Improvements and fixes This security update includes quality improvements. No new operating system features are being introduced in this update. Key changes include: Addressed issue with Surface Hub devices waking from sleep approximately every four minutes after the first two hours. Addressed issue where autochk.exe can randomly skip drive checks and not fix corruptions, which… Continue reading Cumulative Update KB4016871 Windows 10 v1703 Build 15063.296
Author: admin
Realistic Brits want at least 3 security steps on bank accounts
Which breach were your details revealed in, then? 8 May 2017 at 14:21, John Leyden Three in five Brits reckon that fewer than three security steps – including passwords, card readers or letters from a memorable word – are insufficient to assure their… Continue reading Realistic Brits want at least 3 security steps on bank accounts
Thousands of Devices Hacked by Rakos Botnet
By Eduard Kovacs on May 08, 2017 Thousands of devices have been hacked by a Linux malware named Rakos, and while researchers have yet to see any actual malicious activity involving the botnet, they believe it could be used for powerful distributed denial-of-service (DDoS) attacks. Rakos, whose existence was brought to light in December… Continue reading Thousands of Devices Hacked by Rakos Botnet
The Best Ransomware Protection of 2017
Webroot Tied for number one: http://www.pcmag.com/roundup/353231/the-best-ransomware-protection Awesome work Webroot: http://www.pcmag.com/article2/0,2817,2470312,00.asp Cheers, Daniel Take a look at the best antivirus, anti-malware, anti-spy, etc. software Powered by WPeMatico
Critical Flaw Patched in Jenkins Automation Server
By Eduard Kovacs on May 08, 2017 The developers of Jenkins recently patched several vulnerabilities, including a critical weakness that can be exploited by a remote attacker for arbitrary code execution. Jenkins is the most popular open source automation server, with over 133,000 installations and more than 1 million users worldwide. The product, maintained… Continue reading Critical Flaw Patched in Jenkins Automation Server
BitKangoroo Ransomware Deletes Your Files If You Do not Pay
I am trying something new where I will post in brief articles about new ransomware as they are released. Many of these ransomware infections do not warrant a full article, but I feel its important to quickly get the word out about new techniques or variants as we discover them. In our first… Continue reading BitKangoroo Ransomware Deletes Your Files If You Do not Pay
Shodan’ Malware Hunter to Expose Command & Control Centers of Botnets
The Malware Hunter initiative will help researchers and firms to secure their devices from malware infection. By Jahanzaib Hassan 3rd May 2017 Recorded Future, a threat intelligence company together with Shodan, which is an internet search engine connecting services to internet devices, have created an online crawler which… Continue reading Shodan’ Malware Hunter to Expose Command & Control Centers of Botnets
Website of HandBrake App Hacked to Spread Proton RAT for Mac Users
May 7th 2017 By Catalin Cimpanu The website of the HandBrake app has been compromised, and one of its download mirrors modified to host a version of the Proton RAT embedded in the app’s Mac client. HandBrake is a multi-platform transcoder, an app that… Continue reading Website of HandBrake App Hacked to Spread Proton RAT for Mac Users
FrozrLock Ransomware Advertised on the Dark Web As “Great Security Tool”
5th May 2017 By Catalin Cimpanu A new Ransomware-as-a-Service has become available on the Dark Web, named FrozrLock, available for only $220, and advertised under the tagline of “great security tool that encrypts most of your files in several minutes.” Bleeping Computer received a tip about FrozrLock’s existence from security researcher David Montenegro,… Continue reading FrozrLock Ransomware Advertised on the Dark Web As “Great Security Tool”
Cyber-Espionage Malware Is So Advanced It Has Its Own API
5th May 2017 By Catalin Cimpanu Russian cyberspies have developed a new breed of backdoor trojan that features several novel techniques, including an API that allows attackers to reverse the C&C communications flow when needed. This new threat came to light… Continue reading Cyber-Espionage Malware Is So Advanced It Has Its Own API