Month: March 2019

0 Comments
Cyberblackmail/sextortion again raises its not-so-pretty little head Vox Emptoris: “Voice of the Customer” For more than 30 years, I’ve had the privilege of assisting people get rid of viruses and other malicious software.  In the course of doing so, I’ve often been asked questions about computer security-related topics that are not product-specific.  Some are simple or
0 Comments
Even by the standards of the often, ah, “wide-ranging” conversations on the Original Content podcast, this latest episode covers a lot of ground. The initial focus is “Triple Frontier,” a film directed by J.C. Chandor and starring Ben Affleck, Oscar Isaac, Pedro Pascal, Charlie Hunnam and Garrett Hedlund as friends who served in the special
0 Comments
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting is that there are no silver bullets for any parenting issues. Whether it’s toilet training or driver training, it takes time and often a combination of strategies. Teaching your kids about online safety is no
0 Comments
The Federal Emergency Management Agency, or FEMA, is in hot water following a government report that found the agency improperly shared the personal data of millions of disaster victims. The Department of Homeland Security’s Office of Inspector General (OIG) found the FEMA data exposure affected 2.3 million disaster survivors that registered for the agency’s Transitional
0 Comments
Despite bipartisan concerns over privacy, most airlines reportedly support the use of facial recognition, and the US Customs and Border Patrol (CBP) has implemented facial recognition in 17 international airports, including Atlanta, New York City, Boston, San Jose, Chicago, and two airports in Houston, according to American Military News.  Largely controversial because of privacy concerns,
0 Comments
The electric automaker is working to release a fix for the underlying vulnerability in a matter of days A duo of white-hat hackers have earned themselves a brand new Tesla Model 3 after exposing a vulnerability in the car’s integrated browser. Richard Zhu and Amat Cam, aka team ‘Fluoroacetate’, managed to break into the electric
0 Comments
The Game Developers Conference was held last week in San Francisco and we wanted to get together to discuss what we saw at the show for Extra Crunch members. VR, gaming engines, Unity, Unreal and Epic were just some of the topics we touched upon. But perhaps the biggest of all was Google’s new game-streaming
0 Comments
A WordPress zero-day in the Easy WP SMTP plugin is actively being exploited in the wild, according to NinTechNet. The plug-in allows site owners using WordPress to both configure and send outgoing emails through an SMTP server, preventing messages from landing in the recipient’s junk folder. By exploiting what is categorized as a critical vulnerability, hackers reportedly
0 Comments
ESET researchers detail the latest tricks and techniques OceanLotus uses to deliver its backdoor while staying under the radar This article will first describe how the OceanLotus group (also known as APT32 and APT-C-00) recently used one of the publicly available exploits for CVE-2017-11882, a memory corruption vulnerability present in Microsoft Office software, and how
0 Comments
Brace yourself guys. Microsoft is going to release its Windows Defender ATP antivirus software for Mac computers. Sounds crazy, right? But it’s true. Microsoft Thursday announced that the company is bringing its anti-malware software to Apple’s macOS operating system as well—and to more platforms soon, like Linux. As a result, the technology giant renamed its
0 Comments
After analyzing several previously unknown malicious files that were detected earlier this month, Kaspersky Lab determined the files were a new version of a data stealer known as the AZORult Trojan. Because the files are written in C++, and not Delphi, researchers have dubbed the variant AZORult++. According to researchers, this latest version is potentially
0 Comments
More advice for detecting and avoiding sextortion scams Vox Emptoris: “Voice of the Customer” In my previous post, we examined a particular example of a sextortion scam, showing several indications that it was not a threat to be taken seriously.  But that kind of analysis – point-by-point deconstruction – is relatively hard work, and perhaps not
0 Comments
The U.S. Department of Homeland Security Thursday issued an advisory warning people of severe vulnerabilities in over a dozen heart defibrillators that could allow attackers to fully hijack them remotely, potentially putting lives of millions of patients at risk. Cardioverter Defibrillator is a small surgically implanted device (in patients’ chests) that gives a patient’s heart