News - Page 4 category archyve:

Lenovo superfish vulnerability

Lenovo superfish vulnerability

Superfish adware is one of the many applications out there that one wouldn’t want on her computer. So naturally, you would avoid these kinds of programs in the wild, but what happens when they are pre-loaded into your laptop’s setup? This is what happened with Lenovo laptops that had Superfish software pre-loaded, and it opened vulnerability on the said computers that would have allowed hackers to steal user’s credit card number information and other personal data. Needless to say, users had to scramble to remove Superfish software from their computers in order to avoid potential identity thefts. Read more »

The Equation Group is capable of spying on YOU

Researchers working at Kaspersky Lab in Russia have recently detected a new threat actor that has been active for years. It is called the Equation group. The group has been given this name because it uses various algorithms and sophisticated methods in order to implement their operations. In particular, RC5 encryption algorithm is visible in malware produced by this group. Read more »

FessLeak

It is essential that you install up-to-date security software and use your mind when browsing the web to ensure that FessLeak cannot corrupt your Windows operating system. The clandestine threat is also known as Cryptolocker, and if you let it in your PC, you will have all of your personal files encrypted. Unfortunately, many users do not find a way to decrypt personal files, and this is why FessLeak Ransomware is considered to be one of the most obnoxious and harmful threats out there. Even though the infection cannot delete your files, there are no guarantees that you will be able to restore them. Regardless of the outcome, it is most important that you remove the threats associated with FessLeak and take care of your virtual security. Read more »

Your version of Google Chrome is potentially vulnerable and out of date

Your version of Google Chrome is potentially vulnerable and out of date

If you have received an email stating that “Your version of Google Chrome is potentially vulnerable and out of date,” you have to report it as spam. The fictitious email is a tool employed by cyber criminals to distribute a malicious ransomware threat. Of course, it is dangerous to have your operating system affected by a ransomware, or any other malicious threat for that matter. Ransomware is very difficult to remove, and if you trust that your version of Google Chrome is potentially vulnerable and out of date, you might let in a malicious Trojan without even realizing it. This Trojan could unleash CTB-Locker, and various other ransomware threats that require immediate removal. Read this report to learn how ransomware can attack and affect your operating system. This report also provides a few removal tips that you can use to delete ransomware from your PC. Read more »

Elevation of Privilege

Elevation of Privilege is a key component of the design phase in the Microsoft Security Development Lifecycle. It is one of the ways to go about threat modeling, and it helps to figure out potential threats software, and computer systems might face. Needless to say, security bugs in Elevation of Privilege and other essential security components are not something one would want to have. However, there recently was a backlash between Google and Microsoft because the former revealed a security bug in Windows 8.1 related to Elevation of Privilege before Microsoft issued a patch. Read more »

Poodle Sniffs Out Your Data

Obviously, we do not mean an actual canine because that would be too far-fetched, but there is something related to cyber security that is called POODLE. We think that you should pay attention to it because even the U.S. Department of Homeland Security pointed out how important it is to take care of this issue immediately. While dealing with POODLE does not depend on users themselves, we would like to address this matter in this article, letting you know more about this disturbing vulnerability. Read on to find out more about this vulnerability and potential security threat. Read more »

The risks of the DeviantArt Scam

You have to be careful not to become the next victim of the mischievous DeviantArt Scam. Needless to say, this scam is targeted at those you use deviantart.com services, and, according to Anti-Spyware-101.com researchers, the scam has already affected many users. The victims of the DeviantArt Scam lose money, install undesirable software, and disclose private information that can be manipulated by unreliable parties. These are serious risks; however, you can avoid facing them if you are careful and mindful when browsing the web. In fact, most deviantart.com users will recognize the scam, because the site has been set up to share images, photos, digitals art, cartoons, and other types of images, not to help you download books. Continue reading to learn how the scam works, find out if you need to delete malware, and figure out what security measures you need to take to eliminate the security risks. Read more »

Regin

Recently, the leading companies producing computer security products released their reports on the latest malware threat called Regin, which is known to be tracked by security experts since 2008. However, no country has taken responsibility for this threat. There is substantial evidence that the Regin, pronounced “Region”, malware is operated by the United States. Read more »

WinShock Exploit - a Threat to Outdated Windows Systems

WinShock is the name of a bug which, until now, remained unnoticed for nearly 19 years. The buggy code is recognized as a serious data-manipulation vulnerability which has been added to the CVE database as CVE-2014-6332. The bug has been discovered by IBM security researchers back in the summer of 2014, and it took Microsoft experts nearly half a year to patch the vulnerability. The patch has been added to the latest security updates, and Windows users may have only a small window of opportunity to activate the update before cyber criminal employ it to corrupt operating systems. The WinShock vulnerability can be used to take over the system and download malware, which means that every Windows user running the system without the installed updates is in danger. Read more »

Malware chefs: the flavor of a cookie - dangerous!

Malware chefs: the flavor of a cookie - dangerous!

Malware experts have recently noticed a new major virtual threat that could have devastating outcomes. The malicious activity was dubbed as malvertising; as the name suggest certain adverts were noticed to redirect users to potentially harmful websites in order to implement malware onto their system. The most alarming feature is that these adverts are not provided by an adware application; these ads, in fact, could be integrated on any website. Recently websites like examiner.com and last.fm were found out to be hosting such ads, but it is not the vendors’ fault as these adverts are carefully disguised by malware distributors to look and seem legitimate. The mentioned websites were probably victims to a first-time scam, as the research revealed that these adverts are created in a quite obnoxious way, which is why they were able to bypass some malware detection and removal tools. Read more »