Posts

Showing posts from September, 2015

#‎Apple‬ Removed 300 ‪#‎Infected‬ ‪#‎Apps‬ from App Store

Image
APPLE HAS NOW removed over 300 pieces of software from the App Store, after malware that targeted developers managed to create infected iOS apps. On top of that, it looks like the apps are more dangerous to Apple customers than previously thought. Several security companies have now banded together in the search for malicious iOS apps: Claud Xiao from PaloAlto Networks has reportedly discovered 39, Fox-IT also found  a number of others, a representative told WIRED in an email. Many of those apps are popular in China, such as Railway 12306, used for purchasing train tickets, and a version of WeChat, a messaging app. Only the older version 6.2.5 is infected, whereas the app’s up-to-date version is clean. However, it appears that some affected apps are also used by Apple customers in the United States. ‘CamCard’, an app for scanning and storing business cards, and which was a ‘Top Paid App’ in 2014, is also infected, according to Palo Alto Networks. Originally, the malware was

Hard Drive

Image
Hard disks use a circular hard platters to store data on. They are in pristine condition with a mirror like finish to them. These platters are locked away inside a steel casing as unclean air can easily ruin a hard disk. This is why you should never remove the casing from the hard disk, it is very unlikely you will be able to put it back together as a working component. A file system is the way in which your computer stores data on the hard disk. The most common fi le systems are FAT16 for older computers, FAT32 and NTFS. FAT stands for File Allocation Table. NTFS stands for NT File System. Both have advantages and disadvantages. FAT16 was a very limited file system in the way that it would store data very in-efficiently, every file would take up a minimum of 32Kb in space as this was the minimum cluster size in a FAT16 system. Also it was only capable of using hard disks upto 2Gb in size. FAT32 solved this problem by reducing the cluster size to 4kb which saved a lot of wasted

8 ways to fend off ‪#‎spyware‬, ‪#‎malware‬ and ‪#‎ransomware‬.

Image
Spyware, malware, phishing and, more recently, ransomware -- the list of online threats can be confusing and daunting. Knowing what you’re up against is half the battle. Each of these types of attacks have specific characteristics: Spyware – software that collects information about you or your computer without your knowledge. resume makeover executive IT Resume Makeover: How to add flavor to a bland resume Don't count on your 'plain vanilla' resume to get you noticed - your resume needs a personal flavor to READ NOW Malware – a broad category of software (including viruses, worms, Trojan horses, etc.) that damages your computer, in either a minor or major way. Phishing – an attempt to get your personal information (usernames, passwords, credit card numbers and), usually for nefarious reasons. Usually accomplished by electronic communication (e.g., email), but also by "social engineering" (tricking people into abandoning standard security protocol). Ran

Plug & Play PC

#Hackers are still attacking unpatched #computers through #Microsoft Word

Image
There's been a wave of malware attacks using a known security flaw in Microsoft Word. Thankfully, there's a fix available. So why are so many users getting infected? First let's look at the attack,these Word-based attacks come via email. They've got a .doc Word file attached, and filenames like "Anti-Money Laundering & Suspicious cases.doc." They're actually .rtf, or Rich Text Format, files, with a hidden   bug. That bug contains the malware that will install if you open one of these email attachments. For this particular attack, there were two types of malware you could infect your computer with. "Toshliph" allows hackers to keep putting different malware on your computer, and "UWarrior" lets an attacker control your computer.

#Malware #porn app would secretly take pictures of you and demand #ransom

Image
Security researchers are waving the red flag about a malicious 'ransomware' porn app called Adult Player that is plaguing Android phones of careless, lustful users. American security company Zscaler found that the app would secretly take pictures of the user with the front-facing camera and then use those pictures to blackmail them and ask for a $500 ransom be paid via PayPal. Before putting the blame on Android first, though, do keep in mind that Adult Player is not available on Google's official Play Store - you have to actually download an APK file and sideload it, deliberately telling the system to switch off all defenses in order for this ransomware to work. Still, it's worth mentioning this latest malware to warn users that it is never a good idea to download untrusted and unknown apps from sources you know nothing about. And the fact that this is a pornographic app should only make you even more careful about having to deal with a virus on your phone.

iBall 150 ‪#‎Wireless‬-N ADSL2+ & Broadband ‪#‎Router‬

Image