*New Android Malware Infects Over 36.5 Million Phones

TechViews News   …..

Security researchers at Check Point Security recently discovered a malware scam in Google’s Play Store. The malware dubbed “Judy” has been hiding behind the scenes on 41 specific apps that have been available in the Play Store for years, so it’s unclear how long they have been infecting devices.

The malicious apps were developed by the Korean company, Kiniwini, listed in the Play Store as ENISTUDIO corp. The impacted apps have been downloaded millions of times and may have been spread to over 36 million users.

Moreover, the researchers also uncovered a few more apps, published by other developers on the Apple Store, inexplicably containing the same the malware in them. The connection between the two campaigns remains unclear, though researchers believe it is possible that one developer borrowed code from the other.

This is how it works — the user downloads an app from the Play Store and at that point, it’s not malicious. But once the user opens the app, it connects to its Command and Control server (C&C) and installs the malicious code.

Continue reading

Advertisements

*Computing vulnerabilities you should address

TechViews News   …..

Most people and small businesses are still using hardware and software that is older than five to seven years old. In a general sense, that’s ok. But as the march of improved products and software moves forward, it leaves existing equipment behind. Older than five years is becoming too old to be trusted in today’s world of security breaches.

An old computer that’s still chugging along, running an old operating system and perhaps old programs and applications, doesn’t seem to be a big deal. After all, they still seem to work just fine. Why spend money on new equipment or software if it’s adequate and functioning?

Walker White, president of BDNA, a company that tracks and analyzes end-of-life (EOL) data for hardware, software and medical devices, says that the main problem with out-of-date software and legacy hardware is that once they pass their EOL cycle, the vendor no longer maintains or supports the products, resulting in security vulnerabilities and risk.

Here’s a look at the hardware, software and mobile device vulnerabilities you should tackle now to reduce risk and increase security.

Continue reading

* Smart-TV’s and Refrigerators can Be Used to Attack Businesses

TechViews News   …..

We all remember last October’s massive Internet hack using ordinary household Internet connected devices. The Internet of Things (IoT) is becoming more and more a favorite tool of hackers.

Those devices which ranged from webcams, to security systems, to home appliances, were victims to the Mirai bug. This bug was easily planted because homeowners seldom change the passwords or log-in credentials of ordinary household appliances.

But many people are still scratching their heads…. ‘Can my baby monitor or my refrigerator actually bring down the Internet?’

While IT experts have long predicted security risks associated with the rapidly proliferating Internet of Things (IoT), this is the first time the industry has reported actual proof of such a cyber-attack involving common appliances. And now with the Mirai attack in October 2016, the methodology has gone mainstream.

Continue reading

*30 security terms you need to know to protect yourself online

TechViews news   …..

Cyberattacks have been on the rise for the past several years and 2017 shows no signs of letting up. But, these days, online threats go far beyond your computer getting a virus. If you don’t know what threats are out there, protecting yourself will be a challenge. That’s why I’ve rounded up 30 terms you need to know if you want to safeguard your online privacy and security.

Two terms before we begin

Each of the terms we’re about to go over all fall under the umbrella of two terms you need to understand. The first is “Cyberattack” and the second is “Cybersecurity.”

Cyberattack

Simply put, a cyberattack is any attempt by an outside source to target, steal from, spy on, damage or destroy a computer network. Cyberattacks come in all shapes and sizes (as you’re about to see), and the criminals behind them don’t set their sights on a single target. No home network is too small, or company too large, to fall victim.

Cybersecurity

Cybersecurity, on the other hand, is the act of protecting networks from cyberattacks. Whether it’s locking down your personal network at home, or hiring a staff of IT professionals to secure the network for your business, cybersecurity is increasingly becoming a challenging task. To beat cybercriminals, you have to always be one step ahead of the game.

Ready? here we go ……

A Glossary of Cybersecurity Terms:

Continue reading

*Amazon Echo listens and records everything

TechViews News   …..

In-Home Virtual Assistants sprang onto the market with the Amazon Echo. Since then around 5.1 million units have already been sold. If this past Christmas is any indicator, it doesn’t seem as if this trend will be slowing anytime soon

But with millions of people bringing either the Amazon Echo or Echo Dot into their homes and connecting them to their private Wi-Fi networks, there is serious cause for concern.

What owners of these virtual assistants might not realize is that these kinds of home appliances are always listening, and recording everything they hear.

Everything?

Yes, because it’s the listening and translating algorithms that allow the Echo to understand comments or commands. That means, if you’re not careful, they could be a privacy nightmare.

Continue reading

*It’s Easy to Safely Delete Private Data

TechViews News   …..

When you hit delete on a file, in most cases, those 1s and 0s aren’t actually erased. Just because the file has been deleted doesn’t mean it’s gone. The operating system just marks the space they’re taking up as free for new stuff. So until a new file overwrites that particular space on the hard drive it can still be recovered.

If you want those files permanently erased, as in gone forever, you need to do more than simply delete them. What third-party eraser tools do is wipe over your sensitive files with random data, so not even the best recovery utility on the planet can bring them back.

Or at least that’s true for traditional hard drives. Modern solid-state drives (SSDs), and the flash memory in mobile phones, don’t work in the same way. If you are using a SSD drive, deleted files are harder to recover once they’ve gone beyond the Recycle Bin or Trash anyway.

Continue reading

*Firefox and Tor to Patch Critical Zero-day Vulnerability

TechViews.org   …..

The critical Firefox vulnerability being actively exploited in the wild to unmask Tor users has been patched with the release of new browser updates. Both Mozilla and Tor Project has patched the vulnerability that allows attackers to remotely execute malicious code on Windows operating system via memory corruption vulnerability in Firefox web browser.

Tor Browser Bundle is a repackaged version of the open-source Mozilla Firefox browser that runs connections through the Tor anonymizing network configured to hide its user’s public IP address.

However, the exploit code released by an unnamed online user was currently being exploited against Tor Browser users to leak the potentially identifying information of Tor users.  Continue reading