It’s almost impossible to read the news these days without seeing yet another articleon the rising threat of Android malware. But at the same time, a new report from AV-Comparatives has been making the rounds for its finding that most Android antivirus apps are terrible scams. So what’s a security-conscious user to do?
You don’t need an elaborate crime ring (or a government agency) to write malware that spies on others — sometimes, just one person can be responsible. The US Department of Justice has charged Ohio resident Philip Durachinsky with 16 crimes for allegedly writing malware, nicknamed “Fruitfly,” that gave him unfettered access to the PCs of “thousands” of individuals and institutions between 2003 and January 2017. Reportedly, he not only stole sensitive data to use for fraud and blackmail (such as logins, embarrassing chats and medical records) but took screenshots, logged keystrokes and spied on people through their webcams.
On Monday, reports emerged that the head of the Ukrainian Cyber Police is seeking criminal charges against the Ukrainian tax software company that was the first victim of the crippling NotPetya malware attack. Now, it has come to light that the firm’s servers have been seized by authorities.
Disaster has struck—an unwanted piece of malware took root on your computer. So what’s your next step? While the potential damage viruses can cause shouldn’t be underestimated, you might be able to get your computer back on its feet without too much difficulty, thanks to an array of helpful tools at your disposal.
It’s been a rough week in Mac security. First, Checkpoint warned users of a Trojan spreading in Europe that was the first of its kind. And now, one of the most prominent video transcoding apps for Mac has a malware problem.
A FEW HOURS after dark one evening earlier this month, a small quadcopter drone lifted off from the parking lot of Ben-Gurion University in Beersheba, Israel. It soon trained its built-in camera on its target, a desktop computer’s tiny blinking light inside a third-floor office nearby. The pinpoint flickers, emitting from the LED hard drive indicator that lights up intermittently on practically every modern Windows machine, would hardly arouse the suspicions of anyone working in the office after hours. But in fact, that LED was silently winking out an optical stream of the computer’s secrets to the camera floating outside.
The developers of Transmission can’t catch a break. Just months after their BitTorrent app was linked to the first known instance of Mac ransomware, security researchers at ESET have pinpointed another form of malware taking advantage of Transmission to infect Mac users. Keydnap, as it’s called, takes advantage of a modified version of Transmission (planted on the developer’s site without its knowledge) to attack your computer. It’s similar to the ransomware’s approach in more ways than just its choice of host app — it even uses a signing key to trick Apple’s Gatekeeper safeguard into letting it through.