"I would not wish this on anyone," says top surgeon.

In April, 2015, 30-year-old Russian man, Valery Spiridonov, announced that he will become the subject of the first human head transplant ever performed, saying he would volunteer to have his head removed and installed on another person's body.

If this sounds like some kind of sick joke, we're right there with you, but unfortunately, this was - and still might be - all too real.
An actor’s face is an instrument of depth and expression – a shifting facade that stands guardian to a well of unseen emotions, empathy and, just occasionally, a great lump of malicious binary code.

The code in today’s story is, no surprises, a cryptominer for grinding out Monero cryptocoins, and the face on the photo into which it was inveigled belongs to non other than hollywood star Scarlett Johansson.
Security researchers claimed to have discovered 13 critical Spectre/Meltdown-like vulnerabilities throughout AMD's Ryzen and EPYC lines of processors that could allow attackers to access sensitive data, install persistent malware inside the chip, and gain full access to the compromised systems.

All these vulnerabilities reside in the secure part of the AMD's Zen architecture processors and chipsets—typically where device stores sensitive information such as passwords and encryption keys and makes sure nothing malicious is running when you start your PC.
Google is celebrating Mario Day (March 10th, MAR10) in style this year. Nintendo and Google have partnered up to bring Mario to Google Maps on iOS or Android. Mario Time, as Google calls it, will be available in the latest Google Maps mobile apps starting today. A new yellow “?” icon will appear next to destinations, which will enable Mario to become the navigation arrow in his kart and accompany you along your commute.
Governments in Turkey and Syria have been caught hijacking local internet users' connections to secretly inject surveillance malware, while the same mass interception technology has been found secretly injecting browser-based cryptocurrency mining scripts into users' web traffic in Egypt.

Governments, or agencies linked to it, and ISPs in the three countries are using Deep Packet Inspection technology from Sandvine (which merged with Procera Networks last year), to intercept and alter Internet users' web traffic.
Two days ago, Microsoft encountered a rapidly spreading cryptocurrency-mining malware that infected almost 500,000 computers within just 12 hours and successfully blocked it to a large extent.

Dubbed Dofoil, aka Smoke Loader, the malware was found dropping a cryptocurrency miner program as payload on infected Windows computers that mines Electroneum coins, yet another cryptocurrency, for attackers using victims' CPUs.
On Wednesday, February 28, 2018, GitHub's code hosting website hit with the largest-ever distributed denial of service (DDoS) attack that peaked at record 1.35 Tbps.

Interestingly, attackers did not use any botnet network, instead weaponized misconfigured Memcached servers to amplify the DDoS attack.

Earlier this week we published a report detailing how attackers could abuse Memcached, popular open-source and easily deployable distributed caching system, to launch over 51,000 times powerful DDoS attack than its original strength.