Showing all posts tagged #malware:


MacWorld: Zoom Mac app flaw sparks serious security concerns

Posted on July 9th, 2019

Do not adjust your screen. The logo above is displayed upside down as a comment on Zoom. Zoom Video Communications (NASDAQ ZM) is a provider of video conferencing and IP phone services. Zoom Meeting Client apps have found their way onto Macs and ...

QTIP: What's a Never-Ever?

Posted on February 5th, 2019

A "Never-Ever" is something no one should ever do. "Never Evers" are those sometimes unwritten rules about things that matter most to us; love, family, work, and computing. Topping my list of computing "Never-Evers" is this: never, ever fall for...

QTIP: Beware of Fake PDF apps

Posted on January 9th, 2019

Watch out for phony PDF reader apps. Even mainstay free Adobe Reader can be compromised by cybercriminals and posted to sketchy software download sites visited by the unwary. Myriad off-brand free PDF reader apps are often malicious schemes to ...

NYTIMES: F.B.I.’s Urgent Request: Reboot Your Router to Stop Russia-Linked Malware

Posted on May 28th, 2018

An analysis by Cisco’s threat intelligence division found that hundreds of thousands of routers, from a range of manufacturers, were infected by the malware linked to the hacking group Fancy Bear. Credit Ozier Muhammad/The New York Times By Louis ...

NYTIMES: You Don’t Want the Malware Prize

Posted on April 23rd, 2018

Devious code is sending people to fraudulent quiz and contest pages, so ignore that "lucky winner" notice and run a security scan. Pop-ups claiming to offer prizes to Amazon customers are part of a surge in malicious advertising. Credit The New Y...

WIRED: Look Out! Chrome Extension Malware Has Evolved

Posted on January 31st, 2018

Google has cracked down on Chrome extension malware—but the bad guys are finding ways to stay ahead of their defenses. HOTLITTLEPOTATO Lily Hay Newman, January 30, 2018 You already know to be wary of third-party Android apps, and even to watch yo...

NYTIMES: Keeping Up With the Meltdown and Spectre Bugs

Posted on January 15th, 2018

By J. D. Biersdorfer Jan. 15, 2018 Q. Is it safe to install the Windows patch for these new Spectre and Meltdown bugs? Do they affect Linux? (And who names these security flaws, anyway?) A. Meltdown and Spectre, the two recently announced securit...

iMORE: What MacKeeper is and why you should remove it from your Mac

Posted on January 14th, 2018

By Mike Matthews, iMore 14 Jan 2018 It happened again last week. A friend was telling me she had convinced her mother to get a Mac laptop. "But what is this MacSweeper?" she said, with a hint of puzzlement in her voice. She meant, of course, MacK...

Lifehacker: The Complete Guide to Avoiding Online Scams (for Your Less Savvy Friends and Relatives)

Posted on November 8th, 2017

Our readers are a savvy bunch who aren't likely to be taken in by an online scam—but we've all got those friends and relatives we worry about. Here's our definitive guide to helping them stay safe online. Photo from Futurama. When training your lo...

Lifehacker: How Spammers Spoof Your Email Address (and How to Protect Yourself)

Posted on November 8th, 2017

Most of us know spam when we see it, but seeing a strange email from a friend—or worse, from ourselves—in our inbox is pretty disconcerting. If you've seen an email that looks like it's from a friend, it doesn't mean they've been hacked. Spammers ...

MACWORLD: APT28 - A complex Mac virus that may signal the shape of tomorrow’s malware

Posted on October 17th, 2017

From MacWorld, by Liviu Arsene Oct 17, 2017 This malware’s striking characteristic: its ability to drop a payload individually designed for Windows, Linux, and Mac OS running devices. Macs are the go-to device for professionals and high-level of...

KREBS: Equifax Credit Assistance Site Served Spyware

Posted on October 12th, 2017

Big-three consumer credit bureau Equifax says it has removed third-party code from its credit report assistance Web site that prompted visitors to download spyware disguised as an update for Adobe’s Flash Player software.Image: Randy-abrams.blogsp...

NYTIMES: How Israel Caught Russian Hackers Scouring the World for U.S. Secrets

Posted on October 11th, 2017

Kaspersky Lab’s products require access to everything stored on a computer in order to scour it for viruses or other dangers. Credit Sergei Ilnitsky/European Pressphoto Agency It was a case of spies watching spies watching spi...

QTIP: Don’t click START DOWNLOAD

Posted on October 6th, 2017

There is no end to the free PDF readers, media players, and nifty widgets available for instant download that claim to do what your computer can already do, but do it cooler. Really? The big, green, inviting button beckons even alert users to sus...

TechCrunch: CCleaner supply chain malware targeted tech giants

Posted on September 21st, 2017

September 21, 2017 TechCrunch by Natasha Lomas Malware that piggybacked on CCleaner, a popular free software tool for optimizing system performance on PCs, appears to have specifically targeted high profile technology companies and may have been a...

BINSIDER: Best Buy cuts ties with Kaspersky Labs

Posted on September 10th, 2017

Home Latest Tech Insider Enterprise ...

HP Fraud Alert: Protect Yourself from Scams

Posted on July 12th, 2017

The alert below appears on HP’s various support and web store sites. Similar alerts also appear on websites of Apple, Microsoft, Google, Facebook, and others. HP’s alert can apply to calls from any strangers claiming to be security or technical ...

QTIP: What to do with updates clutter

Posted on May 2nd, 2017

What’s with those app update installer icons on your computer? Do you really want them? When we first download or update Chrome or Firefox browsers, Java, Skype, Adobe Reader, Adobe Flash Player and other apps their installers usually go to the ...

Apple: Identify and report phishing emails and other suspicious messages

Posted on April 19th, 2017

From Apple Support posted April 19, 2017 Use these tips to avoid phishing scams and learn what to do if you think your Apple ID has been compromised. Scammers use phishing and other types of social engineering to try to trick you into sharing pe...

Microsoft: Tech support scams persist with increasingly crafty techniques

Posted on April 3rd, 2017

Microsoft Malware Protection Center Blog posted April 3, 2017 Millions of users continue to encounter technical support scams. Data from Windows Defender SmartScreen (which is used by both Microsoft Edge and Internet Explorer to b...

Microsoft: Phishers unleash simple but effective social engineering techniques using PDF attachments

Posted on January 26th, 2017

From Microsoft | TechNet Microsoft Malware Protection Blog posted January 26, 2017 The Gmail phishing attack is reportedly so effective that it tricks even technical users, but it may be just the tip of the iceberg. We’re seeing similarly simple ...

WSJ: Macs and Malware: What You Can Do to Stay Safe

Posted on March 10th, 2016

March 9, 2016 The Wall Street Journal The Security & Privacy system preferences pane in the Mac’s OS X allows you to set safeguards for downloaded apps. It’s a bit of a nightmare. Over the past weekend, a Mac app called Transmission was infecte...

TechCrunch: Apple shuts down ransomware

Posted on March 7th, 2016

by Sarah Perez on TechCrunch.com March 7, 2016 Apple has shut down what appears to have been the first, fully-functional ransomware targeting Mac computers. This particular form of cyber threat involves malware that encrypts the data on your pe...

Forbes: As Ransomware Crisis Explodes, Hollywood Hospital Coughs Up $17,000 In Bitcoin

Posted on February 18th, 2016

Thomas Fox-Brewster is a staff writer at Forbes.com covering crime, privacy and security in digital and physical forms. Across the world, hackers are taking control of networks, locking away files and demanding sizeable ransoms to return data to ...

Forbes: Don’t Click On Strange Links: 6 Tips To Avoid Phishing Attacks

Posted on February 18th, 2016

Brad Moon is a contributor to Forbes.com Opinions expressed by Forbes Contributors are their own. It seems as though we can’t go a day without news of another big data breach. Already this year, we’ve had a reported data leak for 320,000 Time Wa...