HP CEO evokes James Bond-style hack via ink cartridges

SCHARON HARDING “Our long-term objective is to make printing a subscription.” Last Thursday, HP CEO Enrique Lores addressed the company’s controversial practice of bricking printers when users load them with third-party ink. Speaking to CNBC Television, he said, “We have seen that you can embed viruses in the cartridges. Through the cartridge, [the virus can] go to the printer, [and then] from the printer, go to the network.” That frightening scenario […]

read more

Former hacker says there are five main security mistakes everyone makes with their devices

Claire Reid A hacker has revealed the common security mistakes that loads of us make, leaving us vulnerable to criminals. Kieran Burge, is a security consultant at Prism Infosec, where he tests companies cybersecurity setups to check for any weaknesses. Speaking to the Daily Mail, he shared five mistakes that you may be making and how to keep yourself safe online. 1. Using out of date softwares on phones and computers As […]

read more

VexTrio: The Uber of Cybercrime – Brokering Malware for 60+ Affiliates

The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity known as VexTrio as part of a massive “criminal affiliate program,” new findings from Infoblox reveal. The latest development demonstrates the “breadth of their activities and depth of their connections within the cybercrime industry,” the company said, describing VexTrio as the “single largest malicious traffic broker described in security literature.” VexTrio, which is believed to be […]

read more

Cracked software beats gold: new macOS backdoor stealing crypto wallets

SERGEY PUZAN A month ago, we discovered some cracked apps circulating on pirating websites and infected with a Trojan proxy. The malicious actors repackaged pre-cracked applications as PKG files with an embedded Trojan proxy and a post-install script initiating the infection. We recently caught sight of a new, hitherto unknown, macOS malware family that was piggybacking on cracked software. The threat proved far more potent than an unauthorized proxy server installation. Stage […]

read more

North Korea’s ScarCruft Attackers Gear Up to Target Cybersecurity Pros

Tara Seals, Managing Editor, News, Dark Reading Based on fresh infection routines the APT is testing, it’s looking to harvest threat intelligence in order to improve operational security and stealth. ScarCruft, the North Korea-sponsored advanced persistent threat (APT) group, is gearing up for targeted attacks on cybersecurity researchers and other members of the threat intelligence community — likely in a bid to steal nonpublic threat intel and improve its operational […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.

Verified by MonsterInsights