Readers like you help support my blog. When you make a purchase using links on our site, we may earn an affiliate commission! Thank you!

Saturday, April 25, 2015

Security Flaw in Samsung Galaxy S5 Allows Hackers to Steal Your Fingerprint

Security Flaw in Samsung Galaxy S5 Allows Hackers to Steal Your Fingerprint 



Security flaw in Android
version 5.0 and below makes it possible for hackers to take fingerprint
copies and unlock Samsung Galaxy S5. This could lead to obtaining and
exploitation of victim’s personal data.



FireEye experts Yulong Zhang and Tao Wei have exposed a critical Android flaw, which makes Samsung Galaxy S5 smartphone highly vulnerable to attacks.


Experts revealed that hackers can easily obtain fingerprint data and steal personal info, thanks to the flaw and use personal data for malicious purposes.

GoodDeals Advertisements Removal Guide

GoodDeals Advertisements Removal Guide 



GoodDeals is an adware program that displays deals,
offers, or coupons when browsing certain online shopping sites. When
browsing sites such as BestBuy or Target, the GoodDeals adware will
display a rectangular banner at the bottom of the web page that provides
offers or deals based on the particular site you are visiting.
Unfortunately, these advertisements are done so in an intrusive manner
that overlay the content you are trying to read.

Hackers can potentially hack WIFI systems on aircrafts to commandeer the plane | Emsisoft Blog

Hackers can potentially hack WIFI systems on aircrafts to commandeer the plane | Emsisoft Blog 



Flying thousands of feet in the air can be a scary event for most
people; but, now it seems that airway travel may be more dangerous than
it has ever been. Potential flaws have been discovered in several new
model airplanes that could allow hackers to commandeer the plane by
hacking into a single WIFI system using their laptop computer. It is a
scary thought to think that a hacker may be sitting next to you on a
plane.




According to news Giant CNN,
hundreds of the planes flying commercially today could potentially be
vulnerable to having their on-board computers hacked and taken over by a
plane passenger or even someone on the ground. One of the authors of
the report told CNN that the Boeing 787 Dreamliner, the Airbus A350, and
the A380 aircraft’s all have cockpits that are wired into the same WIFI
system that passengers use.

Ransomware: Should you pay the cybercriminals?

Ransomware: Should you pay the cybercriminals? 



Ransomware is a type of malware, or malicious software, which has exploded in notoriety in recent years.
The malware is often installed on your machine
via a phishing email or a drive-by-download on a compromised website,
and a short time later a pop-up message will appear on screen telling
the user to pay a ransom (in some cases as much as $300) in order to ‘unlock’ their stolen documents.

EasySync Solutions

EasySync Solutions 

Only EasySync Solutions Directly Combats Ransomware Criminals are taking notice at the amount of money to be made by Ransomware, so whether you have been infected before or have never been infected, now is the time to get proper protection. The simple fact is, most of the time a Anti-Virus, Firewall, or even group policies is not enough to stop Ransomware like CryptoWall, TorrentLocker, and CryptoLocker. Without the proper software you may come home to find that all of your personal files have been encrypted and are being held hostage until a payment is made. Sometimes Ransomware can even delete your files if you do not pay, or may corrupt them making payment useless. With EasySync Solutions you will find software that will help you stay protected from every type of Ransomware. You will always have a plan A, B, and C if you do get infected. From prevention measures to recovery measures, you can be sure that if you are running our software and you find yourself being attacked by Ransomware, you will always have options.

Middle East Malware: Cyber Attack 8 (SEA)

Middle East Malware: Cyber Attack 8 (SEA): This is an interesting attack of the infamous Syrian Electronic Army ( SEA ). What is special about it is that it comes as a Windows link ...

Wednesday, April 15, 2015

MiddleEastMalware: CyberAttack 1

MiddleEastMalware: CyberAttack 1: Attack vector: Victims receive it as malicious links in emails. The email above translates as " A new leak for the Egyptian pres...

MiddleEastMalware: Cyber Attack 4

MiddleEastMalware: Cyber Attack 4: The attack of this post is from the same attack group as in Cyber Attack 1 and Cyber Attack 2 . The attack vector is a malicious emai...

Monday, April 13, 2015

Blaze's Security Blog: Remediate VBS malware

Blaze's Security Blog: Remediate VBS malware: I have developed a small tool that will aid you to remove VBS malware from a machine or in a network. I made this some months ago when I sa...

Tuesday, April 7, 2015

Windows Incident Response: Windows Event Logs

Windows Incident Response: Windows Event Logs: Dan recently tweeted: Most complete forensics-focused Event Log write-ups? # DFIR I have no idea what that means.  I'm going to assu...

Monday, April 6, 2015

Thursday, April 2, 2015

A Few Thoughts on Cryptographic Engineering: Truecrypt report

A Few Thoughts on Cryptographic Engineering: Truecrypt report: A few weeks back I wrote an update on the Truecrypt audit  promising that we'd have some concrete results to show you soon. Thanks to so...

Wednesday, April 1, 2015

Dynamoo's Blog: Malware spam: "Australian Taxation Office - Refund...

Dynamoo's Blog: Malware spam: "Australian Taxation Office - Refund...: This fake tax notification spam leads to malware hosted on Cubby. From :    Australian Taxation Office [noreply@ato.gov.au] Date :    ...

Monday, March 30, 2015

Dynamoo's Blog: Malware spam: "Invoice ID:12ab34" / "123"

Dynamoo's Blog: Malware spam: "Invoice ID:12ab34" / "123": This terse spam has a malicious attachment: From:    Gerry Carpenter Date:    25 March 2015 at 12:58 Subject:    Invoice ID:34bf33 1...