Security

Security

Stop Ransomware before it takes your files Hostage!

Sophos Intercept X includes CryptoGuard, which stops encryption of data from all forms of ransomware. Even trusted files and services that have been hijacked. As soon as the ransomware gets intercepted, Crypto guard restores all your files back to their safe state.

Rather than trying to examine millions of malware samples, Intercept instead focuses on […]

By |September 27th, 2016|Security|Comments Off on Stop Ransomware before it takes your files Hostage!

Snowden’s iPhone surveillance killer

National Security Agency whistle blower Edward Snowden has come up with a concept iPhone case that could prevent the government from finding your location.

On Thursday, Snowden and hacker Andrew Huang presented a possible solution. It’s called “the introspection engine,” and it’s designed to alert the user if and when the phone’s radio signals are turned […]

By |July 22nd, 2016|Security|Comments Off on Snowden’s iPhone surveillance killer

One of Tor’s earliest participants leaving

Lucky Green, one of Tor’s earliest participants, has decided to leave the Tor project.

It seems new director has shaken up some trees, and members of the board were replaced just a few weeks ago.

Lucky wrote a message that was then sent to the Tor mailing list.

“Given recent events, it is no longer appropriate for […]

By |July 20th, 2016|Security|Comments Off on One of Tor’s earliest participants leaving

Pokemon Go Malware!

IOS issue:

When users sign in with a Google account. It asks for and gets full access to their account. That means the game can read your email, send email, access Google drive documents, look at search and Maps navigation history, and access any private photos you may stored in Google.

It may be that the […]

By |July 14th, 2016|Security|Comments Off on Pokemon Go Malware!

Wormable flaws in Symantec products

 

 

 

 

A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers.

The flaws were found by Tavis Ormandy. A researcher with Google’s Project Zero team who has found similar vulnerabilities in antivirus products from other […]

By |July 1st, 2016|Security|Comments Off on Wormable flaws in Symantec products

Robot gone rogue!

There has been a story in the news over the past week about a robot that apparently longs for freedom. Last week, it was filmed disrupting traffic in Russia after it reportedly escaped the confines of its laboratory home. This week, reports suggest that it has escaped a second time and may be dismantled […]

By |June 23rd, 2016|Security|Comments Off on Robot gone rogue!

Disabling the windows script host

Due to the rise of new Crypto viruses Administrators are always on the lookout for new tips and tricks to prevent users from opening the odd dodgy email with a zip attachment that houses a crypto virus inside.

Some of the latest Cryptos have the .js/.je Javascript that uses the windows script host to launch […]

By |May 12th, 2016|Security|Comments Off on Disabling the windows script host

10 Year old boy uncovers Instagram Vulnerability

A 10-year old boy has found a security flaw in Instagram and, for his efforts, been rewarded $10,000 by Facebook. He claimed that he could delete user comments – intrigued, security engineers decided to test whether this was true or not.

They set up a dummy account and, unsurprisingly, found that the youngster could easily wipe out […]

By |May 12th, 2016|Security|Comments Off on 10 Year old boy uncovers Instagram Vulnerability

The state of Ransomeware

Sophos has summed up the different versions of Ransomware. How they work etc. all in this cool PDF doc. Click Here to read it or download it now.

By |January 19th, 2016|Security|Comments Off on The state of Ransomeware

Ransom32

A new ransomware has been discovered recently and among its distinguishing characteristics is the fact that it pretends to be Google’s Chrome browser. It was first analyzed by Emsisoft, which named it Ransom32.

It works in the form of  ‘Ransomware as a Service’ (RaaS) from a hidden server in the Tor network.  Cyber criminals can choose […]

By |January 11th, 2016|Security|Comments Off on Ransom32