Bradley Barth

 Send a message to Bradley Barth
Recent articles by Bradley Barth
Wikileaks releases CIA tool set which help malware onto air-gapped PCs 

Wikileaks releases CIA tool set which help malware onto air-gapped PCs

WikiLeaks has dumped more leaked CIA documents with its latest Vault 7 disclosures, this time publishing materials from a tool suite called Brutal Kangaroo that allows attackers to indirectly infiltrate a closed network or air-gapped computer using a compromised flash drive.
Hackers post plastic surgery clinic's patient files after blackmail campaign 

Hackers post plastic surgery clinic's patient files after blackmail campaign

Hackers have publicly posted more than 25,000 files and private images stolen from a Lithuanian plastic surgery clinic.
New malware steals cookies and hijacks WordPress sessions 

New malware steals cookies and hijacks WordPress sessions

Sucuri researchers recently observed a malware attack that injected obfuscated code into a JavaScript file in order to steal web users' cookies and hijack their WordPress sessions.
Late 2016 marks start of WhatsApp encryption back-ups to iCloud Drive  

Late 2016 marks start of WhatsApp encryption back-ups to iCloud Drive

Facebook added another layer of protection for users of its WhatsApp encrypted mobile messaging service in late 2016.
Execution of largest hack in YouTube history claimed by OurMine 

Execution of largest hack in YouTube history claimed by OurMine

The OurMine hackers known for hijacking online social media accounts, supposedly to test their security, executed what it's calling the largest hack in YouTube history.
Scammers create fake emulators for new Nintendo gaming platform 

Scammers create fake emulators for new Nintendo gaming platform

A YouTube page that supposedly allows visitors to download a Nintendo Switch emulator program actually installs a downloader that introduces a potentially unwanted application called OneSystemCare.
Malicious apps make nearly a million Minecrafters feel like blockheads  

Malicious apps make nearly a million Minecrafters feel like blockheads

ESET researchers found 87 fake Minecraft mod apps that either redirected users to scam websites or were actually an aggressive ad-displaying downloader.
Mac malware reportedly first to infect machines using macros 

Mac malware reportedly first to infect machines using macros

Researchers have identified what they believe is the first in-the-wild instance of hackers using malicious macros in Word documents to execute malware on Mac computers, instead of Windows-based machines.
WordPress pages defaced following patched bug disclosure 

WordPress pages defaced following patched bug disclosure

More than 100,000 WordPress web pages have been defaced, following last week's public disclosure of a patched vulnerability that allows attackers to remotely modify the content of pages and posts.
Gooligan ad fraud malware infects 1.3 million Android users, installs over 2 million unwanted apps 

Gooligan ad fraud malware infects 1.3 million Android users, installs over 2 million unwanted apps

A newly discovered malware program that targets older versions of the Android OS has infected roughly 1.3 million Google accounts, currently breaching devices at a rate of 13,000 victims per day.
Malware turns headphones into mics for eavesdropping 

Malware turns headphones into mics for eavesdropping

Headphones plugged into a computer's audio output jack can be converted into a microphone that secretly records nearby conversations by modifying the device's software via malware, according to a new research report.
Hacked in 98 seconds: Expert's camera rapidly infected by IoT malware 

Hacked in 98 seconds: Expert's camera rapidly infected by IoT malware

A security expert who hooked up an internet-connected surveillance camera for research purposes reported via Twitter on Friday that the device was compromised by IoT malware after just 98 seconds of being online.
Al Jazeera game simulates journalists' risky role in Syrian cyber conflict 

Al Jazeera game simulates journalists' risky role in Syrian cyber conflict

Al Jazeera has launched a new mobile game #Hacked - Syria's Electronic Armies, in which the player assumes the role of an investigative journalist tasked with discovering the identities of pro-Syrian government hackers.
Researcher rewarded for finding Facebook Business Manager account takeover flaw 

Researcher rewarded for finding Facebook Business Manager account takeover flaw

Security researcher Arun Sureshkumar earned $16,000 after disclosing a vulnerability in Facebook Business Manager that, if exploited, could have allowed attackers to take over a targeted victim's Facebook page.
What's behind backdoor #3? Mac version of Mokes malware follows Linux, Windows variants 

What's behind backdoor #3? Mac version of Mokes malware follows Linux, Windows variants

Kaspersky Lab today released an analysis of a newly discovered version of Mokes - a malicious, cross-platform backdoor with spying functionality - this one targeting Apple's OS X operating system.
Survey: Hackers believe strongly in privacy... unless they're paid to crack passwords  

Survey: Hackers believe strongly in privacy... unless they're paid to crack passwords

Four out of five surveyed hackers agreed that Apple was right to refuse the FBI's request for a backdoor into the San Bernardino shooter's iPhone.
Privacy organisations launch index to track surveillance tech sales 

Privacy organisations launch index to track surveillance tech sales

So that's who's watching the watchers...
100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics 

100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics

In its new special report Ransomware and Businesses 2016, Symantec declares that within the last year, ransomware has rapidly advanced in maturity and severity, while also exploding in terms of overall numbers.
Wearables can reveal your passwords by measuring slight arm movements 

Wearables can reveal your passwords by measuring slight arm movements

Researchers have proven that sensors in wearable electronics can be exploited to measure minute movements in users' arms in an effort to decipher keystrokes and PIN codes that they enter into computers and ATMs.
Eleanor Mac malware opens Tor connection for attackers to spy on and control Macs 

Eleanor Mac malware opens Tor connection for attackers to spy on and control Macs

A newly discovered malware capable of cyberespionage and remote takeover is targeting Mac computers, delivering its payload by opening up a backdoor connection to a command-and-control web server via the encrypted Tor network.

Latest Comments

From our Partners

PC & Tech Authority Downloads