Security
Stop Ransomware before it takes your files Hostage!
Sophos Intercept X includes CryptoGuard, which stops encryption of data from all forms of ransomware. Even trusted files and services that have been hijacked. As soon as the ransomware gets intercepted, Crypto guard restores all your files back to their safe state.
Rather than trying to examine millions of malware samples, Intercept instead focuses on […]
Snowden’s iPhone surveillance killer
National Security Agency whistle blower Edward Snowden has come up with a concept iPhone case that could prevent the government from finding your location.
On Thursday, Snowden and hacker Andrew Huang presented a possible solution. It’s called “the introspection engine,” and it’s designed to alert the user if and when the phone’s radio signals are turned […]
One of Tor’s earliest participants leaving
Lucky Green, one of Tor’s earliest participants, has decided to leave the Tor project.
It seems new director has shaken up some trees, and members of the board were replaced just a few weeks ago.
Lucky wrote a message that was then sent to the Tor mailing list.
“Given recent events, it is no longer appropriate for […]
Pokemon Go Malware!
IOS issue:
When users sign in with a Google account. It asks for and gets full access to their account. That means the game can read your email, send email, access Google drive documents, look at search and Maps navigation history, and access any private photos you may stored in Google.
It may be that the […]
Wormable flaws in Symantec products
A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers.
The flaws were found by Tavis Ormandy. A researcher with Google’s Project Zero team who has found similar vulnerabilities in antivirus products from other […]
Robot gone rogue!
There has been a story in the news over the past week about a robot that apparently longs for freedom. Last week, it was filmed disrupting traffic in Russia after it reportedly escaped the confines of its laboratory home. This week, reports suggest that it has escaped a second time and may be dismantled […]
Disabling the windows script host
Due to the rise of new Crypto viruses Administrators are always on the lookout for new tips and tricks to prevent users from opening the odd dodgy email with a zip attachment that houses a crypto virus inside.
Some of the latest Cryptos have the .js/.je Javascript that uses the windows script host to launch […]
10 Year old boy uncovers Instagram Vulnerability
A 10-year old boy has found a security flaw in Instagram and, for his efforts, been rewarded $10,000 by Facebook. He claimed that he could delete user comments – intrigued, security engineers decided to test whether this was true or not.
They set up a dummy account and, unsurprisingly, found that the youngster could easily wipe out […]
The state of Ransomeware
Sophos has summed up the different versions of Ransomware. How they work etc. all in this cool PDF doc. Click Here to read it or download it now.
Ransom32
A new ransomware has been discovered recently and among its distinguishing characteristics is the fact that it pretends to be Google’s Chrome browser. It was first analyzed by Emsisoft, which named it Ransom32.
It works in the form of ‘Ransomware as a Service’ (RaaS) from a hidden server in the Tor network. Cyber criminals can choose […]
