Ransomware has seen an abrupt rise in the recent years, and the present-day developments are only making this threat more infamous. If you love to keep yourself updated with the latest developments in the tech world, you might have heard about the notorious WannaCry ransomware, which is locking down people’s computers. It also goes by the other names like WannaDecrypt0r, WCry, and Wanna Decryptor.
What is WannaCry ransomware?
Till now, more than 150 countries have been affected by WannaCry ransomware, which exploits EternalBlue vulnerability and uses phishing emails. The NSA was the first to discover this flaw, and it was made public by ShadowBrokers in April.
A new strain of malware targeting Linux systems, dubbed “Linux/Shishiga,” could morph into a dangerous security threat.
Eset on Tuesday disclosed the threat, which represents a new Lua family unrelated to previously seen LuaBot malware.
Linux/Shishiga uses four different protocols — SSH, Telnet, HTTP and BitTorrent — and Lua scripts for modularity, wrote Detection Engineer Michal Malik and the Eset research team in an online post.
Malware has been discovered preinstalled on 36 Android phones belonging to two companies, security software maker Check Point reported on Friday.
Malware Found Preinstalled on Dozens of Android Phones
“In all instances, the malware was not downloaded to the device as a result of the users’ use — it arrived with it,” noted Oren Koriat, a member of Check Point’s Mobile Research Team.
The malicious apps on the phones of a telecommunications company and a multinational technology business were not part of the official ROM supplied by the vendor, he explained. They were added somewhere along the supply chain.
If malware uses a remote command-and-control server to function, it’s relatively easy to cripple it by blocking the internet addresses it uses. It’s not always that easy, however, and researchers at Cisco’s Talos group have found a textbook example of this in action. A recently discovered Windows PowerShell trojan, DNSMessenger, uses the Domain Name Service for communication — you know, one of the cornerstones of the internet.
Few computer users are equipped to block DNS without causing other problems, and they might not notice unusual data traffic even if they’re looking for it. While using DNS isn’t completely unheard of, DNSMessenger uses an “extremely uncommon” two-way approach that both sends commands to victim machines and sends results back to the attacker.
A ransomware attack darkened the video surveillance system of the District of Columbia’s police department eight days before the presidential inauguration of Donald J. Trump.
Video storage devices for 70 percent of the CCTV system were unable to record anything between Jan. 12 and Jan. 15, as police techies scrambled to combat malicious software found on 123 of 187 networked video recorders, The Washington Post reported Friday.
Echoing the findings we reported earlier that companies leave cloud protection to third-parties, a new study from cloud security company Netskope reveals most companies don’t scan their cloud services for malware either.
The study conducted with the Ponemon Institute shows 48 percent of companies surveyed don’t inspect the cloud for malware and 12 percent are unsure if they do or not. Of those that do inspect 57 percent of respondents say they found malware.
When we take a look at the Android distribution updates that Google posts every month one thing seems to never change, and that is the overwhelming number of devices that run an outdated version of the operating system.
As of early-June 2016, nearly 90 percent of the handsets with Google Play access are rocking Lollipop, Jelly Bean or another old distribution. Meanwhile, Marshmallow powers only 10.1 percent of Android devices.
Google has ramped up efforts to crack down on suspicious digital advertising, shutting out more “bad” ads than ever last year.
The search giant said it thwarted nearly 800 million weight loss scams, misleading drug promotions, malware-laden pop-ups and otherwise malicious ads last year, according to an annual report the company released on Thursday.
Windows users have long been the primary targets of all manner of security attacks, but now the tide is turning towards Mac users. In recent years there have been more viruses and malware attacks aimed at OS X, and security company Malwarebytes is now warning that Mac owners could fall victim to support scams. iPhones and iPads are also at risk.
It’s a story that will be familiar to PC owners: fake technical support agents offer to remotely connect to a victim’s computer to fix a (fake) problem, and then take control of the system and wreak unknown havoc. Apple does have its own, genuine remote support system accessible through ara.apple.com, but fraudulent pages with similar addresses are being used to trick people into installing remote access software.
Just a couple of days ago, Apple released a statement in the wake of the new XcodeGhost episode and told how this malware infects the applications. The statement also listed the steps they are taking to prevent it from spreading further.
Apple said that they‘d be posting a list of some of the most popular XcodeGhost infected iOS apps in upcoming days. Apple also said that the iOS users who downloaded the infected apps, they would be notified.
The company has released the list of 25 most popular XcodeGhost infected iOS apps. Take a look: