cyber criminals

Mon
17
Sep
Dennis Faas's picture

Explained: Is Ransomware a Real Threat? Should I worry?

Infopackets Reader Tina A. writes: " Dear Dennis, I've been reading articles on the Internet about cyber criminals breaking into computer networks, encrypting files and then demanding a ransom. I've also read that if I leave my computer connected to ... the Internet, I could be susceptible to ransomware. I don't know what to believe. So my question is: is ransomware a threat? Is ransomware malware? Should I be worried? " My response: This is a pretty big question to answer. The simple answer is that: yes , ransomware is a threat, and yes you can get infected with ransomware just by having your ... (view more)

Thu
06
Sep
John Lister's picture

New Firefox to Block Unwanted Tracking, Cryptojacking

Firefox is getting a series of updates to boost performance, privacy and usability. Unwanted tracking tools and browser hijackers are among the targets of security updates. Two of the biggest measures deal with websites that track user activity ... online, potentially to make site content more relevant, but more commonly to deliver targeted advertising. Version 63 of Firefox, due in September, will by default block ad trackers if they take a particularly long time to load, in turn making pages slow to appear. This setting is purely to do with the load time of the tracker rather than what it ... (view more)

Mon
20
Aug
Dennis Faas's picture

Samsung: Smartphones Most Secure for Cryptocurrencies

Samsung Provokes Debate with Claims that Smartphones Are The Most Secure for Cryptocurrencies Last month, leading Samsung author Joel Snyder penned a blog post in which he made the bold assertion that smartphones encompass the best security for ... owning, trading and managing cryptocurrency. He put this down to the Trusted Execution Environments (TEEs) in which smartphones, and particularly those developed by Samsung, operate. A trusted execution environment (TEE) is a secure area of a processor found on smartphones (not PCs), originally developed in 2010 by Open Mobile Terminal Platform ... (view more)

Wed
01
Aug
John Lister's picture

Google Bans Apps That Hijack Device Resources

Google is to ban several categories of apps from its app store. They include so-called "cryptomining" apps that can suck up a resources from a device for somebody else's financial benefits. The changes come in the latest update of the Play Store ... Developer Policy. The relevant apps will no longer be available through the official Play Store, meaning that although users can still install them, they'll get much less prominence and exposure. The ban is specifically on apps that use a device's processor for mining cryptocurrencies. In very simple terms, mining involves computers racing to solve a ... (view more)

Mon
11
Jun
Dennis Faas's picture

How to Fix: Computer / Network Infected with Ransomware (10 Steps)

Infopackets Reader Robert S. writes: " Dear Dennis, I have a network of computers I use for accounting purposes. Suddenly, many of my desktop icons started appearing to have strange names, such as ... '1HjgN1BdTZE3OIqorcj2E5b6CXIE=gdFae89IWgo0RrVfPbCHt851oogccs.ssimpotashka[at]gmail.com'. When I try to open these files, Windows warns me the file may be malicious. When I look in my Documents folder, I see more files similarly named to the one I just mentioned. Some of my .PDF files won't even open. On the desktop there is a text document that says ' HOW TO DECRYPT YOUR FILES.TXT ' - when I open ... (view more)

Wed
17
Jan
John Lister's picture

New Android Malware Most Powerful Yet

A newly discovered malware exploit offers hackers an incredible level of control and access. Fortunately the creators appear to be highly targeting their victims, though it's still a threat to ordinary users. Dubbed Skygofree, the malware affects ... users of the Android smartphone operating system. It is said to give the people behind the malware the ability to remotely carry out 48 different operations on an infected phone. These include targeted controls not previously seen, as well as more common malware exploitations. Some of the 'normal' options for the malware creators include the ability ... (view more)

Tue
15
Feb
Dennis Faas's picture

McAfee: Hackers Targeting Major Oil Companies

According to a recent report from security firm McAfee, Chinese cyber criminals have been leading coordinated and covert attacks on major Western energy companies since November 2009. McAfee, which has dubbed the cyber terrorism offensive 'Night ... Dragon', says oil and petrochemical firms have been affected. Perhaps the most surprising finding in the report is that many of these major companies, which have not been named, do not appear to have had particularly robust defense measures in place. "The attacks were not very sophisticated and did not use any zero-day exploits ," noted McAfee Labs ... (view more)

Subscribe to RSS - cyber criminals