Microsoft to Windows 7: Beat it, you bum
Microsoft today figuratively told Window 7 – which ended support with a final security update – not to let the door hit it on the way out. “Ten-year-old tech just can’t keep up,” Jared Spataro, an executive on the Microsoft 365 team, wrote in a post to a company blog. “As we end support for […] more…Seven high points of Windows 7
Today Microsoft issues its final free security update for Windows 7, putting an end to that operating system’s decade. To remember that service – a retirement party but without the cloyingly-sweet cake and cheap gold watch – Computerworld selected seven highlights of Windows 7. While the seven do not pretend to trace Windows 7’s history, […] more…Smartphone shopaholic
Have you ever noticed strange reviews of Google Play apps that look totally out of place? Their creators might give it five stars, while dozens of users rate it with just one, and in some cases the reviews seem to be talking about some other program entirely. If so, you may be unknowingly acquainted with […] more…Ultra Wideband (UWB) explained (and why it’s in the iPhone 11)
One of the new chips in this year’s crop of iPhones is the U1; it provides Ultra Wideband (UWB) connectivity that, in conjunction with Internet of Things (IoT) technology, could offer a myriad of new services for enterprises and consumers. As Apple puts it, UWB technology offers “spatial awareness” – the ability for your phone […] more…Lessons Learned: A Decade of Digital Parenting
Give yourself a high-five, parents. Pour yourself a cup of coffee or your favorite celebratory drink and sip it slow — real slow. Savor the wins. Let go of the misses. Appreciate the lessons learned. You’ve come a long way in the last decade of raising digital kids, and not all of it has been […] more…5 Year Anniversary of the SoakSoak Malware Tsunami
This is a story about the SoakSoak malware campaign that proved that you can’t underestimate impact of security issues in popular premium software. These days, the majority of popular content management systems are 100% free: WordPress, Magento, Joomla, Drupal, etc. Moreover, most CMS extensions are also free. In fact, modern webmasters can build any type […] more…DDoS Attacks and IoT Exploits: New Activity from Momentum Botnet
by Aliakbar Zahravi We recently found notable malware activity affecting devices running Linux, a platform that has battled numerous issues just this year. Further analysis of retrieved malware samples revealed that these actions were connected to a botnet called Momentum (named for the image found in its communication channel). We found new details on the […] more…Story of the year 2019: Cities under ransomware siege
Ransomware has been targeting the private sector for years now. Overall awareness of the need for security measures is growing, and cybercriminals are increasing the precision of their targeting to locate victims with security breaches in their defense systems. Looking back at the past three years, the share of users targeted with ransomware in the […] more…Government Withdraws Cash Prize From President’s Cup Cybersecurity Competition
The U.S. government has decided that at least some participants in the President’s Cup Cybersecurity Competition cannot be awarded cash prizes, and one participant says the entire contest has been poorly organized. read more more…Microsoft to end updates to Windows 7’s free AV software, Security Essentials
Microsoft will not provide new malware signatures for its home-grown Security Essentials software after it retires Windows 7 in five weeks. “No, your Windows 7 computer is not protected by MSE ((Microsoft Security Essentials)) after January 14, 2020,” the company said in a support document mainly concerned about the Extended Security Updates (ESU) being shilled […] more…BMW, Hyundai Targeted by Vietnamese Cyberspies: Report
BMW and Hyundai have been targeted by a cyber-espionage group believed by many to be associated with the government of Vietnam, German broadcaster Bayerischer Rundfunk (BR) reported last week. read more more…Code Execution Vulnerabilities Patched in Accusoft ImageGear
Vulnerabilities in document and imaging library Accusoft ImageGear could allow attackers to execute code remotely on vulnerable machines, Cisco Talos has discovered. The library, which is used by developers to build custom imaging applications, contains the entire document imaging lifecycle, and includes support for .NET, Java and C/C++. read more more…Corporate security prediction 2020
Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Cyberthreats to financial institutions 2020: Overview and predictions Moving to the cloud The popularity of cloud services is growing, and threat actors are here to exploit the trend. We are observing more and more […] more…Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK
By Joey Chen, Hiroyuki Kakara and Masaoki Shoji While we have been following cyberespionage group TICK (a.k.a. “BRONZE BUTLER” or “REDBALDKNIGHT”) since 2008, we noticed an unusual increase in malware development and deployments towards November 2018. We already know that the group uses previously deployed malware and modified tools for obfuscation, but we also found […] more…IT threat evolution Q3 2019. Statistics
These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network: Kaspersky solutions blocked 989,432,403 attacks launched from online resources in 203 countries across the globe. 560,025,316 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by […] more…IT threat evolution Q3 2019
Targeted attacks and malware campaigns Mobile espionage targeting the Middle East At the end of June we reported the details of a highly targeted campaign that we dubbed ‘Operation ViceLeaker’ involving the spread of malicious Android samples via instant messaging. The campaign affected several dozen victims in Israel and Iran. We discovered this activity in […] more…More information
- The Upload: Your tech news briefing for Friday, January 16
- Dutch, European Hospitals ‘Hit by Pro-Russian Hackers’
- Black Hat: Ad Networks Lay Path To Million-Strong Browser Botnet
- macOS Bug Allows Root Access With No Password
- New CISA director outlines top 5 priorities for protecting U.S. critical infrastructure
- Vulnerability in IBM Db2 Leads to Information Disclosure, Denial of Service
- Identifying DNS-Over-HTTPS Traffic Without Decryption Possible: Researcher
- Paying for Social Media
- Facebook bug bounty program paid out $1.5m in 2013
- Adobe Creates Role of Chief Cybersecurity Legal Officer