Downloading Windows 10? Here are a few things you should know about. Windows 10: Privacy issues that come with it and PDF Manual for understanding the Microsoft’s new Operating System.
Window 10 has finally arrived on many users PC/Laptops and they must be busy exploring the Microsoft’s latest offering. There are a lot of things users of Windows 10 should be aware of, and one of them is privacy while other is understanding the features of Windows 10. We had already warned you that Windows 10 Technical Preview, when it was launched, was a keeping track of everything the beta tester did within the operating system.
Read moreWindows 10 is under attack over default settings which users say compromise their privacy, just days after the operating system’s successful launch saw more than 14 million installs in the first 24 hours.
Hundreds of commenters on sites have criticised default settings that send personal information to Microsoft, use bandwidth to upload data to other computers running the operating system, share Wi-Fi passwords with online friends and remove the ability to opt out of security updates. Many of the complaints relate to the new personalised adverts embedded in Windows 10. When the OS is installed, Microsoft assigns the user a unique advertising ID.
Read morePublic Wi-Fi networks — like those in coffee shops or hotels — are not nearly as safe as you think. Even if they have a password, you're sharing a network with tons of other people, which means your data is at risk. Here's how to stay safe when you're out and about.
Just because most wireless routers have a firewall to protect you from the internet doesn't mean you're protected from others connected to the same network. It's remarkably easy to steal someone's username and password, or see what they're doing just by being on the same network. Don't take that chance. We're going to show you which settings are the most important ones.
Read moreA new type of malware resorts to crippling a computer if it is detected during security checks, a particularly catastrophic blow to its victims. The malware, nicknamed Rombertik, is designed to intercept any plain text entered into a browser window. It is being spread through spam and phishing messages.
Rombertik goes through several checks once it is up and running on a Windows computer to see if it has been detected. That behavior is not unusual for some types of malware, but Rombertik is unique in that it actively attempts to destroy the computer if it detects certain attributes associated with malware analysis.
Read moreUnkillable nasty still climbs out of the grave to this day. The Asprox botnet was responsible for about a lot of attack sessions recorded during October 2014, impacting different organisations.
The Asprox malware family is continuing to plague businesses, despite multiple attempts to disrupt its infrastructure. The Asprox botnet, which first surfaced around six years ago in 2008, has been linked to phishing scam messages as well as the distribution of secondary malware infections. The zombie network also acts as a platform for hack attacks. Asprox spreads through vulnerable websites, using SQL injections attacks to plant malicious code.
Read moreResearchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world.
The previously undiscovered malware represents a missing puzzle piece tied to Turla, a so-called advanced persistent threat disclosed in August. For at least four years, the campaign targeted government institutions, embassies, military, education, research, and pharmaceutical companies in more than 45 countries. The unknown attackers have infected several hundred Windows-based computers by exploiting a variety of vulnerabilities.
Read moreMore and more, governments are using powerful spying software to target human rights activists and journalists, often the forgotten victims of cyberwar. Now, these victims have a new tool to protect themselves. It scans a person's computer for traces of surveillance software, or spyware.
A coalition of human rights organizations launched it, with the goal of equipping activists and journalists with a free tool to discover if they've been hacked. The open-source tool was developed by security researcher who has been investigating government abuse of spyware for years. The tool designed to discover malware developed both by commercial firms, as well as popular spyware used by cybercriminals.
Read moreThe critical vulnerability in the Schannel technology in Windows that Microsoft patched is ripe for exploitation, experts say, and continues the long line of severe vulnerabilities in major SSL/TLS implementations in recent months.
The technology is in every supported version of Windows, and it can be exploited remotely by unauthenticated attackers. The company said that the vulnerability was found during a “proactive security audit”. That vulnerability enables an attacker to read the memory of systems protected by vulnerable versions of the software under certain circumstances.
Read moreResearchers have unearthed a new version of the Rovnix malware that has a couple of additional features, including a new domain generation algorithm and a secure transmission channel for communicating with the command-and-control servers.
Rovnix is a malware variant that often has been distributed by other kinds of malware. Last year Microsoft warned users about a campaign that involved the Upatre malware, which typically is delivered through spam messages. The newer version of Rovnix has some differences from the older variants. The Rovnix creators have made changes to help evade detection by various security products.
Read moreMicrosoft is aware of a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that contains an OLE object.
An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. The attack requires user interaction to succeed on Windows clients with a default configuration.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland