malware

Wed
03
Apr
John Lister's picture

Microsoft adds 'Tamper Protection' to Windows Defender

Microsoft will add a "tamper protection" feature to the built in antivirus tools in an upcoming Windows 10 update. It's designed to stop malware from switching off key security features in Microsoft Defender. Initially the changes will be available ... for Microsoft Defender Advanced Threat Protection, which is a subscription service for businesses. However, Microsoft appears to have revealed it will later become available to home users of Windows 10. (Source: zdnet.com ) The idea is to prevent rogue apps from disabling some of the weapons in the Microsoft Defender arsenal, in turn making it far ... (view more)

Fri
29
Mar
Dennis Faas's picture

Scammed by Right PC Experts? Here's What to Do

Infopackets Reader Cindee T. writes: " Dear Dennis, The other day I was using my web browser and suddenly received a message that my computer was infected and to call 855-551-7666 to have it fixed. There was no way to close the warning screen - I ... was scared and didn't know what to do! I called the number and spoke to ' Right PC Experts ' ( rightpcexperts.com ). The person I spoke to had a very thick Indian accent . To fix the virus warning, he remotely logged into my computer and installed a bunch of security programs, by the names of 'Anti hacking', 'Email Security', 'Network Firewall' and ' ... (view more)

Wed
27
Mar
John Lister's picture

Apple Devices Need 51 Important Security Updates

Apple has released a patch for mobile devices which covers 51 security flaws. It's sparked debate over Apple's security levels and the way it issues such updates. The patch is for iOS, taking it up to version 12.2. Apple doesn't issue standalone ... security updates. Instead, it builds it into the main update for the system, which also includes new features or bug fixes. (Source: apple.com ) The most notable fix is a bug in an API (application program interface), which lets third party software interact with Apple services. In this case, the API bug could allow malware to access an iPhone, iPad ... (view more)

Mon
25
Mar
John Lister's picture

ASUS Automatic Updates Compromised by Hackers

PC and laptop manufacturer ASUS unwittingly installed malware on its customers' laptops, according to a cyber security company. The malware went out to around a million people, yet appears to have been a highly targeted attack. The claims come from ... Kaspersky Lab, with rival firm Symantec confirming it has found similar evidence of the attack. At the time of writing, ASUS has yet to comment publicly on the claims. (Source: kaspersky.com ) According to Kaspersky Lab, the hackers took advantage of ASUS Live Update Utility. That's a tool by which ASUS automatically updates software on laptops, ... (view more)

Wed
20
Feb
John Lister's picture

Report: Most Password Managers Not Secure

Security researchers say some major password manager tools could be flawed. But they also say it's still sensible to use them, just with a degree of caution. It's a fact that using the same password for multiple sites is a massive security risk. ... That's because if one site gets hacked, it could mean that hackers can use the same password on another website to gain access to potentially sensitive information, resulting in identity theft or financial loss. Password manager tools (such as Roboform and Dashlane ) aim to overcome two big dilemmas with online passwords - which is keeping passwords ... (view more)

Thu
14
Feb
John Lister's picture

Popular VPN App Laced with Malware, Steals Data

Security researchers have warned a notorious piece of malware has returned to Android. It's in disguise, posing as a legitimate and popular VPN application. Researchers at the security firm Bitdefender have dubbed the malware as "Triout," which was ... first spotted last August. It's a particularly nasty piece of malware as it carries out multiple hostile acts. (Source: bitdefender.com ) These include recording phone calls, reading incoming SMS messages, taking pictures and videos, and collecting location data such as GPS coordinates. Triout is designed to operate without being detected ... (view more)

Tue
29
Jan
John Lister's picture

Malware Makers Set Sights On Motion Sensor

An extremely creative form of malware on Android devices uses motion sensors to help stay undetected. It's designed to combat one of the key methods used by malware scanning tools. Trend Micro says it found the malware hidden in two Google Play ... Store apps named "BatterySaverMobi" and "Currency Converter," which claimed to provide functions as their names suggest. (Source: arstechnica.com ) Once installed, the apps downloaded malware in the background, then used a fake system update message to trick the user into giving permission to install it. The malware, named " ... (view more)

Fri
26
Oct
Dennis Faas's picture

How to Fix: Activation Key Damaged (Scam)

Infopackets Reader Jack F. writes: " Dear Dennis, My Edge web browser randomly displays a security alert stating that 'The server www[dot]mariopullmesdas.info is asking for your user name and password. The page reports an error code of 0x80070424, ... then says that my 'Activation key is damaged'. To fix the problem I need to call the Microsoft Help Desk at (855)-684-9323. A computer generated voice says that my computer will keep restarting every few minutes if I don't fix the problem and that my personal data is at risk. What do I do? " My response: This is a web browser fake tech support scam ... (view more)

Thu
04
Oct
John Lister's picture

Google Cracks Down On Browser Scams

Google is taking several more steps to make browser extensions safer. It's giving users more control and cracking down on some common rogue practices. The changes are to Chrome's extensions. Also known as add-ons with some browsers, extensions are ... third-party tools designed to improve the online experience using a web browser. For example, an Amazon extension lets users send text on a web page (such as a lengthy article) straight to their Kindle e-reader as a document with one click. By nature, extensions need some degree of access to and control over Chrome itself, which sometimes means the ... (view more)

Mon
17
Sep
Dennis Faas's picture

Explained: Is Ransomware a Real Threat? Should I worry?

Infopackets Reader Tina A. writes: " Dear Dennis, I've been reading articles on the Internet about cyber criminals breaking into computer networks, encrypting files and then demanding a ransom. I've also read that if I leave my computer connected to ... the Internet, I could be susceptible to ransomware. I don't know what to believe. So my question is: is ransomware a threat? Is ransomware malware? Should I be worried? " My response: This is a pretty big question to answer. The simple answer is that: yes , ransomware is a threat, and yes you can get infected with ransomware just by having your ... (view more)

Pages

Subscribe to RSS - malware