Feed aggregator

Gmail’s New Encrypted Messages Feature Opens a Door for Scams

Wired Security - Thu, 04/24/2025 - 12:00pm
Google is rolling out an end-to-end encrypted email feature for business customers, but it could spawn phishing attacks, particularly in non-Gmail inboxes.
Categories: Wired Security

Best Internet Providers in Morgantown, West Virginia

CNET Feed - Thu, 04/24/2025 - 11:36am
CNET helps you pick out the best internet service provider in Morgantown to meet all your requirements, including speed, budget and availability.
Categories: CNET

Microsoft Offers Underperformers Cash To Quit

SlashDot - Thu, 04/24/2025 - 11:26am
Categories: SlashDot

M&S is still unable to provide contactless payment or click-and-collect services amid a cyber attack that it says has forced it to move a number of processes offline to safeguard its customers, staff and business

Computer Weekly Feed - Thu, 04/24/2025 - 11:26am
M&S is still unable to provide contactless payment or click-and-collect services amid a cyber attack that it says has forced it to move a number of processes offline to safeguard its customers, staff and business
Categories: Computer Weekly

Recent security updates in VMware products have highlighted the challenge IT decision-makers face as they navigate Broadcom licensing changes

Computer Weekly Feed - Thu, 04/24/2025 - 11:26am
Recent security updates in VMware products have highlighted the challenge IT decision-makers face as they navigate Broadcom licensing changes
Categories: Computer Weekly

Amid Backlash Over Meta AI in WhatsApp, Advanced Chat Privacy Feature Rolls Out

CNET Feed - Thu, 04/24/2025 - 11:23am
Meta says users can enable the feature to keep specific conversations away from the company's AI features.
Categories: CNET

Mock Interviews and Unlimited Tailored Resumes

Hacker News - Thu, 04/24/2025 - 11:21am

Article URL: https://www.resumatch.io

Comments URL: https://news.ycombinator.com/item?id=43783877

Points: 1

# Comments: 0

Categories: Hacker News

Zoom attack tricks victims into allowing remote access to install malware and steal money

Malware Bytes Security - Thu, 04/24/2025 - 11:18am

Be careful when talking to people you’ve not met with before over the Zoom video conferencing system; you might get more than you bargained for. Two CEOs were recently targeted by a Zoom-based attack. One spotted it in time – and sadly, one did not.

The attack is by a crime group that the Security Alliance call ELUSIVE COMET in a warning about the threat last month. ELUSIVE COMET targets its victims by luring them into a Zoom video call and then taking over their PC to install malware, infiltrate their accounts, and steal their assets.

The group typically approaches victims with a supposed media opportunity to get them interested, and then sets up an introductory Zoom call. During that video meeting, the attacker keeps their screen switched off, but sends a remote control request to the victim.

Remote control is a feature in the Zoom app that allows someone else to take control of your PC. It’s great if, for example, you’re not very tech-savvy and you want your grandchild to fix your computer from the other side of the country. It’s less good if you agree to a remote control request from someone you don’t know – especially if you don’t know you’re doing so.

That’s what happens to victims during their fraudulent call from ELUSIVE COMET. When the remote control request comes through to the victim, the notification says “<Participant> is requesting remote control of your system” where <Participant> is the participant’s screen name. In this takeover attempt, the attacker changes their screen name to ‘Zoom’ before sending the remote control request so it appears as though the app itself is requesting control.

Some rushed or distracted people might assume that’s a valid request from the app, perhaps as a precursor to recording a call or displaying new content. If the victim accepts, it’s game over, and the attacker can take full control of the victim’s system.

Zoom takeovers in action

ELUSIVE COMET tried this trick on the CEO of cybersecurity consulting company Trail of Bits, but it didn’t work on him. After receiving an invitation to appear on “Bloomberg Crypto,” he suspected something was amiss.

The attackers approached him via the X social media network and refused to switch to email when asked. Then they used a third-party booking system called Calendly to arrange the call. While Calendly is a legitimate service, the attackers hadn’t branded their Calendly pages with Bloomberg’s logo, which the CEO felt was suspicious. After checking into some of the data gathered on the group in the Security Alliance advisory, the CEO realized what was happening.

Sadly, that wasn’t the case for Jake Gallen, who owns a cryptocurrency company called Emblem Vault. As he describes in a postmortem thread on X earler this month, he also got a media invitation from an X account, this time called @tacticalinvest_, to appear on a podcast. He took the bait.

“While the interview was ongoing @tacticalinvest_ was downloading malware on my computer known as goopdate,” he reports, “which was powerful enough to steal >$100k in digital assets from my Bitcoin and Ethereum wallets, as well as log into my twitter, gmail, and other accounts.”

Gallen did his due diligence. Before he took the meeting, he did some research and found that the account had a large audience, with a history of consistent posts and videos. There was also a YouTube account. This illustrates just how sneaky some of these attackers can be, and how even tech-savvy people can be duped.

While you might not be a business owner or influencer looking for exposure, it’s worth paying attention to who you let into Zoom meetings, and who you give control of the meeting to. Let’s not also forget that there’s an ongoing trend of people ‘Zoombombing’ by infiltrating others’ meetings.

How to stay safe

One of the easiest approaches is to avoid installing Zoom’s app and simply use it in the browser where possible. Running Zoom in the browser limits its functionality, including not allowing remote control of your system. Zoom gives you this option when you attempt to join a meeting without opening the app.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Categories: Malware Bytes

Show HN: I'm Sad (100% Claude Coded)

Hacker News - Thu, 04/24/2025 - 11:14am

Just a little concept I had for a while and I decided to whip it up in the last two nights exclusively using Claude Code. Give it a try please and let me know any feedback! Also please share to 100,000 of your closest friends.

Thanks!

Comments URL: https://news.ycombinator.com/item?id=43783810

Points: 1

# Comments: 0

Categories: Hacker News

Ask HN: Assessment tools for early employees/CTOs?

Hacker News - Thu, 04/24/2025 - 11:14am

Does anyone have any suggestions for a simple, reasonably quick (for the candidate) service focusing on 'core skills' like aptitude, reasoning, communication and personality type?

We're in the process of hiring our first hire - this is a software engineer who will ideally grow into a CTO and a co-founder.

The market for 'candidate assessment' is very corporate and includes things like anti-cheating systems and tech tests - I think both of these would be off-putting, useless and condescending for the type of candidates I'm trying to attract.

Comments URL: https://news.ycombinator.com/item?id=43783806

Points: 1

# Comments: 0

Categories: Hacker News

Uber and VW Team Up to Bring Robotaxis to a US City Near You

CNET Feed - Thu, 04/24/2025 - 11:12am
The fleet of ID. Buzz AD electric minivans will descend first on LA in 2026.
Categories: CNET

Show HN: I built a tool that uses AI to turn messy feedback into clear insights

Hacker News - Thu, 04/24/2025 - 11:07am

I built a tool that makes sense of all the messy feedback you get—whether it’s from users, customers, or anyone else. You know how feedback can be a total mess? Think emails, comments, reviews—all over the place. My tool uses AI to dig through that chaos and pull out the good stuff. It sorts everything, spots patterns, and gives you clear, useful insights you can actually act on. No more guessing or drowning in noise—it’s like having a smart helper that turns feedback into a simple plan. Excited to share it with you all!

Comments URL: https://news.ycombinator.com/item?id=43783729

Points: 2

# Comments: 0

Categories: Hacker News

Pages