One of the worst types of malicious software that computer users worldwide are plagued with is ransomware. This type of malware encrypts the contents of the user’s computer in an attempt to force the PC owner to pay a ransom to decrypt their hard drive. Anyone impacted by the REvil ransomware can decrypt their machine for free with a master … Continue reading
As safe as you might feel sitting at your laptop, happily typing and posting and scrolling, we all know the truth: the internet is actually a giant hellscape full of spies, criminals, ransomware, and all kinds of other dangerous shit.
Malware is a common problem for computer and mobile device users. Malware can target various assets of the target device, including social media accounts, banking information, and credit card information, among other data. A new Android Trojan malware called FlyTrap has impacted Android users in at least 140 countries since it was first seen in March. According to security research … Continue reading
Governments, vigilantes, and criminal hackers have a new way to disrupt botnets running the widely used attack software Cobalt Strike, courtesy of research published on Wednesday.
Cobalt Strike is a legitimate security tool used by penetration testers to emulate malicious activity in a network. Over the past few years, malicious hackers—working on behalf of a nation-state or in search of profit—have increasingly embraced the software. For both defender and attacker, Cobalt Strike provides a soup-to-nuts collection of software packages that allow infected computers and attacker servers to interact in highly customizable ways.
The main components of the security tool are the Cobalt Strike client—also known as a Beacon—and the Cobalt Strike team server, which sends commands to infected computers and receives the data they exfiltrate. An attacker starts by spinning up a machine running Team Server that has been configured to use specific “malleability” customizations, such as how often the client is to report to the server or specific data to periodically send.
Those who want early access to Windows 11 may try to find the new OS’ installer through a quick Google search. Yeah, you shouldn’t do that! Antivirus company Kaspersky reports that it’s saved “several hundred” customers from fake Windows 11 installers, which are really just malware. If you really need Windows 11 today, you must download it through official channels—and it’s very easy to do so!
As explained by Kaspersky, fake Windows 11 installers are just .exe files with official-looking license agreements and installation wizards. Microsoft will never distribute this OS (or any OS firmware updates, for that matter) through an executable file. You can only upgrade Windows 10 to Windows 11 through the “Updates & Security” panel in your Settings.
So, how do you safely install Windows 11? I suggest reading our detailed guide at How-To Geek, but here’s the short of it—go to the Windows Insider website and click “Register.” After you breeze through some agreements, open your Windows 10 PC’s Settings and click “Updates & Security,” then select “Windows Insider Program” in the sidebar. Press the “Get Started” button, choose the “Dev Channel” as your Insider Setting, then go back to “Updates & Security” to install Windows 11.
Bear in mind that some computers cannot install Windows 11 due to the OS’ hardware requirements. Unfortunately, Microsoft disabled its compatibility-checking tool, so unless you want to read the requirements the old-fashioned way, your best bet is to go through the installation process listed above and hope that it works. “Updates & Security” will tell you (during the last step) if your computer isn’t up to scuff.
If you’re still having trouble with the Windows 11 Insider preview, just wait a few months for the OS’ official launch. Most of Windows 11’s most interesting features are still missing from the Insider preview, so it’s not worth fussing about. Plus, when Windows 11 comes out, Microsoft will nag you literally every day until you install it.
Enlarge/ A report this week indicates that the problem of high-caliber spyware is far more widespread than previously feared. (credit: Pau Barrena | Getty Images)
The shadowy world of private spyware has long caused alarm in cybersecurity circles, as authoritarian governments have repeatedly been caught targeting the smartphones of activists, journalists, and political rivals with malware purchased from unscrupulous brokers. The surveillance tools these companies provide frequently target iOS and Android, which have seemingly been unable to keep up with the threat. But a new report suggests the scale of the problem is far greater than feared—and has placed added pressure on mobile tech makers, particularly Apple, from security researchers seeking remedies.
This week, an international group of researchers and journalists from Amnesty International, Forbidden Stories, and more than a dozen other organizations published forensic evidence that a number of governments worldwide—including Hungary, India, Mexico, Morocco, Saudi Arabia, and the United Arab Emirates—may be customers of the notorious Israeli spyware vendor NSO Group. The researchers studied a leaked list of 50,000 phone numbers associated with activists, journalists, executives, and politicians who were all potential surveillance targets. They also looked specifically at 37 devices infected with, or targeted by, NSO’s invasive Pegasus spyware. They even created a tool so you can check whether your iPhone has been compromised.
Kaseya, an IT management software firm, says that it’s obtained the REvil universal decryption key through a “trusted third party.” This should help Kaseya recover data from a July 4th REvil ransomware attack that affected over 1,500 businesses.
No matter what version of Windows you are running, you need to update NOW. If you are truly paranoid, shutdown your Print Spooler service, and set it to Manual start. You’ll need to start it to print to a network printer, but you will protect your system and network from this serious threat. Check out the article from Digital Trends below.
To Our Customers: If your servers are managed by Proactive Computing, they are already protected from the PrintNightmare threat. But please follow the instructions below to update your Windows PCs and Laptops today.
There’s a new vulnerability in Windows 10 called “PrintNightmare.” It was revealed in early July 2021, and Microsoft is already rolling out an emergency security update to fix the problem. You should update as soon as you can.