News - Page 3 category archyve:

Safer Internet Day

Safer Internet Day

I don’t know if you are big on social networks, but I have an ASK.fm account, and these guys ask you a random question every single day. This morning, they wanted to know what “good vibes” I have to offer to make the Internet a better place. Well, what would you know: It’s the Safer Internet Day 2016 today, and so various platforms and companies celebrate it in multiple ways. Read more »

Linux.Encoder.1 Assails Linux Web Servers

Ransomware infections have been around for a long time now with the first one recorded back in 1989. Unfortunately, ransomware is on the rise at the moment, and infections like Linux.Encoder.1, Chimera Ransomware, or Tox Ransomware find ways to attack operating systems without any warning. Linux.Encoder.1 is one of the more complex and destructive infections of its kind as it primarily targets servers, not individual machines. As recent research has revealed, this threat targets sites linked to the Linux operating system, which allows cyber criminals behind this infection to cause more damage. Read more »

Angler Exploit Kit: The #1 Cyber Menace

Angler Exploit Kit is the biggest and most aggressive exploit kit today. Although it emerged back in 2013, it has never been as strong as it is now. Malware researchers estimate that 90,000 victims could be targeted by the infections associated with it every single day, which might add up to more than $34 million in profit every year. Unfortunately, this exploit kit is practically unstoppable, and computer users could become victims even if they took all of the security measures available. Of course, some users are more “susceptible” to malware associated with this exploit kit than others. Fortunately, there are things that users can do to keep malware away and ensure virtual protection. We discuss this, as well as other important things, in this report. Read more »

Critical Security Patch for Internet Explorer

Microsoft has released its new and improved web browser, Microsoft Edge, on July 29, 2015, but this web browser is currently compatible only with Windows 10. According to the latest data, around 50 million devices are now running this version of Windows. The rest of Windows users are stuck with the good old Internet Explorer and all its vulnerabilities. The latest of these vulnerabilities is known as known by the code name “CVE-2015-2502.” This vulnerability affects the most recent versions of the browser, starting with Internet Explorer 7 and including the most recent, Internet Explorer 11. As researchers at Bromium Labs have found, IE was the most vulnerable browser of 2014, and it is unlikely that this year’s title will go to any other of the popular web browsers. Vulnerability CVE-2015-2502 is proving that to be the case. Read more »

CryptPKO Ransomware

CryptPKO Ransomware seems to be a variant of CTB-Locker, which is known to be a serious ransomware infection. Both of these threats enter the system without permission; usually, a Trojan slithers onto the computer and then it downloads ransomware. If this ever happens to you, there is no doubt that you will notice that very fast because all of your files will be encrypted. On top of that, you will notice that your background has been changed and there is the message. This warning will disappear only if you remove the ransomware infection from the system. Unfortunately, CryptPKO Ransomware cannot be erased via Control Panel; thus, you should not expect that you will be able to get rid of it manually. Even though the manual removal of CryptPKO Ransomware is very difficult or nearly impossible, there is still one way to eliminate it from the system. We will provide you with all the necessary information in this article, so make sure that you read it from beginning to end. Read more »

Are Your Passwords Safe?

There are plenty of malicious computer infections that are after sensitive information, particularly the kind that could help cyber criminals hijack personal accounts. Some are more vicious than others, and Dyre Trojan is certainly one of the worse ones, as it is all about taking over online banking credentials, and there is no question what is the reason behind this. Also known by the names Dyreza and Battdil, this infection has been created to steal your money, but this is not all that it is capable of. The worst part about malware of this kind is that it is clandestine, which is due to the fact that it runs silently, without drawing any unnecessary attention to itself. Unfortunately, this means that the malicious password stealing infections are often successful in their attacks, as users do not realize they are happening. Read more »

SwiftKey Vulnerability

Specialists working at the Chicago-based security company NowSecure have recently identified a new vulnerability in SwitfKey, which is a third-party keyboard application. The application itself is pre-installed on more than 600 million Samsung devices, which means that hackers can access a great number of devices and even take over a user’s network traffic to execute the arbitrary code. Specialists claim that this exploit affects not all Samsung devices. According to them, Samsung Galaxy S6, the S6 Edge, and Galaxy S4 Mini are the main devices that are at risk. Of course, there is also a possibility that this exploit might work on different Samsung Galaxy phones because this keyboard application is installed on them. Read more »

LogJam - a new flaw in an encryption algorithm

Researchers working at Microsoft and other institutions have detected a new SSL flaw. The flaw itself is called LogJam and its detection suggests that 8% of top million websites using HTTPS (protocol for secure communication) are vulnerable and it does not matter that users see a padlock icon in the address bar. Researchers claim that email services that use the TLS protocol might also be at risk. Luckily, companies are creating updates in order to fix this flaw; however, there is a possibility that a number (around 20 000) of websites will be blocked after the release of updates. It is likely that only those websites that are older and whose code has not been updated for a long time will be affected. Read more »

The Intricate Web of Ad Injection

Google’s Online Security researchers have recently conducted a study together with the University of California, Berkeley and Santa Barbara to examine the often confusing and dangerous web of ad injection systems. Even though there was never a doubt that adware developers, distributors, and parties associated with them are well-established in the virtual world, the findings of this study are truly astounding. For one, it was found that a shocking 5.5% of IPs connecting to Google sites were presented with injected ads. Note that injected ads are controlled by software installed onto operating systems, and they should not be confused with online advertising services, such as Google AdWords. So, how dangerous is the activity of adware, or advertisement-supported software/ad injectors? Read more »

A Facebook Worm to be careful about

Even though a detection by an antimalware tool known as Trojan.Agent.ED is a generic one, malware experts at Anti-Spyware-101.com have discovered that in quite a few cases this detection is linked to a newly crafted Internet worm often referred to as the Facebook Worm or Kilim Facebook Worm. If you have encountered anything associated with Trojan.Agent.ED you should take immediate measure to investigate what kind of infection is active on your PC, and you should remove it immediately. Do not take any chances with this infection as you could face devastating consequences. Read the rest of this article and find out how the Kilim Facebook Worm functions and why its removal is of paramount importance. Read more »