Recent Posts

Pages: 1 [2] 3 4 ... 10
11

Some Windows 7 and 8 users would rather chance a malware infection than an involuntary Windows 10 upgrade.
http://www.pcworld.com/article/3075729/windows/fearing-forced-windows-10-upgrades-users-are-disabling-critical-updates-at-their-own-risk.html
12

Microsoft wants you to stop using “password” as your account password, and the company knows just how to do that – ban it outright.

The company wrote in a technical blog, noticed by online news site Mashable, that it will ban users from setting up account passwords with some of the most commonly used passwords.

Microsoft hopes the practice will increase security for user accounts, as those with passwords such as “football” and “12345” are some of the most susceptible to hackers.

http://www.seattletimes.com/business/technology/microsoft-bans-12345-and-other-commonly-used-passwords-to-increase-security/
13
Current News / Judge tosses evidence in FBI Tor hacking child abuse case
« Last post by Bugbatter on May 27, 2016, 10:05:15 AM »
A US federal judge on Wednesday excluded all evidence in a child pornography case that was acquired by the FBI through an exploit compromising the Tor network. The federal government hasn’t announced what it’ll do next, but if it can’t prevail in an appeal, its case against Vancouver, Washington teacher Jay Michaud may well be doomed.

"...What the government will ultimately do about all this remains to be seen, but one thing seems clear: in the post-Snowden era, formerly compliant courts are becoming more skeptical of the US government’s claims on electronic search and privacy, and more willing to throw roadblocks in its way."

Complete article:
https://nakedsecurity.sophos.com/2016/05/27/judge-tosses-evidence-in-fbi-tor-hacking-child-abuse-case/
14

Facebook and many other major tech companies and consumer advocacy groups teamed up this week to urge the Senate to pass a bill that would reform online communication privacy.

The group of organizations wrote a letter to Senator Chuck Grassley (R-Iowa), the chairman of the Senate Judiciary Committee, voicing support for the Email Privacy Act that recently passed through the House of Representatives by a vote of 419-0. The bill would close a loophole in the 1986 Electronic Communications Privacy Act that lets government agents demand emails with only a civil subpoena instead of a warrant if the email is more than 180 days old.

Of course, a bill written in 1986 that deals with the Internet badly needed an update — thus the unanimous vote. However, Facebook and the other groups that wrote the letter emphasized that the reforms in the bill do not go far enough to protect users’ privacy from the government.

http://facecrooks.com/Internet-Safety-Privacy/Facebook-Pushes-Senate-For-Stronger-Online-Communication-Privacy.html/
15
Current News / Ransomware-hit hospital faces second demand despite paying up
« Last post by Bugbatter on May 25, 2016, 10:27:36 AM »

Apparently, the hospital paid one ransom, but didn’t get all its files back.

A second ransom demand followed, and this time, the hospital didn’t pay up, figuring that was no longer “a wise manoeuvre or strategy.”

https://nakedsecurity.sophos.com/2016/05/25/ransomware-hit-hospital-faces-second-demand-despite-paying-up/
16
Current News / Windows 10 update offer --- don't simply X it out to "close"
« Last post by ky331 on May 25, 2016, 04:50:56 AM »
One wrong click could get you Windows 10 — whether you want it or not

Microsoft's aggressive campaign to get users to download and install the new Windows 10 operating system appears to be accelerating...

Here's the tricky part, though: As Microsoft itself acknowledges on its support page, clicking on that red X in the upper-right-hand corner doesn't cancel the upgrade; it lets it proceed as planned


http://finance.yahoo.com/news/one-wrong-click-could-windows-183438395.html
17
Current News / Watch out for ads disguised as pins on Google Maps searches
« Last post by Bugbatter on May 24, 2016, 01:11:54 PM »

Get ready for even more ads on the next time you use Google. The company today announced that it will launch local search ads so you can see pinpoints on both Google.com and Google Maps for nearby businesses.

For example, you might be on a road trip and decide to take a lunch break. A search for “drugstore” might feature a purple, promoted business listing followed by other relevant hits in red pins. The feature will work on both desktop and mobile versions of Maps.

http://thenextweb.com/google/2016/05/24/youll-soon-see-promoted-pins-google-maps-searches/
18
General Security Issues / Re: Cryptolocker and Cryptowall + variants
« Last post by Digerati on May 24, 2016, 09:20:26 AM »
If you encrypt your files, none of those malware programs can "access" them - and by access, I mean open them and see what they say. But they can encrypt them again so you cannot open them without their key. So what you need to do is make sure Windows is updated and you use a good security setup (I use Windows Defender, Windows Firewall, and I do supplemental scans with Malwarebytes Antimalware), and you avoid being click-happy on unsolicited downloads, links and attachments to avoid getting infected in the first place.

You say, "i need to take a regular backup of the local files (google drive)". I am not clear what you mean by "local files (google drive)". Google Drive is "cloud" storage - that is, NOT local.

Any good, viable backup plan involves multiple backups in multiple formats and locations. So backing up to the cloud is fine, but you should also backup to something else - like an external drive.  This way, if the data in the cloud storage is somehow lost, you still have the external drive.
19

From the beginning of this year, we are observing rapid development of DMA Locker. First, the threat was too primitive to even treat it seriously. Then it evolved to more complex but still decryptable ransomware.

The 3.0 edition was very similar to the previous one that we described, so we skipped posting about its details (the only change was to fix the bug making it decryptable). Now we are facing an outbreak of version 4.0, coming with various changes.

In the past, DMA Locker was known from being installed on hacked Remote Desktops. New release has been found distributed via exploit kit (Neutrino). This change is another step towards maturity of the malware, showing that now this threat will be spreading on a bigger scale.

See DMA Locker development timeline:
https://blog.malwarebytes.org/threat-analysis/2016/05/dma-locker-4-0-known-ransomware-preparing-for-a-massive-distribution/
20
General Security Issues / Cryptolocker and Cryptowall + variants
« Last post by Surreall on May 24, 2016, 03:37:33 AM »
Hi All,

I wanted to get my files safe before the unthinkable happens.

I use googledrive pretty much exclusively but there is a major security flaw. If files are encrypted locally (ie cryptolocker) then if goolgedrive syncs, it syncs all the encrypted files. Which are then lost forever, if one would refuse to pay the ransom.

So i was thinking, i need to take a regular backup of the local files (google drive), encrypt them myself and store somewhere.

So.....and to the question. Is there a file type that these cryptolockers/wall's cannot access. If i winzipped or winrared files, would these ransomeware programmes still be able to encrypt them, so i cannot access them?

I hope that makes sense?


Rgds

Surreall
Pages: 1 [2] 3 4 ... 10