Security

Thu
13
Jul
John Lister's picture

Kaspersky Labs Accused of Working for Russian Spies

Russian-based antivirus company Kaspersky Labs has denied working with intelligence agencies in Russia. The denial follows a crackdown on US government agencies using the company's software. The claims follow a series of previously unpublished ... emails sent in 2009 between company founder Eugene Kaspersky and colleagues. They mention a secret project "per a big request on the Lubyanka side." That's a reference to the headquarters of the FSB, the Russian security agency that's the modern-day equivalent of the KGB. In principle the project was to work on defensive software for the FSB, protecting ... (view more)

Thu
06
Jul
John Lister's picture

iPhones Could Get Facial Recognition

Apple is working on facial recognition as an iPhone security measure. It's said to be have it ready for this year's iPhone 8, but may wait until the feature has been fully tested and complete. The idea is to replace fingerprint scanning for ... unlocking the phone. It's not yet confirmed if and when the facial recognition would be extended to other uses, such as using Apple Pay rather than have to type in card details or a PIN code. According to a Bloomberg source, the face unlock takes less than half a second to scan a face, confirm its identity and unlock the phone. The feature ... (view more)

Tue
04
Jul
John Lister's picture

Windows 10 Gets Anti-Ransomware Feature

Microsoft is adding a new feature to Windows 10 that could make it harder for ransomware to lock up files. It could be useful, but is certainly not a complete defense. The feature, called "Controlled Folder Access," is part of the Windows Defender ... security tool and is already being tested by users who've volunteered for advanced access to Windows 10 updates. The idea is that specific folders can be protected which means that only specified applications or programs can create, alter or delete files in those folders. This includes encrypting the files, which is the key tactic ... (view more)

Wed
28
Jun
John Lister's picture

Windows Bug Exploited Again by Ransomware

Businesses around the world are reporting computer problems that appear to be another rapidly-spreading ransomware attack. It appears likely to be exploiting the same Windows flaw as the recent WannaCry attack. Details were still emerging at the ... time of writing, but high profile businesses including drug giant Merck, a British advertising agency and a Danish shipping company are known to have been compromised. Ukraine's government network also appears to have been hit. (Source: nytimes.com ) File Index Compromised As with WannaCry, the malware appears to be designed to lock up and encrypt ... (view more)

Wed
14
Jun
John Lister's picture

Patch Your PC: Yet Another Massive Exploit Discovered

Microsoft has issued three updates to fix flaws in older, unsupported versions of Windows. It's an unusual move that follows the discovery that both the National Security Agency (NSA) and outside hackers are exploiting the flaws , similar to the one ... that allowed the WannaCry Ransomware worm to spread just a few weeks ago. The updates cover both Windows and Windows Server editions going right back to XP . They'll be issued through the usual automated updates, which means people on Windows 8.1 and later shouldn't need to do anything. Those on earlier systems may need to manually ... (view more)

Tue
13
Jun
John Lister's picture

Malware Threatens Power Grids

Russian-backed hackers appear to have the ability to remotely shut down power stations, researchers claim. However, the cyber weapon appears to only have been successfully deployed once so far. Two companies, Dragos Inc and ESET, have revealed their ... analysis of malware that was used in an attack on a transmission station in Kiev, the Ukrainian capital, last December. The outage lasted for an hour and blacked out buildings that normally use 20 percent of the city's electricity. (Source: washingtonpost.com ) Malware Easily Customized The researchers say the malware, which they've dubbed ... (view more)

Tue
30
May
John Lister's picture

Android Phones Hijacked for Ad Scam

Tens of millions of Android devices may have been infected by rogue apps that found a way past Google's security checks. The 'Judy' malware came through apps in the official Google Play store. Google makes a big deal about its Play Store being a ... safe place to get apps. If an app is obtained from another source other that the Play Store, users must specifically confirm any associated risk during app installation. That makes it particularly embarrassing for Google, considering that the Judy malware was able to slip through its security checks. The malware in question has been dubbed ... (view more)

Thu
25
May
John Lister's picture

Eye and Voice Logins Compromised

Two biometric security measures have come into question after reporters and researchers claimed to have overcome them. A phone's iris recognition and a bank's voice log-in both appear to be less than perfectly secure. The Samsung Galaxy S8 - ... arguably the most high-profile and hyped phone currently running the Android system - includes an option to unlock the phone by simply looking at the camera. In a similar way to fingerprint recognition, it works on the idea that the patterns in the eye's iris are unique. Samsung described these patterns as "virtually impossible to ... (view more)

Wed
24
May
John Lister's picture

WannaCry Ransom Worm Creators Blamed for Two Previous Attacks

Security researchers say its highly likely hackers linked to North Korea were responsible for the recent widespread WannaCry ransomware attack . The same group, dubbed Lazarus, was previously blamed for two other high profile online attacks. ... According to security firm Symantec, the WannaCry attacks bore five distinct hallmarks of previous attacks thought to be the work of the Lazarus group. This includes shared code such as that used to spread the malware from machine to machine. Other common factors include the same IP address being used to issue commands to infected machines, and similar ... (view more)

Tue
16
May
John Lister's picture

WannaCry Ransomware Worm: What You Need to Know

Beginning Friday, May 12, 2017, reports surfaced of a new Internet worm capable of infecting Windows machines instantaneously. The worm has been dubbed "WCRY" or "WannaCry" because of its malicious intent to install ransomware on the target machine. ... The Internet worm was made possible because of a leaked NSA (national security agency) document which essentially explained how to carry out the exploit. In this case, the malicious software locks computers such that their files are encrypted and cannot be accessed unless the victim pays a ransom (and the culprits then stand by ... (view more)

Pages

Subscribe to RSS - Security