Top tip: Don't upload your confidential biz files to free malware-scanning websites – everything is public

Top tip: Don't upload your confidential biz files to free malware-scanning websites – everything is public

By passively observing three such services over the course of three days earlier this month, Cylab hackers were able to collect more than 200 documents, mostly things like purchase orders and invoices.

Why You Should Never Borrow Someone Else's Charging Cable

Why You Should Never Borrow Someone Else's Charging Cable

For the moment, Henderson says, a bigger threat than malicious charging cables is USB charging stations you see in public places like airports.Many travelers know that, in a pinch, the hotel front desk will often have a drawer of charging cables that were left behind by guests.

Cybersecurity Protections for SMBs Found to Be Lacking

Cybersecurity Protections for SMBs Found to Be Lacking

The ransom demand is also likely to be considerably higher than the cost of cybersecurity protections for SMBs to prevent ransomware attacks.

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google's own security research team.Android is a thriving open-source community, which is great for innovation but not so great when threat actors seize the opportunity to hide malware in basic software loads that come on boxed devices.

Fake PornHub And Google Android Apps Are Actually ‘Russian Spy Tools’

Fake PornHub And Google Android Apps Are Actually ‘Russian Spy Tools’

It comes hidden inside fake versions of real apps, including Google Play, Evernote, Skype, encrypted messaging service Signal and PornHub. Looking at the selection of copied apps, Lookout said Monokle was likely targeting English speakers, as well as individuals in the Caucasus regions and people interested in the Ahrar al-Sham militant group in Syria.

How To Tell If Someone is Watching You: Is Your Webcam Hacked?

How To Tell If Someone is Watching You: Is Your Webcam Hacked?

Basic malware will run as a process on your computer without you noticing (until, that is, pictures from your webcam appear on the internet). One more tell-tale sign that your webcam has been hacked is if the security settings for it are a bit screwy.

Studies prove once again that users are the weakest link in the security chain

Studies prove once again that users are the weakest link in the security chain

Organizations need to make sure users understand the importance of protecting sensitive data and safeguarding company assets, and that they’re aware of how their actions impact the overall security for the whole organization.

Malicious Python libraries targeting Linux servers removed from PyPI

Malicious Python libraries targeting Linux servers removed from PyPI

Image: ReversingLabs A security firm found three malicious Python libraries uploaded on the official Python Package Index (PyPI) that contained a hidden backdoor which would activate when the libraries were installed on Linux systems.

Agent Smith Malware jeopardizes 25 million android devices

Agent Smith Malware jeopardizes 25 million android devices

Agent smith malware The malware would be hidden inside “barely functioning photo utility, games, or sex-related apps,” Check Point writes. After the user downloads one, the malware masquerades as an app related to Google with a title such as “Google Updater” and starts replacing code.

Hackers Infect Pale Moon Archive Server With a Malware Dropper

Hackers Infect Pale Moon Archive Server With a Malware Dropper

The Pale Moon web browser team announced today that their Windows archive servers were breached and the hackers infected all archived installers of Pale Moon 27.6.2 and below with a malware dropper on December 27, 2017.

25 Million Android Phones Infected With Malware That 'Hides In WhatsApp'

25 Million Android Phones Infected With Malware That 'Hides In WhatsApp'

Jaap Arriens/NurPhotoAs many as 25 million Android phones have been hit with malware that replaces installed apps like WhatsApp with evil versions that serve up adverts, cybersecurity researchers warned Wednesday.

Amazon Prime Day: Stay Safe While Shopping Online

Amazon Prime Day: Stay Safe While Shopping Online

While there are so many good deals going on this day it is easy to lose your mind and encounter some security issues like phishing attacks, identity theft, fake products, fake reviews.

Safe shopping: Amazon Prime Day

Safe shopping: Amazon Prime Day

Due to this many security problems arise, for example selling fake products, creating fake reviews, even getting customers sensitive data when they buy. It makes sense that reviews might give you a push which product to buy, but Amazon review system makes it easy to fake the reviews so be careful.

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

Foreigners crossing certain Chinese borders into the Xinjiang region, where authorities are conducting a massive campaign of surveillance and oppression against the local Muslim population, are being forced to install a piece of malware on their phones that gives all of their text messages as well as other pieces of data to the authorities, a collaboration by Motherboard, Süddeutsche Zeitung, the Guardian , the New York Times , and the German public broadcaster NDR has found.

Flame, the most sophisticated cyber espionage tool ever made

Flame, the most sophisticated cyber espionage tool ever made

Furthermore, different modules can be installed on request, making this software modifiable depending on the configuration of the machine it infects, highly unusual behavior for malware;Can replicate itself and delete itself and all gathered information on Kill command.

The CIA Spied on People Through Their Smart TVs, Leaked Documents Reveal

The CIA Spied on People Through Their Smart TVs, Leaked Documents Reveal

Hackers at the Central Intelligence Agency, with the help of colleagues from the British spy agency MI5, developed malware to secretly spy on targets through their Samsung Smart TVs, according to new documents published by WikiLeaks.

Google confirms presence of Triada backdoor in cheap Android phones

Google confirms presence of Triada backdoor in cheap Android phones

In the blog post, Siewierski confirmed that the malware did exist in new Android devices .In 2016, Kaspersky Lab researchers identified what was probably the most advanced of all mobile banking Trojans at the time.

Google confirms that advanced backdoor came preinstalled on Android devices

Google confirms that advanced backdoor came preinstalled on Android devices

with 51 posters participating, including story author Criminals in 2017 managed to get an advanced backdoor preinstalled on Android devices before they left the factories of manufacturers, Google researchers confirmed on Thursday.

Germany: Backdoor found in four smartphone models; 20,000 users infected

Germany: Backdoor found in four smartphone models; 20,000 users infected

The BSI said the phones' firmware contained a backdoor trojan named Andr/Xgen2-CY.UK cyber-security firm Sophos Labs first spotted this malware strain in October 2018.

Guide On How To Unlock Mac With Apple Watch – Setapp

Guide On How To Unlock Mac With Apple Watch – Setapp

Well, when you connect Apple Watch to MacBook, it allows you to bypass the need to enter a password before you can start using your Mac. Unfortunately, it’s possible to run into instances where your Apple Watch won’t unlock Mac products that are sitting on your desk, throwing out infuriating error messages like “Your Mac was unable to communicate with your Apple Watch.”.

Why the Air Force is investigating a cyber attack from the Navy

Why the Air Force is investigating a cyber attack from the Navy

The Air Force defense lawyer reported the tracking device to his information security manager, who concluded the malware was a “splunk tool,” which allowed the sender of the malware to gain “full access to his computer and all files on his computer,” Wilson wrote in the memo, which he sent to the chief of staff for the Navy’s Region Legal Service Offices.

Over 90% of data transactions on IoT devices are unencrypted

Over 90% of data transactions on IoT devices are unencrypted

Deepen Desai, VP of security research and operations at Zscaler, tells CSO that one of the worrying observations was that companies have a large amount of consumer-grade IoT devices on their networks.

Chinese hackers were using NSA malware a year before Shadow Brokers leak

Chinese hackers were using NSA malware a year before Shadow Brokers leak

Per a graphic released by Symantec, the Buckeye group had used a version of the DoublePulsar backdoor since March 2016, more than 13 months before a mysterious group of hackers known as the Shadow Brokers leaked it online in April 2017, as part of a larger cache of NSA hacking tools.

Still have Windows 7? 32 Security Reasons to Move to Windows 10

Still have Windows 7? 32 Security Reasons to Move to Windows 10

Windows 10 supports additional LSA Protection, allowing LSASS to run as a Protected Process, protecting the credentials it stores from malware without a malicious kernel mode component.10.

CAN YOU BE HACKED BY THE WORLD AROUND YOU?

CAN YOU BE HACKED BY THE WORLD AROUND YOU?

As someone who researches 3-D modeling, including assessing 3-D printed objects to be sure they meet quality standards, I’m aware of being vulnerable to methods of storing malicious computer code in the physical world.

Cybercrime market selling full digital fingerprints of over 60,000 users

Cybercrime market selling full digital fingerprints of over 60,000 users

Image: ZDNet. The reason why a marketplace like Genesis has come to exist today is because in recent years, online services have improved their anti-fraud systems, and are now capable of detecting abnormal account login activity by looking at more details, rather than only a user's username and password.

Malware and Firmware Trojans

Malware and Firmware Trojans

1 Malware 1.1 The Importance of a Malware Free System 1.2 The Utility of Antivirus Tools 1.3 Preventing Malware Infections 1.4 Detecting Malware Infections 1.5 Watering Hole Attacks 2 Firmware Trojans 2.1 Virtualizers and Hardware Compromise 2.2 The Promise of Libre Firmware 3 References Malware[edit ].

Hacker group has been hijacking DNS traffic on D-Link routers for three months

Hacker group has been hijacking DNS traffic on D-Link routers for three months

For the past three months, a cybercrime group has been hacking into home routers --mostly D-Link models-- to change DNS server settings and hijack traffic meant for legitimate sites and redirect it to malicious clones.

Google play store: Is your smartphone safe? Google reports a 100% increase in malware installed from Play Store last year, Telecom News, ET Telecom

Google play store: Is your smartphone safe? Google reports a 100% increase in malware installed from Play Store last year, Telecom News, ET Telecom

Click-fraud apps, also called "adware " accounted for 55 per cent of all Potentially Harmful Applications (PHAs) installed through the Play Store , followed by trojans at 16 per cent, Google said in its report on Monday.

Researchers Find Google Play Store Apps Were Actually Government Malware

Researchers Find Google Play Store Apps Were Actually Government Malware

Hackers working for a surveillance company infected hundreds of people with several malicious Android apps that were hosted on the official Google Play Store for months, Motherboard has learned.

More