Archive for February 2nd, 2018

Siemens fixed three flaws in plant management product Siemens TeleControl Basic system

Your Feed is from https://www.safeharboroncyber.com/Blog/ CyberWisdom Safe Harbor Commentary: This story from securityaffairs.co reviews that Siemens has fixed three security holes in its plant management product, the Siemens TeleControl base system.The system is used in water treatment facilities, traffic monitoring systems, and energy distribution plants....
Continue reading »

Spritecoin ransomware masquerades as cryptocurrency wallet and also harvests victim’s data

Your Feed is from https://www.safeharboroncyber.com/Blog/ CyberWisdom Safe Harbor Commentary on Spritecoin Ransomware Securityaffairs.co mentions a hidden ransomware called Spritecoin ransomware. Fortinet discovered a ransomware called Spritecoin ransomware that only allows Monero, the victim, to pay and pretend to be a cryptocurrency-related password store. Researchers from the Fortinet FortiGuard...
Continue reading »

Cryptocurrency HACKERS use YOUTUBE to target computers for bitcoin and ripple mining

Your Feed is from https://www.safeharboroncyber.com/Blog/ CyberWisdom Safe Harbor Commentary on Cryptocurrency HACKERS use YOUTUBE Express.co.uk reveals an interesting fact that Cryptocurrency HACKERS uses YOUTUBE to target computers for bitcoin and ripple mining’ Hackers have been targeting users of YouTube to exploit cryptocurrencies such as bitcoin by attacking their...
Continue reading »

Malware POC Analysis exploiting Spectre and Meltdown flaws

Your Feed is from https://www.safeharboroncyber.com/Blog/ CyberWisdom Safe Harbor Commentary on Spectre POC Malware Analysis I couldn’t believe this story from securityaffairs.co that believes Malware exploits Spectre, crash flaws may come by proof-of-concept analysis. Researchers at AV-TEST, an anti-virus testing company, have uncovered more than 130 malware...
Continue reading »

Top 10 Tips to Protect you from Identity Theft

Your Feed is from https://www.safeharboroncyber.com/Blog/ Malicious actor causing identity theftTop 10 Tips for Identity Theft Protection Identity thieves use your personal information without your knowledge. The thief may use your name to recover debt and even commit crimes. The following tips can help you reduce...
Continue reading »

Ad