Security

Thu
11
Jun
John Lister's picture

Free Anti-Ransomware Tool is Actually a Scam

A security company has warned that a free tool claiming to remove ransomware is in fact ransomware itself. Sophos has also reported that businesses that pay ransoms end up with double the financial costs of those who don't. The company's Paul ... Ducklin examined a tool called "Decrypter DJVU". It's promoted as a way to undo the damage of a strain of ransomware that encrypts files, adds the extension ".djvu" to the name, and demands a payment to decrypt and restore access. (Source: sophos.com ) The tool asks users to type in a personal ID and a file extension, though it appears it doesn't take ... (view more)

Fri
05
Jun
John Lister's picture

'Sign in With Apple' Bug Allowed Unrestricted Access

Apple has paid $100,000 reward to a security researcher who discovered a simple but potentially damaging bug. Until it was fixed, the bug could have let hackers take over a user's account. The problem was with "Sign in with Apple" - a system that ... lets users sign up to websites via their Apple account rather than having to create specific login details for each site, or go through an email confirmation process it. As with similar systems from Facebook and Google, it only works on websites that support the "Sign in with Apple" feature. When the user visits the third-party site, it ... (view more)

Thu
04
Jun
John Lister's picture

Some Android Wallpapers Could Crash Phone

Background "wallpaper" can cause Android phones to crash thanks to a bug with the system. At the moment it appears to be an unfortunate glitch but it could be open to abuse. The image in question is viewable at twitter.com , and features a scene ... with a forest in the foreground, a lake in the midground, and mountains in the background beneath a cloudy sky at sunset. The problem is that once set as the default wallpaper, the image causes the phone to crash. The phone then goes into a loop of restarting and crashing, with the only solution being a factory reset. That's not only time consuming ... (view more)

Tue
26
May
John Lister's picture

Microsoft Warns of COVID-19 Email Malware Scam

Microsoft and Sophos have warned users to watch out for emails which claim to offer statistics about the COVID-19 pandemic. They actually harbor a combination of malware and legitimate tools that could easily be abused by a hacker. The emails in ... question have subject lines such as "Covid-19: [May 22] horrible Charts", claim to come from legitimate sources such as John Hopkins University, and have an attachment that's billed as a spreadsheet file with statistics about deaths and infections. (Source: twitter.com ) Malicious Macro The attachment does indeed have an Excel file, but the problem is ... (view more)

Tue
12
May
John Lister's picture

Thunderbolt Flaw Could Bypass Security, Encryption

A researcher has found a major bug with Thunderbolt port technology that could undermine major security measures on multiple computer systems. There's a big mitigating factor though: an attacker would need extended physical access to the computer in ... order to carry out the exploit. Thunderbolt is a technology that is similar in concept to USB, but adds fiber optic to the usual copper wires. Compared to USB, Thunderbolt has high speed and capacity. Common uses include super-fast device charging (including laptops), 4K video, and extremely quick data transfers. Originally Thunderbolt was only ... (view more)

Tue
28
Apr
John Lister's picture

Major Antivirus Flaw Deletes Files, Corrupts Windows

A security company says it found a simple way to turn antivirus software into a weapon for attackers. Most major manufacturers have now fixed the problem, but it's a reminder to keep such software updated. The discovery by Rack911 Labs effectively ... meant that a hacker could force the antivirus software to delete files on a computer. That would mean the hacker would need to have gained access to a computer first - whether internally on a network, or remotely using malware. The exploit is based on one of the most fundamental actions of any antivirus software: they scan files, check if they are a ... (view more)

Tue
21
Apr
John Lister's picture

Android Store Hacked; Up to 40M Accounts Leaked

A third-party Android app store has been hit by a big data breach. Aptoide users who registered between 21 July 2016 and 28 January 2018 may be affected. Aptoide works in a same way as Google's own Play app store, but isn't subject to its content ... regulations or security vettings. As with all third-party stores, users must confirm they accept security risks when installing apps from it. A hacker has published data from 20 million users and claims to have details of another 19 million users altogether. That's a big chunk of the 150 million people Aptoide claims have used its service at some ... (view more)

Mon
20
Apr
John Lister's picture

How to Fix Windows Defender Glitch

The latest Windows 10 update blunder temporarily left some users without full use of the system's in-built antivirus / antimalware protection. Though enthusiasts quickly spotted a workaround, the problem has now been fixed with a Windows 10 update. ... The initial problem wasn't actually a system update to Windows 10 itself that caused the issue, but rather an antivirus definition update file for Windows Defender. Essentially, a "definition update" contains details of the latest known threats that the tool can immediately deal with. For some users, the problem only arose when running a full scan ... (view more)

Mon
13
Apr
John Lister's picture

56 Android Apps Hijack Devices, Drain Battery

Security researchers have warned of 56 infected Android apps that could compromise performance. They've been deleted from the Google Play Store, but could still be on users' phones and tablets. According to Check Point, the apps contain malware ... designed to hijack phones and simulate user actions to click on ads. That could run down batteries and eat into mobile data allowances. (Source: checkpoint.com ) The 56 apps include 24 supposedly aimed at children, and 32 which offer simple utilities. They all work as designed: the problem is what's happening in the background. (Source: express.co.uk ... (view more)

Wed
01
Apr
John Lister's picture

Edge Browser Gets New Features, Based on Chrome

Microsoft has unveiled a range of new features for its Edge browser. They include vertically arranged tabs, enhanced cut and paste, and warnings of potential password breaches. Edge has been somewhat light on new features recently as Microsoft has ... been concentrating on major behind-the-scenes changes. The browser used to run on Microsoft's own code but is now based on Chromium , the same open source code behind Google's Chrome. Microsoft hopes that will tempt over some Chrome users who should be able to use many of their existing browser extension tools in Edge. However, it's also adding some ... (view more)

Pages

Subscribe to RSS - Security