Cryptocurrency HACKERS uses YOUTUBE to target computers for bitcoin and ripple mining’ Hackers have been targeting users of YouTube to exploit cryptocurrencies such as bitcoin by attacking their computers with video-platform advertising services. The issue was believed to be the first to be

Malware POC Analysis exploiting Spectre and Meltdown flaws

CyberWisdom Safe Harbor Commentary on Spectre POC Malware Analysis I couldn’t believe this story from securityaffairs.co that believes Malware exploits Spectre, crash flaws may come by proof-of-concept analysis. Researchers at AV-TEST, an anti-virus testing company, have uncovered more than 130 malware samples specifically developed to exploit the Spectre and Meltdown CPU vulnerabilities. The good news is

Ransomware Scammers Get Scammed Themselves By Tor Proxy Hack, called LockerR

CyberWisdom Safe Harbor Commentary LockerR: A must-read story from extremetech.com mentions a hidden ransomware is the most cunning and frustrating malware that flows on the Internet. These programs lock your files by encrypting and threatening to delete them unless you pay for a ransom of encrypted currency. Victims cannot stop the attack, so many people

Five ways to check if your router is configured securely

CyberWisdom Safe Harbor Commentary on router configured securely: A must-read story from welivesecurity.com details five ways to check if your router is configured securely. Below are some of the security issues users should focus on in their home networks, especially security issues related to routers connected to the Internet.  Five ways router configured securely 1.