Posts

Showing posts with the label privacy

How to Remove Panda Banker Trojan?

Image
Zeus Panda, Panda or Panda Banker  is a spin-off of the  Zeus Banking Trojan.  First seen in 2016 as one of the many variants that cropped up in the wake of the Zeus source code, Panda has fulfilled its function as a banking Trojan since then. Looking to harvest credentials of online banking, payments & other financial portals, the majority of its code is derived from the original Zeus Trojan. The Trojan is designed to target Windows Operating system & leverages man-in the browser/ web injects attack techniques to fulfill the purpose of stealing.  Zeus Panda follows its predecessor & hence primarily targets financial sector & crypto currency sites. In addition it expands its attack in different organization sectors like social networking sites, search, Email & adult sites. The attack strategy of this malware is more or less same with some minor modifications in dynamic configurations. The full arsenal of attack techniques adopted by  Pand...

Chrome Mirrors Your Login To Other Google Service

Image
The huge release of  Chrome 69  brought in many new features to the search giant. Google Chrome got  applauded  for the  slick new theme ,  Auto-fill improvements & Password Generator ,  Built-in Ad blocker ,  colorful backgrounds  &  custom shortcuts on new tab page & much more! Despite the new features ,  Google has been a  target of criticism  and  reproval  from its users for  omitting www  and  m sub-domains from the URL . The  counterblasts  compelled Google to  soften its stance  and consider public feedback, as stated in the Chromium bug tracker issue. Search Giant decided to  roll back the changes  made to Chrome 69; however, the reversal will persist till the release of Chrome 70. Security experts & users are still up in arms after noticing  another weird behavior  of  Chrome 69 . Any Idea? Another Weird Behavior of Chrome...

Two-factor authentication: A Safeguard to Account Login

Image
Users who rely on two-factor authentication via SMS and consider it as a safeguard for account login are in a fix. Cyber miscreants are embarking on new tactics to swindle users. The second layer of authentication implemented on applications to keep accounts protected usually involves a code sent on the mobile devices via SMS. However threat actors have devised decisive tactics to acquire the code sent on the mobile phones and hence gain unauthorized access to your device or application. These tactics include: Intercepting unencrypted messages sent over a network: Attackers leveraged this ingenious technique to target German Bank Accounts last year. Threat actors exploited the vulnerability in the signaling network of telecom operators to redirect calls and text messages. Hence, users attempting to login to their bank accounts waiting to receive a code via a text message were deceived. The text message containing the code were re-routed to hackers that enabled them access user’...

Reddit Data Breach! Hackers gain access to user data & email addresses!

Image
Online Community site, Reddit, informed its users that the company’s servers were breached by hackers, who had gained access to user data. The data breach was accomplished by successfully bypassing or circumventing the SMS based authentication on Reddit servers. The hacker was able to obtain information about some current email addresses and a backup database from 2007 which contained old salted hashed passwords. The data breach occurred between June 14 and June 18 of which the company learned about on June 19. The attacker was able to compromise a few employee accounts with the company’s cloud and source code hosting providers. The Company has its primary access points for code and infrastructure behind strong authentication that requires two factor authentication (2FA). The attacker gained read-only access to some of Reddit systems that contained source code, backup data and other logs. This was a serious attack on the Reddit systems and if the attacker had gained write acces...

CCleaner Version 5.45 faces user backlash on its Auto Monitoring Feature!

Image
Piriform’s CCleaner, PC cleaning software, is facing the dissatisfaction of its users. It was found that the new version of CCleaner, Version 5.45, doesn’t allow its users to disable the ‘Active monitoring’ feature. The extended analytics from the collected user data is supposedly done by the company to gain an insight on how the users interact with CCleaner. The Collected data allows the developers to detect bugs that are evolving and changing by the minute, improve UI, add new functionalities and improve and focus on the old functionalities as required. Users were unable to find any privacy settings in the CCleaner Version 5.45 that allowed users to stop or disable anonymous data being collected by Piriform. Users can disable the active monitoring from options>monitoring, but the feature automatically gets enabled on the next restart. Closing or quitting the software by clicking on the cross ‘X’ button would not result in termination, as the software would minimize itself in ...

Twitter played harsh with 143,000 Apps that violated its policies

Image
Twitter removed more than 143000 apps this year between April and June 2018 who breached company’s policies. The company has also promised to improve tools and processes to ensure overall safety and security for everyone. Twitter is an online social networking platform that enables users to interact with each other via messages known as “Tweets”. Developed and launched in the mid of 2006, the service gained worldwide popularity in a short period. As of 2016, Twitter had more than 300 million monthly active users and around 340 million tweets a day. The platform is also famous among businesses as it has helped them benefit from this social networking service. Also the app has enabled developers build careers in data science, learn coding and much more. Since the launch of this amazing online social networking platform, Twitter is proud of the contribution of the developers for discovering helpful and innovative use cases and produce delightful and fun experiences on Twitter. Twi...

Facebook fined with £500,000 over Cambridge Analytica data scandal

Image
Facebook has been slammed with a fine of £500,000 ($664,000) in the UK for breaking Data Protection laws. The fine was imposed after UK’s data regulator performed a wide ranging investigation into the Cambridge Analytica scandal and found Facebook guilty of non – compliance of GDPR (General Data Protection Regulation) as: * The company failed to protect its user’s personal data. * Facebook guilty as failed to be transparent about how the personal data was being harvested by the third parties. What is Cambridge Analytica?   Cambridge Analytica is a London-based company that helps business and political groups to muster up data on voters during electoral processes. This data is then analyzed to conduct strategic communication and to create effective slogans and campaign messages. The company was started in 2013 as an offshoot of SCL (Strategic Communication Laboratories) group. Social media platforms like Facebook are used as a source to collect data. Cambridge Analytica has ...

How to Remove Boris Ransomware?

Image
What is Boris Ransomware and how does it work? Boris  Ransomware  is a file encryption malware that encrypts files using AES-256 cipher algorithm and is based on the infamous HiddenTear Ransomware family. Once installed on the system via malicious websites, spam email attachments the ransomware scans the PC to search for files with the following extensions and encrypts them with the sophisticated cypher algorithm. .PNG, .GIF, .JPG, .PDF, .XLR, .XLS, .XLSX, .SQL, .APK, .COM, .EXE, .JAR,.CAD Files, .CSS, .HTML .PHP,.DOC, .DOCX, .LOG, .TXT, .CSV, .KEY, .PPT .PPTX and many more. The encrypted files are appended with [decode77@sfetter.com].boris extension. For instance a file named “abc.pdf” would be renamed to “abc.pdf.[decode77@sfetter.com].boris” which is completely unusable. Victims are informed about this unfortunate circumstance by dropping a ransom note file “README.txt” that does not disclose much and reads as: There are two version known of this ransom no...

Prevent and protect yourself from Email Tracking by intrusive ad trackers!

Image
Over the past two decades, email messages have undergone a huge transition. From being a simple text message that was a novel way to send someone a message during its early days, email messages now have the capabilities of embedding technological details required by a user! Users send and receive millions of emails worldwide. From personal mails to office communiqué, emails are used for many different purposes. One such purpose is the use of emails for the promotion of products and services. Promotional emails are sent to users so as to advertise about their product and service. In this cyber era, promoters and advertisers have become bolder and track user activity through the choices they make on the online shopping site. These sites provide them with statistics that allow them to infer the behavior of the users from their choices. In modern times, where promoting your product is key in getting people to talk about your product, promoters have become intrusive and often try and ...