Security

Tue
29
Mar
John Lister's picture

Scammers Get Creative With Disguised Downloads

Scammers who don't want to write their own malware can now pay just $20 to start a campaign of attacks. They can then customize their "bait" with Windows installations and non-fungible tokens (NFTs) among the ways to target users. The malware is ... available on dark web sites. These are sites that are part of the world wide web, but set up in a way that means they aren't indexed by search engines. That makes them suitable for people who don't want their activities easily traced. A piece of malware called BitRAT costs just $20 for lifetime access. The name derives from "remote ... (view more)

Thu
24
Mar
John Lister's picture

Browser-In-Browser Could Steal Passwords

A security researcher has warned that a fake browser could be used to more effectively scam users into handing over login details. Password managers and similar tools may be one way to combat the tactic. The warning comes from a security researcher ... who chooses to use the pseudonym mrd0x. They dubbed the approach a "browser-in-the-browser" attack. (Source: mrd0x.com ) The tactic would take advantage of websites that have registration and accounts but let users sign in with a third party account such as Google or Facebook. This works by displaying a pop-up window that's hosted by the ... (view more)

Fri
04
Mar
John Lister's picture

Windows Reset Warning: Personal Files May Remain

Microsoft has warned users that a "wipe clean" option in Windows won't remove all files thanks to an ongoing bug. It's mainly a practical problem for anyone planning to sell or give away a computer with hopes of removing all personal data prior. The ... problem is specifically with the reset option in Windows that lets users "reinstall" the system without needing to download files or create a USB or DVD boot disc. This option always removes all installed applications, but users have a choice whether or not to also remove files such as documents. When they choose "remove everything", ... (view more)

Wed
16
Feb
John Lister's picture

Report: Most Ransomware Money Tied to Russia

Nearly three in every four dollars paid to ransomware scammers goes to Russian-affiliated groups according to new research. The authors also accuse Russia of turning a blind eye to large-scale money laundering. The figures come from Chainalysis, ... which tracks crime involving cryptocurrencies. These are "virtual" currencies such as Bitcoin where all transactions are tracked on a public "ledger". The way cryptocurrencies work means its relatively straightforward to track the amount of money a particular user has spent or received. However, it's often difficult to prove who a particular user is. ... (view more)

Tue
15
Feb
John Lister's picture

Fake Microsoft Site Distributes Bogus Windows 11

Security experts have reminded users to take extra care when sourcing installation files for Windows 11. A look-alike "Microsoft" site was actually distributing some nasty malware. Normally such scams tend to mainly work on people who are either ... trying to get round paying for software or are trying to get early access without going through official test programs. That's not quite the case with Windows 11 where people running "incompatible" machines can still upgrade to the system by downloading official files and creating a USB installation. However, when some people came looking for Windows ... (view more)

Fri
11
Feb
John Lister's picture

Microsoft Tackles Macro Malware

Microsoft is making it harder for scammers to distribute ransomware and other malware through Office documents. However, the tighter block on visual basic macros running by default may frustrate some users. A macro is a way of reducing a series of ... instructions to a single instruction, while VBA (visual basic language) is a way of handling macros in Microsoft programs. It's often used for frequently performed tasks. To give a hypothetical example, a user could create a macro in a spreadsheet that means pressing a couple of keys together which tells the computer to check two columns for any ... (view more)

Wed
26
Jan
John Lister's picture

Darkweb Stolen Credit Card Site Operators 'Retire'

The people behind an online service for buying and selling stolen credit card details say they are retiring for health reasons. The unknown owners reportedly made $358 million from their "marketplace." The UniCC service operated on a so-called ... darknet, only accessible through special software designed to make it much harder to track who visited which online service. The BBC notes that the site had operated since 2013 and estimates users listed "tens of thousands" of stolen card details every day. It appears to have been particularly popular for criminals who had carried out major data ... (view more)

Tue
25
Jan
John Lister's picture

Edge 'Update' Is Ransomware Scam

Scammers are tricking Microsoft Edge users with a bogus software update. It's something of a backhanded compliment to the browser finding an audience. Security company Malwarebytes says it worked with the independent research team "nao_sec" to ... identify the scam. At the moment it appears to be specifically targeting users in South Korea with ransomware, though the tactic could easily be adapted. (Source: techradar.com ) According to the researchers, the scam begins with a malicious ad, usually posted on a page with a lot of advertising. That's likely to make it harder to identify the culprit. ... (view more)

Sat
01
Jan
John Lister's picture

LastPass Blunder Causes Security Scare

Users of popular password manager tool LastPass have reported worrying emails that suggest their master passwords have been compromised. LastPass says the emails may have been sent mistakenly and that it has no evidence of any security breach. Like ... most such tools, LastPass let users create a single memorable password, the name coming from the idea it's the "last password" users will ever need to remember. This password is necessary to unlock a private vault of stored encrypted passwords for other sites. One of the big keys to the service is that LastPass itself has no access to the master ... (view more)

Thu
16
Dec
John Lister's picture

Mozilla Beefs Up Browser Security with 'RLBox'

Mozilla has announced a rethink of a key technology used to make web users safer. The latest update to its Firefox browser improves the "sandboxing" approach. One of the biggest security concerns with web browsers is the way a single application ... (the browser) can handle data from multiple sites open in different tabs. It creates the risk that a compromised site could access data from another site; for example, one tab might display or transmit emails, login details or financial information. The way browsers tackle this risk is called sandboxing. That means telling operating systems such as ... (view more)

Pages

Subscribe to RSS - Security