malware

Mon
16
Dec
Dennis Faas's picture

How to Fix: Cannot Remove System Mechanic (Manual Uninstall)

Infopackets Reader Gina F. writes: " Dear Dennis, Over the weekend my nephew visited me and I let him use my computer. Today I went to use the PC and now I have a program called System Mechanic alerting me of 2093 errors on my PC that need to be ... fixed. I've closed the warning window, but System Mechanic keeps popping up in my face. I've also tried to 'fix' the 'errors', but then it says I need to pay to do that. Smells like a scam to me! I have tried to uninstall system mechanic via control panel, but every time I try, I get an error that it cannot remove system mechanic . I have searched ... (view more)

Tue
10
Dec
John Lister's picture

FBI Warns: Smart TVs a Major Security Threat

The FBI has warned users to think carefully when buying and using "smart" televisions. The warning is based on the idea that many people have bought or will buy new televisions either as part of "Black Friday" or in time for Christmas. The warning ... from the FBI's Portland office is based partly on the prospect that people might not have set out to buy smart sets, but that most or all of the TVs on offer currently have such features. (Source: techcrunch.com ) Cameras and Microphones on Some Sets A "smart" television is simply one that has an Internet connection. Previously that's mainly been ... (view more)

Thu
05
Dec
John Lister's picture

Android Malware Extracts Passwords from Any Legit App

Security researchers say a serious Android bug could let malware pose as a legitimate app and gain unwanted access to a phone's data and functions. The concept of the 'StrandHogg' bug has been known for several years, but now it's being actively ... exploited to target online banking. In simple terms, the bug has two unwanted effects: it can trick users into giving malware sensitive 'permissions' to access the phone, and it can hijack legitimate apps to trick users into handing over login details and sensitive information. Researchers at Promon explain the bug is with a security setting called ... (view more)

Tue
12
Nov
John Lister's picture

Google Play to Use Third Party Security to Scan Apps

Google is to use outside help to scan apps before they go into the Google Play store. It says the move is needed to cope with the continuing increase in the number of rogue Android apps. Just two weeks ago, 21 Android apps were reported to be rogue ... ; in early September, 24 apps were found to be rogue . The new "App Defense Alliance" involves Google working with three security companies, namely: ESET, Lookout and Zimperium. They all specialize in mobile security with a particular emphasis not just on spotting individual rogue apps, but on figuring out common characteristics and clues ... (view more)

Thu
31
Oct
John Lister's picture

Google Stops Indexing Adobe Flash Content

Google has taken yet another step to try to kill off Adobe Flash. The move will dramatically reduce the visibility of Flash content in its search results. Adobe Flash was once innovative and the primary way for delivering animated and interactive ... content online, including online-based browser games and even advertisements. Even so, many web designers seemed more interested in showing off their creativity with Flash rather than making a usable and useful site. Adobe Flash Security Bugs Severe As far back as 2010, Apple made the decision to ditch Flash entirely from its devices - a move that ... (view more)

Wed
30
Oct
John Lister's picture

New Malware Hides Inside Audio Files

Most people know not to open an executable file or document attached to an email unless they were expecting it. But a new example of malware means even an audio file could trigger a payload. Researchers at Blackberry Cylance Threat recently ... uncovered malicious code hidden inside WAV files. That's a computer format for audio that was common for music on PCs before MP3 became established. The attackers are using a technique called steganography, which is a way to hide a file inside another file in a way that normally cannot be detected. Steganography has previously been used in image files, and ... (view more)

Mon
28
Oct
Dennis Faas's picture

Scammed by Fake Norton Antivirus, Lifelock? Here's What to Do

Infopackets Reader Daniel B. writes: " Dear Dennis, I wanted to pass along this message to let your readers know of a new and incredibly convincing fake Norton email renewal scam involving Norton Antivirus and Lifelock. I received two emails today ... (from two different email addresses) with a special promotion to 'upgrade' my Norton Antivirus and Lifelock with an enticing 67% discount off the retail price. The emails are incredibly convincing, unless of course you are knowledgeable enough to realize it's a scam. If you click on a link to read more or to buy the product, it will lead you to a ... (view more)

Wed
23
Oct
John Lister's picture

Microsoft Unveils New 'Secured-core' PC Protection

Microsoft is working with PC makers to tackle malware that strikes before Windows is loaded into memory. It's adapting a technology currently used for the Xbox games console. The "Secured-core" initiative is designed to overcome a big limitation ... with most Windows security tools: they only work once Windows is already running. That doesn't tackle malware that targets the computer's firmware. This is software, usually called BIOS or UEFI, than runs immediately when a PC is switched on. Its main role is to check all the hardware is in place and connected, then load up the operating system such ... (view more)

Thu
17
Oct
John Lister's picture

New Windows Defender: Tamper Protection, Plus More

Microsoft is adding an extra layer of security to Windows 10: it's blocking malware from tampering with Windows Defender. That's a security tool that's available commercially to businesses but is also built in to Windows 10 without extra cost. ... Tamper Protection tackles a rather cheeky tactic used by some malware creators, namely having the malware access Windows Defender and switch off key features. The idea is to reduce the likelihood of malware being detected in action. The feature has been in testing since April, 2019 and is now ready for a public rollout. Naturally Microsoft is keeping ... (view more)

Mon
14
Oct
John Lister's picture

Android Malware Changes Own Icon to System Apps

Malware creators are using new tactics to avoid their malicious Android apps being exposed. The scam involves hiding and even disguising apps as legitimate ones once they've been installed. Fake Apps Receive Fake Praise It's a twist on a ... well-established scam in which malware is distributed through apps that appear to perform a basic function such as reading QR codes, or turning the camera flash into a flashlight. Thanks to a host of bogus rave-reviews in the Google Play store, the only way to spot something is amiss is that the apps will ask for specific access permissions that are clearly ... (view more)

Pages

Subscribe to RSS - malware