Bradley Barth

 Send a message to Bradley Barth
Recent articles by Bradley Barth
Mac malware reportedly first to infect machines using macros 

Mac malware reportedly first to infect machines using macros

Researchers have identified what they believe is the first in-the-wild instance of hackers using malicious macros in Word documents to execute malware on Mac computers, instead of Windows-based machines.
WordPress pages defaced following patched bug disclosure 

WordPress pages defaced following patched bug disclosure

More than 100,000 WordPress web pages have been defaced, following last week's public disclosure of a patched vulnerability that allows attackers to remotely modify the content of pages and posts.
Gooligan ad fraud malware infects 1.3 million Android users, installs over 2 million unwanted apps 

Gooligan ad fraud malware infects 1.3 million Android users, installs over 2 million unwanted apps

A newly discovered malware program that targets older versions of the Android OS has infected roughly 1.3 million Google accounts, currently breaching devices at a rate of 13,000 victims per day.
Malware turns headphones into mics for eavesdropping 

Malware turns headphones into mics for eavesdropping

Headphones plugged into a computer's audio output jack can be converted into a microphone that secretly records nearby conversations by modifying the device's software via malware, according to a new research report.
Hacked in 98 seconds: Expert's camera rapidly infected by IoT malware 

Hacked in 98 seconds: Expert's camera rapidly infected by IoT malware

A security expert who hooked up an internet-connected surveillance camera for research purposes reported via Twitter on Friday that the device was compromised by IoT malware after just 98 seconds of being online.
Al Jazeera game simulates journalists' risky role in Syrian cyber conflict 

Al Jazeera game simulates journalists' risky role in Syrian cyber conflict

Al Jazeera has launched a new mobile game #Hacked - Syria's Electronic Armies, in which the player assumes the role of an investigative journalist tasked with discovering the identities of pro-Syrian government hackers.
Researcher rewarded for finding Facebook Business Manager account takeover flaw 

Researcher rewarded for finding Facebook Business Manager account takeover flaw

Security researcher Arun Sureshkumar earned $16,000 after disclosing a vulnerability in Facebook Business Manager that, if exploited, could have allowed attackers to take over a targeted victim's Facebook page.
What's behind backdoor #3? Mac version of Mokes malware follows Linux, Windows variants 

What's behind backdoor #3? Mac version of Mokes malware follows Linux, Windows variants

Kaspersky Lab today released an analysis of a newly discovered version of Mokes - a malicious, cross-platform backdoor with spying functionality - this one targeting Apple's OS X operating system.
Survey: Hackers believe strongly in privacy... unless they're paid to crack passwords  

Survey: Hackers believe strongly in privacy... unless they're paid to crack passwords

Four out of five surveyed hackers agreed that Apple was right to refuse the FBI's request for a backdoor into the San Bernardino shooter's iPhone.
Privacy organisations launch index to track surveillance tech sales 

Privacy organisations launch index to track surveillance tech sales

So that's who's watching the watchers...
100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics 

100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics

In its new special report Ransomware and Businesses 2016, Symantec declares that within the last year, ransomware has rapidly advanced in maturity and severity, while also exploding in terms of overall numbers.
Wearables can reveal your passwords by measuring slight arm movements 

Wearables can reveal your passwords by measuring slight arm movements

Researchers have proven that sensors in wearable electronics can be exploited to measure minute movements in users' arms in an effort to decipher keystrokes and PIN codes that they enter into computers and ATMs.
Eleanor Mac malware opens Tor connection for attackers to spy on and control Macs 

Eleanor Mac malware opens Tor connection for attackers to spy on and control Macs

A newly discovered malware capable of cyberespionage and remote takeover is targeting Mac computers, delivering its payload by opening up a backdoor connection to a command-and-control web server via the encrypted Tor network.
OurMine hackers take Uber CEO's Twitter page for a joyride 

OurMine hackers take Uber CEO's Twitter page for a joyride

Last night, Uber CEO Travis Kalanick became the latest public target of the OurMine hacking group, which posted an unauthorized message on his Twitter page, likely after hijacking his linked Quora account.
Blasphemy! Godless malware preys on nearly 90 percent of Android devices 

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.
Apple fixes memory corruption vulnerability in AirPort product line 

Apple fixes memory corruption vulnerability in AirPort product line

Addressing a vulnerability that could have potentially resulted in remote code execution, Apple yesterday announced a firmware update for several of its AirPort Wi-Fi products.
New Locky ransomware campaign sets sights on Amazon customers 

New Locky ransomware campaign sets sights on Amazon customers

Amazon customers are the target of a wide-ranging phishing email scam intended to fool recipients into opening up a malicious attachment that results in the downloading of Locky ransomware.
Attackers inject code into WordPress header file to redirect users  

Attackers inject code into WordPress header file to redirect users

When blogs attack!
Localised "designer" malware campaigns all the rage, says Sophos 

Localised "designer" malware campaigns all the rage, says Sophos

Criminal outfits are increasingly distributing "designer" spam and malware, customised to optimally target victims in specific geographic regions, according to new research from Sophos' research division, SophosLabs.
11 percent of machines still using defunct Windows XP despite it no longer being supported 

11 percent of machines still using defunct Windows XP despite it no longer being supported

Exactly two years ago, Microsoft's Windows XP operating system reached its end of life with no further updates.

Latest Comments

From our Partners

PC & Tech Authority Downloads