Posts

Showing posts from July, 2018

Project Fission by Mozilla to bring a Site-isolation feature like Chrome in Firefox!

Image
Each time a user visits a new domain, the Google Chrome web browser creates a new process for the web page. This sandboxing is done to stop each process from interfering with one other. This Process is termed as site isolation and is a security feature that has been recently added in the Chrome web browser by Google. This Feature was added in Chrome 63 and users could enable it manually by changing a Chrome flag. Google took this step to address the flaws of security rules enforced by the Same Origin Policy. If allowed to access each other’s data inside the web browser, the malicious sites can steal data from other sites. Site isolation has been enrolled out this year in Chrome 67 and is automatically enabled for better protection. Site isolation was a major architecture change in Chrome. It was prompted by the security scare caused by Meltdown and Spectre security bugs. Site isolation plays a major role in reducing the amount of valuable cross-site information in a web page’

How to Remove Ransomnix Ransomware from the computer system?

Image
What is Ransomnix Ransomware? Ransomnix is a file encryption virus categorized as a  Ransomware . This harmful piece of code infiltrates user’s system covertly and encrypts the websites & related files on the machine with a powerful encryption cipher. Ransomnix Ransomware uses  RSA-2048 encryption algorithm  to encrypt the user’s website files with a  .Crypt extension. Once the files get encrypted, the user cannot open or edit these files. It affects servers and internet sites! After encrypting the files on the user’s system the Ransomnix Ransomware displays a ransom note to the user demanding Ransom in crypto currency such as Bitcoin, Litecoin, Monero etc. Ransomnix Ransomware uses various methods to enter a user’s system to lock the files with its own file extension. These methods include: Third Party software bundling  – Third party software often have additional programs within the setup wizard. The software bundled within these third party programs are often not

Shipping Company COSCO hit by ransomware attack at its American Network

Image
COSCO Shipping Company’s communication networks taken Offline Shipping Company  COSCO was hit by a ransomware infection  that left its  American networks crippled . The company had to take its other networks temporarily offline as a precautionary measure The company issued an official press release that stated that its local email and telephone networks were unable to work properly at the time due to local American network breakdown. It was not clear as to what the issue was that led to an operations shutdown at the American network of the COSCO Shipping network. Some maritime news websites contained information that the system breakdown or the operations shutdown was implemented due to a Ransomware infection that had infected some of the systems. The  source of this news was from the internal emails of COSCO  as seen by some maritime news sites. COSCO Shipping Network is taking Contingency Steps The  press release of 25 July 2018 from COSCO Shipping Network  mentioned th

Department of Homeland Security USA Warns ERP Giants of Impeding Cyber Attack

US Department of Homeland Security (DHS) warns users against ERP Attack Department of Homeland Security of America has warned users against impending cyber attacks on ERP (Enterprise Resource Planning) systems. Homeland security  is a US based national security that ensures that the area of the country within the national boundary is safe, secure and resilient against terror attacks. The basis of this warning is the report published by Threat Intelligence firms that depicts that there has been a sudden surge in the interest of the hackers to target ERP systems who may use both hacking and DDoS (Distributed denial of Service) attacks to carry out disruption and compromise these high-value assets. Attacks of this nature were first warned in May 2016 when the exploitation on 36 global organizational institutions was suspected through the abuse of the seven year old vulnerability in SAP applications. What is ERP? Why cyber criminals target ERP systems? ERP (Enterprise Resourc

Twitter played harsh with 143,000 Apps that violated its policies

Image
Twitter removed more than 143000 apps this year between April and June 2018 who breached company’s policies. The company has also promised to improve tools and processes to ensure overall safety and security for everyone. Twitter is an online social networking platform that enables users to interact with each other via messages known as “Tweets”. Developed and launched in the mid of 2006, the service gained worldwide popularity in a short period. As of 2016, Twitter had more than 300 million monthly active users and around 340 million tweets a day. The platform is also famous among businesses as it has helped them benefit from this social networking service. Also the app has enabled developers build careers in data science, learn coding and much more. Since the launch of this amazing online social networking platform, Twitter is proud of the contribution of the developers for discovering helpful and innovative use cases and produce delightful and fun experiences on Twitter. Twi

How to Remove Proticc Ransomware from the Computer System?

Image
What is Proticc Ransomware? Proticc Ransomware is a malicious computer program categorized as a  Ransomware . It uses powerful file encryption algorithm such as AES or RSA encryption algorithm to encrypt files. The method of infiltration used by such malicious program is through third party software bundling, spam email attachments, malicious links in web pages, torrents and peer-to-peer file transfers. Users should be careful while installing any software from the third party websites. Many a times, the installation setup contains additional software bundled within. The user ends up installing the additional software if they rush through the installation steps.  The users should always check the Custom/Advanced Settings and uncheck any additional software that is not needed. Spam emails often contain attachments that download the virus payload in the system Malicious links and fake websites are also used as a method of infecting the user’s system with the Proticc Ransomware. T

Major Vulnerabilities found in Car Sharing Apps in Android Devices as per Kaspersky Labs

Image
Car Sharing attacks Traffic is not just a nuisance for riders; it is also a public health hazard and disappointing news for the economy. Transportation studies reveal that the annual cost of congestion is $160 billion. With Global warming at its peak, to avoid sun strokes, people prefer to travel in air conditioned cars even if it is out of their budget to own one. Though it is considered a necessity,  the global issues pertaining to the use of AC cars  cannot be ignored. New travel alternatives devised by the latest technology have provided individuals with a vast number of  choices other than public transportation. Requesting a ride from your phone is not only convenient;  sharing a ride with co- passengers or grabbing a bike outside your home have also had a positive social impact with respect to congestion, energy consumption and pollution. This day by day growing popularity of car sharing has caught the eyes of the cyber criminals as well! They have already started

Windows 10 Cumulative Updates KB4340917, KB433817 & KB433827 released by Microsoft!

Image
A new patch has been released by Microsoft for its different Windows 10 updates running on systems worldwide. The Windows 10 April 2018 Update (Version 1803), Windows 10 Fall Creators Update (Version 1709), and Windows 10 Creators Update (Version 1703) received the new patch versions KB4340917, KB433817 and KB433827 respectively. If the updates are not enabled to be automatically downloaded on your system then go to Settings >Update & Security>Windows Update and select the option Check for Updates. Another way is to type “Update” in the search bar in the start bar and click on “Check for Updates” option in the results. Changes made to these Windows 10 updates are listed below: The Windows 10 April 2018 Update (Version 1803) after getting the KB4340917 Update comes with the following changes and bug fixes. Read Full Article

Kronos Trojan hits the Banking Sector back with a new version

Kronos banking  Trojan  was first discovered in 2014. The malware capable of stealing banking credentials had its heydays back then. However, in 2016, suddenly the once daunting banking Trojan laid dormant and dropped off researchers’ hit list. Recent research reveals that the malware is back again with its revamped version. The Trojan did made to the headlines in 2017 but the attack samples appeared to be mild with limited activity. On 27 th  June 2018, the new variant got off the ground and is known to have launched four distinct campaigns since then targeting Germany, Japan and Poland and also one test campaign. The new Version of the Kronos Banking Trojan has been retooled with a few new incorporated features like a new command-and-control feature that is designed to work with an anonymizing network –  Tor . Tor is free software that enables anonymous communication. The software is intended to conceal Internet activity of the user to protect their privacy, giving them space to