Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

Warning: Two Dangerous Ransomware Are Back – Protect Your Computers

Warning: Two Dangerous Ransomware Are Back – Protect Your Computers
Ransomware has been around for a few years but has become an albatross around everyone's neck—from big businesses and financial institutions to hospitals and individuals worldwide—with cyber criminals making millions of dollars.In just past few months, we saw a scary strain of ransomware attacks including WannaCry, Petya and LeakerLocker, which made chaos worldwide by shutting down hospitals, vehicle manufacturing, telecommunications, banks and many businesses.Before WannaCry and Petya, the i…
Rate this blog entry:
Continue reading
120 Hits
0 Comments

How Just Opening A Malicious PowerPoint File Could Compromise Your PC

How Just Opening A Malicious PowerPoint File Could Compromise Your PC
A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office.The Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object Linking and Embedding (OLE) interface for which a patch was issued in April this year, but threat actors are still abusing the flaw through the different mediums.Security researchers have spotted a new malware campaign that is leveraging the same e…
Rate this blog entry:
Continue reading
188 Hits
0 Comments

Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious Links

Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious Links
Phishing — is an older style of cyber-attack but remains one of the most common and efficient attack vectors for attackers, as a majority of banking malware and various ransomware attacks begin with a user clicking on a malicious link or opening a dangerous attachment in an email.Phishing has evolved than ever before in the past few years – which is why it remains one of those threats that we have been combating for many years.We have seen phishing campaigns that are so convincing and effecti…
Rate this blog entry:
Continue reading
135 Hits
0 Comments

Facebook Covertly Launches A Photo-Sharing App In China

Facebook Covertly Launches A Photo-Sharing App In China
The Chinese market is no doubt a pot of gold for big technology giants with over 700 million internet users, but the Chinese government heavily controls the Internet within its borders through its Golden Shield project – the Great Firewall of China.The Great Firewall has blocked some 171 out of the world's leading websites, including Google, Facebook, Instagram, Twitter, Tumblr, Dropbox, and The Pirate Bay in the country. But tech giants like Facebook and Google always try alternative ways to…
Rate this blog entry:
Continue reading
238 Hits
0 Comments

IPS as a Service Blocks WannaCry Spread Across the WAN

IPS as a Service Blocks WannaCry Spread Across the WAN
One of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagating capability exploiting a vulnerability in the file access protocol, SMB v1.Most enterprises defences are externally-facing, focused on stopping incoming email and web attacks. But, once attackers gain a foothold inside the network through malware, there are very few security controls that would prevent the spread of the attack between enterprise locations in the Wide Area Network (WAN).This is…
Rate this blog entry:
Continue reading
145 Hits
0 Comments

Microsoft Launches Ethereum-Based 'Coco Framework' to Speed Up Blockchain Network

Microsoft Launches Ethereum-Based
A growing number of enterprises are showing their interest in blockchains, but the underlying software fails to meet key enterprise requirements like performance, confidentiality, governance, and required processing power.However, Microsoft wants to help solve these issues and make it easier for the enterprises to build their networks using any distributed ledger.Microsoft has unveiled a framework called "Coco" — short for "Confidential Consortium" — a new open-source foundation for enterpris…
Rate this blog entry:
Continue reading
108 Hits
0 Comments

HBO Offered Hackers $250,000 As Ransom to Prevent More Leaks

HBO Offered Hackers $250,000 As Ransom to Prevent More Leaks
Hackers who recently hacked into HBO network and stole scripts, shows, and employee information documents, have now provided an email in which the United States cable channel offered them $250,000.The company offered the payment as a "bounty payment" reward in which companies reward white-hat hackers for discovering cyber security vulnerabilities in their computer networks.Late last month, the HBO hackers claimed to have obtained around 1.5 terabytes of information from HBO and dropped upcomi…
Rate this blog entry:
Continue reading
192 Hits
0 Comments

Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests

Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests
An infamous Russian-linked cyber-espionage group has been found re-using the same leaked NSA hacking tool that was deployed in the WannaCry and NotPetya outbreaks—this time to target Wi-Fi networks to spy on hotel guests in several European countries.Security researchers at FireEye have uncovered an ongoing campaign that remotely steals credentials from high-value guests using Wi-Fi networks at European hotels and attributed it to the Fancy Bear hacking group.Fancy Bear—also known as APT28, S…
Rate this blog entry:
Continue reading
114 Hits
0 Comments

More than 1,000 Spyware Apps Found On Android App Stores

More than 1,000 Spyware Apps Found On Android App Stores
If you think you are downloading apps from Google Play Store and you are secure, then watch out!Someone has managed to flood third-party app stores and Google Play Store with more than a thousand malicious apps, which can monitor almost anything a user does on their mobile device from silently recording calls to make outbound calls without the user’s interaction.Dubbed SonicSpy, the spyware has been spreading aggressively across Android app stores since at least February and is being distribu…
Rate this blog entry:
Continue reading
99 Hits
0 Comments

How secure are your messages?

How secure are your messages?
As you were browsing www.sciencedaily.com something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled JavaScript in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. After completing the CAPTCHA below, y…
Rate this blog entry:
Continue reading
120 Hits
0 Comments