Security

Wed
22
Jul
John Lister's picture

Smart Devices May Be Governed by Laws

Politicians on both sides of the Atlantic are considering laws to tighten cyber security for the so-called Internet of Things (IoT). The rules would cover devices that aren't traditional computers or phones but still connect to the Internet. The ... United States Congress is considering the Internet of Things Cyber Security Improvement Act. It's been examined by a Senate committee and is currently awaiting a date to be examined by the Senate as a whole. However, there's no guarantee it will be heard before the end of the year and newly elected or re-elected Senators taking their seats. Agency To ... (view more)

Tue
21
Jul
John Lister's picture

Android Hit By New Banking Malware

A new strain of Android malware targets both social media accounts and online banking. It's a reminder of the risks of installing software from outside of the official Google Play store. The malware is dubbed BlackRock and appears to ultimately ... derive from the code used in an attack called LokiBot. Now thought to be inactive, LokiBot attempted to gain access to financial accounts through banking and related apps. One technique involved using automated scripts to login to a PayPal account and transfer money to the scammers. (Source: threatfabric.com ) BlackRock looks to take the same tactics ... (view more)

Wed
15
Jul
John Lister's picture

Windows 10 May Get Key Security Boost

Microsoft is testing a new Windows 10 security measure that could neutralize a malware technique. It's called Kernel Data Protection and will protect part of a computer's memory from tampering. The idea is to protect two key software parts of a ... computer: the operating system kernel and drivers. The kernel is the most central part of a system and acts a little like a central command point, deciding what the computer does at any precise moment. Meanwhile, drivers control the way the operating system communicates and interacts with hardware devices. Within the computer's memory, the kernel is ... (view more)

Tue
14
Jul
John Lister's picture

'Winky Face' Email Takes Control of PCs

An email with a "winky face" for a subject line has helped a malware campaign become one of the most widespread in the world. It's a scam to expand the reach of the Phorpiex botnet which distributes spam and malware from infected machines to others ... online the Internet. According to researchers at security company Check Point, Phorpiex jumped from the 13th most detected malware campaign in May to the number two slot last month. It reports that one in 50 organizations suffered at least one attempted breach from Phorpiex last month. (Source: zdnet.com ) Ransomware, Botnets and Blackmail The ... (view more)

Mon
13
Jul
John Lister's picture

Zoom Video Conferencing a Major Risk on Windows 7

Windows 7 computers running the Zoom videoconferencing tool are at risk from a "zero day" vulnerability. It's a reminder of the dangers of an outdated operating system. The problem will be fixed in a patch by Zoom itself rather than from Microsoft. ... Microsoft dropped support for Windows 7 on January 14 this year, meaning it doesn't offer security updates or fix any bugs. A zero day vulnerability is one that is known by somebody other than the developer or manufacturer before a fix is ready. In effect, the developers have "zero days" of head start distributing the fix before people can start ... (view more)

Wed
01
Jul
John Lister's picture

25 Android Apps Steal Facebook Passwords

Google has removed 25 malicious Android apps which tried to steal user Facebook logins. As always, it's worth checking devices to see if these apps are installed, because they won't automatically uninstall from phones even being ousted from the Play ... Store. This particular batch of apps didn't have a common subject, but each promised to carry out a basic function, including: a flashlight, file cleaner, or card game. Hidden deep inside each app was malicious software that ran behind the scenes. The malware came alive each time an app was opened on the phone, specifically checking to see if the ... (view more)

Mon
22
Jun
John Lister's picture

SnapTube App Accused of Massive Subscription Fraud

An Android app with 40 million downloads has been linked to large-scale fraud against phone and tablet users. The "SnapTube" app reportedly tricks users with a free trial that leads to an expensive and unwanted subscription. The operators of the app ... say they were previously victims of illegal activity by an advertising partner but have now fixed the problem. SnapTube is a tool that was downloaded from the Google Play Store 40 million times before being removed. It was billed as a way to download videos from Facebook and YouTube, something that's not possible with those services own ... (view more)

Wed
17
Jun
John Lister's picture

31 Android Selfie / Photo Editors Are Actually Malware

Android users should check for 31 rogue beauty-related apps that Google has deleted from the Play Store, but could still be installed onto phones. They can unleash unwanted advertising and open web pages without permission. The apps all have ... different names, but largely offer filters to supposedly enhance self-portrait photographs. Suspicious Typos According to White Ops, which identified the apps, the full list is as follows. Note that many of the app names include apparent spelling and typographical errors: Beauty & Filters Camera Beauty Camera & Photo Editor Pro Beauty Camera ... (view more)

Tue
16
Jun
John Lister's picture

New Ransomware: Pay Up Or Files Go Public

A new form of ransomware named after a Marvel super villain has some particularly evil features. The Thanos malware uses an approach more reminiscent of "physical world" blackmail. Despite the name, the malware thankfully doesn't imitate the ... character Thanos by - spoiler alert - deleting half the files in the entire universe. That said, it's still quite scary thanks to a couple of features beyond the usual tactic of encrypting files and demanding a ransom. Instead, the ransomware also seeks to spread across an entire local network and encrypt all the computers it can reach. This is especially ... (view more)

Mon
15
Jun
Dennis Faas's picture

Are Android Emulators Safe to Download?

Android emulators enable you to run Android on your PC. But, are they safe? The Android emulators let you run Android applications on your personal computer. If you have a PC that runs Windows or Mac OS, you can download the an Android emulator and ... then use Android apps, including games, chat apps, and more! In this article, we will take a look into the Android emulator's safety. By the end of the article, you will have a complete understanding of whether Android emulators are safe or not. Related: Absolute Best way to Limit Data on Android Are Android Emulators Safe to Download? If you want ... (view more)

Pages

Subscribe to RSS - Security