Tagged: Internet Security

Warning for Android based Cell Phone Users. Cybersecurity Experts have found a Fake Google Chrome Update which instals Malware

The Cybersecurity Researchers at Zscaler Inc have posted a new finding of a Fake Google Chrome Update which installs Malware. The only way to get rid of the Android Infostealer Malware is to reset the Android Phone to factory settings (thus wiping claen).

Click on this line to be taken to the Zscaler website to read their Blog post ttiled: Android infostealer posing as a fake Google Chrome update.
Their post was written by Viral Gandhi

Click on this line to visit the Zscaler YouTube channel

Click on this line to visit the Zscaler website.

Click on this link to view other CyberSecurity related posts found on Uniquely Toronto.

 

Posted by: Vincent Banial
http://www.uniquelytoronto.com

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.

Advertisement

New Apple OS X Ransomware discovered by “Unit 42” of Palo Alto Networks


A new Ransomware targeting Apple OS X based computers has been found and reported by Palo Alto Networks
. Their Unit 42 Security Group have named this new ransomware as “KeRanger”.

Two installers of the Transmission BitTorrent ailient installer for OS X were found by Palo Alto Networks to be infected with KeRanger Ransomware.

The following is a quote from the Palo Alto Networks Reseaarch Center blog:

Palo Alto Networks reported the ransomware issue to the Transmission Project and to Apple on March 4. Apple has since revoked the abused certificate and updated XProtect antivirus signature, and Transmission Project has removed the malicious installers from its website.

The Transmissionbt.com home page features the following security notice:

Read Immediately!!!!

Everyone running 2.90 on OS X should immediately upgrade to and run 2.92, as they may have downloaded a malware-infected file. This new version will make sure that the “OSX.KeRanger.A” ransomware (more information available here) is correctly removed from your computer.

Users of 2.91 should also immediately upgrade to and run 2.92. Even though 2.91 was never infected, it did not automatically remove the malware-infected file.

Click on this line to visit the Palo Alto Networks Unit 42 webpage. There you will compete details about KeRanger. Scroll down to the section titled: How To Protect Yourself.

Click on this line to visit the MacRumors website to read their post titled: “First Mac Ransomware Found in Transmission BitTorrent Client”.

Click on this line to visit the 9to5Mac website to read their post titled “First OS X ransomware detected in the wild, will maliciously encrypt hard drives on infected Macs (updated: how to fix)

Click on this ine to visit the arstechnica website to read their post titled: “First Mac-targeting ransomware hits Transmission users, researchers say Rogue copy of BitTorrent client results in KeRanger install, which demands 1 bitcoin.”

Click on this line to visit the Reuters website to read their post titled: “Apple users targeted in first known Mac ransomware campaign“.

Click on this link to view other CyberSecurity related posts found on Uniquely Toronto.

 

Posted by: Vincent Banial
www.uniquelytoronto.com

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice. Any offers mentioned in this post are also subject to change without notice.

Next Suits and Spooks event to be held in London England on May 06 and 07 2015


Suits and Spooks Events are a bit like TED Talks, but focused on Cyber Security issues. From the Suites and Spooks webpage: “Each event draws thought leaders and decision makers from the public, private, defense, law enforcement and intelligence sectors who come to learn about and discuss some of the key security challenges which face our digitally connected nation and world

One unique aspect of the presentations made at Suits and Spooks is that after the first 10 minutes, the Audience can join in by asking questions or directly challenging the presenter. Audience participation resulting in Debate and Discussion is the cornerstone of these events.


The next Suits and Spooks Event will be held in London England on May 6th and 7th 2015.


Click on this line to view their prior events which were held in 2014 and to check out the agenda of presentations made.


Click on this line to visit the Registration page for the upcoming 2015 London Suites and Spooks Event.

Click on this link to view other CyberSecurity related posts found on Uniquely Toronto.

 

Posted by: Vincent Banial for Uniquely Toronto
http://www.uniquelytoronto.com

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice. Any offers mentioned in this post are also subject to change without notice.

WireLurker Malware targeting Apple IOS and OSX products


If you use an Apple IOS or OSX device (phone, tablet, notebook and desktop) you might want to check out my post about WireLurker.

Apple users sometimes are smug about not needing any security software. Yes, Apple products have been highly secure.

As the number of Apple products being purchased keeps growing, Apple products are also becoming targets for those who create Viruses and Malware and other interesting code.

Back in 2012 “Flashback” victimized about 700,000 Macs. WireLurker and future variants of it could have the potential to do the same.

Staying informed can help keep you and your Apple IOS and OSX gear from falling victim to such attacks.

 

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.