Tagged With malware

0

What happens when legitimate software distribution channels are hacked? Asus has found out the hard way after it was revealed that about a million PCs were infected during the second half of last year. The attack, dubbed ShadowHammer by Kaspersky Labs who discovered it, was revealed to Asus in January who decided to not notify its customers.

1

It is slowly getting easier to access free Wi-Fi in Australia, with various bars, cafes, restaurants and public spaces providing the service. However, like most things that are free it pays to do some homework instead of blindly blundering in. Here are 13 ways to stay safe.

0

Security researchers from Trend Micro have identified 29 apps, purporting to use you device's camera to take better pics or to improve the snaps you shoot, that can access remote ad configuration servers that can be used for malicious purposes. In some cases the apps have been downloaded millions of times.

15

Most internet users wouldn't want to share their browsing history with the rest of the world. (It's one of the reasons 'incognito mode' is so popular - despite not actually working as advertised.)

This is especially true of people who look at questionable online material. So what would you be willing to pay if someone had a secret recording of you watching porn, taken on your webcam?

0

On November 20, developer Ayrton Sparling posted an issue on the GitHub repo for "event-stream" — a JavaScript package that enjoys 1-1.5 million downloads per week and is used in some rather high-profile projects. The issue, simply titled "I don't know what to say", outlined some suspicious behaviour that, after extensive investigation, resulted in the discovery of a bitcoin-stealing payload deviously hidden inside.

2

As the end of the year draws nearer, reports of scams have increased with scammers using increasingly sophisticated methods to part the unaware from their money. Recent scam reports take advantage of seasonal trends, with an uptick in scams impersonating the ATO or appearing to be about a package delivery. Here's all the dodgy emails and phone calls to look out for.

0

We all fall victim to the dangerous belief that if an app or extension is listed in an official repository - be it the App Store, Google Play, the Microsoft Store, Mozilla's Add-Ons directory or so on - it must be legitimate. After all, the big tech companies surely use a lot of automated systems (and real human beings) to ensure that their customers aren't downloading harmful things. Right?

2

A new botnet, boasting an army of 500,000 remotely-controlled routers in 54 countries, has been discovered. VPNFilter allows attackers to steal credentials, monitor Modbus SCADA protocols and has a destructive capability that can render an infected device unusable. It can be triggered on a single device or as part of a mass attack.

0

Here we go again. Radware's threat research group recently announced that more than 40,000 Facebook users were duped into downloading a "Relieve Stress Paint" application, via a crafty phishing email, that stole their login credentials and browser cookies while they pretend-painted in the app. Worse, the attack was clever enough to avoid being flagged by a typical antivirus app.

So, how can you keep your data safe in these instances? Let's review.