The critical vulnerability in the Schannel technology in Windows that Microsoft patched is ripe for exploitation, experts say, and continues the long line of severe vulnerabilities in major SSL/TLS implementations in recent months.
The technology is in every supported version of Windows, and it can be exploited remotely by unauthenticated attackers. The company said that the vulnerability was found during a “proactive security audit”. That vulnerability enables an attacker to read the memory of systems protected by vulnerable versions of the software under certain circumstances.Read more
Researchers have unearthed a new version of the Rovnix malware that has a couple of additional features, including a new domain generation algorithm and a secure transmission channel for communicating with the command-and-control servers.
Rovnix is a malware variant that often has been distributed by other kinds of malware. Last year Microsoft warned users about a campaign that involved the Upatre malware, which typically is delivered through spam messages. The newer version of Rovnix has some differences from the older variants. The Rovnix creators have made changes to help evade detection by various security products.Read more
Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.
Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there's a good chance that if your system has been hacked, it will display one or more of the following behaviours.Read more
Microsoft is aware of a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that contains an OLE object.
An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. The attack requires user interaction to succeed on Windows clients with a default configuration.Read more
The reason why Microsoft has launched Windows Technical Preview is the collection of user feedback, in order to issue a new final Windows 10 version, which is planned to release in 2015.
Windows 10 beta version asks to register in Windows Insider Program and then a user must send the reviews about the new system at a specific time. But as it turned out they are not interested in your mind only. If you read the rules of Windows Insider Program attentively, we can see that Microsoft is interested not only in your point of view. With the help of Windows Technical Preview, Microsoft collects information about...Read more
Viber, a mobile messenger app that allows users to make phone calls and send text messages and images for free, also gives up plenty of free user data to anyone who wants to listen.
According to researchers from the University of New Haven (UNH) in Connecticut, US, Viber's app sends user messages in unencrypted form - including photos, videos, doodles, and location images.
All of that rich data from users is also stored unencrypted on Viber's servers, rather than being deleted immediately, and is accessible without credentials, just a link, the UNH researchers said.Read more
Now your TV could be infected by computer viruses. Technology security expert warns cyber criminals could infect millions of devices. Televisions could soon be infected by computer viruses, one of the world's top technology security experts has warned.
Eugene Kaspersky is co-founder and chief executive of Russia’s Kaspersky Lab, the world’s fourth largest computer antivirus company. He said threats will spread to the 'home environment' and televisions as internet connections make technology more vulnerable.Televisions could soon be infected by computer viruses, one of the world's top technology security experts has warned In an interview with The Telegraph he said his company's headquarters in Moscow receives 315,000 suspicious activity reports every day.Read more
The first round of results are in, and so far TrueCrypt, the popular open-source encryption program, has a relatively clean bill of health. Security firm iSec Partners recently carried out the first phase of the TrueCrypt audit on behalf of the Open Crypto Audit Project (OCAP).
OCAP is the official name for the group behind istruecryptauditedyet.com, a project inspired by the revelations about the National Security Agency’s surveillance activities. OCAP was created by Matthew Green, a cryptographer and research professor at Johns Hopkins University, and Kenneth White, Principal Scientist at Social & Scientific Systems. For its report, which was released on Monday, iSec took a look at TrueCrypt’s latest Windows edition (version 7.1a).Read more
Isn't it possible to talk to Windows' owners and ask them to develop WinPhone further?
But... We did not call them. Windows Phone is their product. They decide - whether to make it better or to kill it.
As they chose "to kill" - we stopped upgrading/supporting/thinking about/... WinPhone app too.
Life is beautiful but volatile.
WinPhone interface design is totally different from other platforms. SafeUM secure messenger has been developed taking into account this operating system requirements and its Metro design.
Our convenient user menu is superimposed over the multi-touch technology which makes the application so quick it simply slides under your fingers.
SafeUM bright original design looks special in WinPhone turning the Love Tiles in bright, contrasting labels. This operating system is considered to be the golden mean between iOS and Android. We used that when creating the menu logic and interface usability.Read more
The German government has recommended that Federal Administration and other high profile public sector departments in the country do not use Windows 8 because, it warns, it contains security backdoors that cannot be controlled or trusted, and that may be easily accessible by the NSA.
The warnings are present in leaked documents obtained by German daily newspaper Zeit.de:
"Due to the loss of full sovereignty over the information technology, the security objectives of ‘confidentiality' and ‘integrity' can no longer be guaranteed. "This can have significant consequences on the IT security of the Federal Administration," the documents say.Read more