Kaspersky Says Telegram Flaw Used For Cryptocurrency Mining (bloomberg.com) 42
According to Kaspersky Lab, hackers have been exploiting a vulnerability in Telegram's desktop client to mine cryptocurrencies such as Monero and ZCash. "Kaspersky said on its website that users were tricked into downloading malicious software onto their computers that used their processing power to mine currency, or serve as a backdoor for attackers to remotely control a machine," reports Bloomberg. From the report: While analyzing the servers of malicious actors, Kaspersky researchers also found archives containing a cache of Telegram data that had been stolen from victims. The Russian security firm said it "reported the vulnerability to Telegram and, at the time of publication, the zero-day flaw has not since been observed in messenger's products."
Re: (Score:2)
Er... they already are tantamount to gambling in the eyes of the Average Joe
So are stocks, bonds, and commodities. (Score:2)
Er... [crypto-currency coins are] already are tantamount to gambling in the eyes of the Average Joe
So are the stocks, bonds, and (other) commodities. So is insurance. So what?
Sweet (Score:2)
Sweet! What's Telegram?
Re: (Score:2)
Sweet! What's Telegram?
Same problem here. I thought they must be referring to a literal telegram. Whoever picked the name "telegram" for their company must have really thought they were slick when they got it, but it only makes them look like a relic from the 1800s.
Re: (Score:2)
Names of old pantheon gods got used up.
Decent and decently-short acronyms got used up.
Recursive acronyms got used up.
Puns got used up.
We're now stuck with arbitrary word-thing pairing.
We've been there since about the large-scale adoption of linux. Or haven't you noticed the arbitrary naming of major open source applications?
Comment removed (Score:3)
Since when is Telegram a Kaspersky product? (Score:2)
Kaspersky is disclosing a flaw their security researchers found in Telegram, which is not a Kaspersky product. The Telegram client code is open source, but that apparently hasn't stopped stupidity making it into the desktop client.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Alternate question: Why would anyone vote for Trump?
Because the most unelectable politician possible rigged her primary while getting the press to pied piper a gameshow host that was even more unelectable, only to have to murder a big fan of the person she screwed out of the primary because as a party employee he copied the emails from the party email system and gave them to wikileaks, an organization that still has never had to retract anything, delivering proof to the people that she was even worse than they had already thought rigging her primary, gettin
Re: (Score:2)
https://en.wikipedia.org/wiki/... [wikipedia.org]
GUI-lib developers rarely keep security in mind (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
If you are receiving an executable that way, there should be a warning. Better even, it should be renamed for safety. Just add an '_disabled_this_executable_' post(/pre)fix. Not everybody is into computers. Most Malware spreads by people downloading and clicking on it. Sometimes this takes out entire hospitals. Therefore, you have to keep this in mind when designing software. You can always have an op
Re: (Score:2)
Re: (Score:1)
creepy (Score:1)