Jump to content

tglogo.png

err0r

Member Since 25 Feb 2004
Offline Last Active Yesterday, 06:54 PM
*****

#81968 You Should Update Adobe Flash Right Now

Posted by err0r on 08 April 2016 - 03:46 PM

Adobe issued a security update April 7 that addresses what the software maker calls “critical vulnerabilities” in its Flash Player that could allow intruders to take control of a victim’s computer.

The vulnerability affects Flash running on Windows, Mac, Linux, and Chrome OS operating systems. Trend Micro, one of the companies involved in spotting the issue, said that the vulnerability was found to be spreading what’s been called the “Locky ransomware.” Ransomware is a type of malware (malicious software) that essentially holds a victim’s computer hostage. The attacker typically blocks off access to the system until a sum of money is paid over the Internet.

Adobe is urging users to update their Flash Player as quickly as possible. To do this, right click on Flash content in your browser and select “About Adobe Flash Player” to see which version you’re running. You can also check this by navigating to Adobe’s version information page here. This will tell you if your computer is running an outdated version edition of Flash.

Adobe notes that the vulnerability has been actively exploited on devices running Windows 10 and earlier with Flash Player version 20.0.0.306 and earlier.

Researchers from Trend Micro’s Zero Day Initiative, Google’s Project Zero, Microsoft’s security team, FireEye, and others are credited with discovering the problem. Adobe hasn’t said how many users have been affected by the ransomware.

Read full article @ http://time.com/4286...ecurity-update/
  • 3


#81747 Why Windows 10 is the most secure Windows ever

Posted by err0r on 19 September 2015 - 04:47 AM

Microsoft added two game-changing security features for enterprise users in Windows 10, but until recently, the company has been relatively quiet about them.

So far the buzz has mainly been about Windows Hello, which supports face and fingerprint recognition. But Device Guard and Credential Guard are the two standout security features of Windows 10—they protect the core kernel from malware and prevent attackers from remotely taking control of the machine. Device Guard and Credential Guard are intended for business systems and are available only in Windows 10 Enterprise and Windows 10 Education.

“Clearly, Microsoft thought a lot about the kind of attacks taking place against enterprise customers and is moving security forward by leaps and bounds,” said Ian Trump, a security lead at LogicNow.

Device Guard relies on Windows 10’s virtualization-based security to allow only trusted applications to run on devices. Credential Guard protects corporate identities by isolating them in a hardware-based virtual environment. Microsoft isolates critical Windows services in the virtual machine to block attackers from tampering with the kernel and other sensitive processes. The new features rely on the same hypervisor technology already used by Hyper-V.

Using hardware-based virtualization to extend whitelisting and protecting credentials was a “brilliant move” by Microsoft, said Chester Wisniewski, senior security strategist for Sophos Canada, an antivirus company.

Microsoft published technical guides for Device Guard and Credential Guard on TechNet last week.

Read full article @ http://www.pcworld.c...ndows-ever.html
  • 1


#81442 Ransomware authors streamline attacks, infections rise

Posted by err0r on 10 February 2015 - 11:52 PM

Ransomware authors continue improving file-encrypting programs and infection methods for Windows and Android, making these nightmarish attacks harder to avoid.

The biggest ransomware threat for Windows users is CryptoWall, a sophisticated malware program that encrypts a wide range of files and demands that victims pay a ransom in Bitcoin cryptocurrency to recover them.

CryptoWall uses uncrackable encryption algorithms and hides its control servers on the Tor and I2P anonymity networks, making it harder for security researchers and law enforcement to shut them down.
[ Insider Exclusive: How an acute shortage of cyber talent gave rise to 'spooks as a service' ]

CryptoWall 3.0, the malicious program’s latest version, was launched in January after a two-month break by its creators. One notable change: it no longer bundles local privilege escalation exploits, according to Cisco Systems.

Privilege escalation exploits allow attackers to execute malware programs with administrator or system-level privileges instead of using the victim’s local user account, which might be restricted. CryptoWall needs this level of access to disable security features on the compromised systems, so the lack of privilege escalation exploits in its installer—or dropper—might be surprising at first.

In fact, this suggests that the CryptoWall authors plan to rely more on Web-based drive-by download attacks to infect systems, Cisco researchers said Monday in a blog post that includes a technical analysis of the new version.

Drive-by download attacks are launched from compromised websites or through malicious ads and usually exploit vulnerabilities in browser plug-ins like Flash Player, Java, Adobe Reader or Silverlight. The tools used for such attacks are known as exploit kits and they already have the functionality to achieve privilege escalation, according to the researchers.

Exploit kits can affect many users and can be hard to defend against, as highlighted by the recent malvertising attacks that exploited zero-day—previously unknown—vulnerabilities in Flash Player. They likely have a much higher success rate than other methods of malware distribution such as malicious email attachments.

That doesn’t mean that ransomware pushers have abandoned email-based infection methods. Researchers from antivirus firm F-Secure reported Monday that they’ve observed a significant increase this month in infections with another file-encrypting ransomware program called CTB-Locker.

CTB-Locker is most commonly spread through emails with a malicious zip file attachment. The rogue zip file contains another zip file which houses a .scr or .cab executable file, the F-Secure researchers said in a blog post. Running any of those executable files will result in a CTB-Locker infection.

Like CryptoWall, CTB uses strong cryptography that makes it impossible for victims to recover their files without paying the ransom, if they don’t have unaffected backups. The CTB ransom is 3 Bitcoins, or around US$650, higher than the $500 ransom asked by the CryptoWall gang.

Android users are not immune to such threats either. After producing the first file-encrypting ransomware program for Android, the creators of Simplocker became the laughingstock of the anti-malware industry when it was discovered that they used the same hardcoded encryption key on all infected devices, making it easy to recover the affected files.

But they’re now back, researchers from antivirus firm Avast Software warn. And they’ve unfortunately corrected their error, with a new, more sophisticated variant of Simplocker that infected more than 5,000 unique users within days of being discovered.

“The reason why this variant is more dangerous than its predecessor is that it generates unique keys for each infected device, making it harder to decrypt infected devices,” Avast researcher Nikolaos Chrysaidos said in a blog post Tuesday.

Simplocker is distributed through rogue ads on shady websites that tell users they need Flash Player to watch videos. The Flash Player app served by those ads is actually Simplocker.

By default, Android blocks the installation of apps that are not downloaded from Google Play. However, attackers often use social engineering to convince users to disable this protection and allow the installation of apps from unknown sources.

Once Simplocker is installed, it will display a fake message that claims to be from the FBI and alerts victims that illegal pornographic material was detected on their devices. The message demands that victims to pay $200 to have their phones unlocked.

Security researchers advise against paying such ransoms to cybercriminals, because there’s no guarantee of getting the decryption key and because it encourages them to continue their scheme. However, there are many publicly reported cases of users, companies and even government organizations who gave in to the extortion and paid to recover their critical files.

Because of this, it’s important to establish a backup routine. Files should be backed up to drives or network shares that are only temporarily connected to the computer or that require a username and password to be accessed. That’s because ransomware programs will also encrypt files from folders accessible over the network if they can write to them.
 
  • 2


#80788 Helpdesk

Posted by err0r on 14 May 2013 - 03:46 AM

This should work

on *:VOICE:#Helpdesk: { set -c %helpedby. $+ $vnick $nick } 
on *:DEVOICE:#Helpdesk: { $iif(%helpedby. [ $+ [ $vnick ] ], msg $chan Thanks for visiting HelpDesk. I hope that the GUIDE ( %helpedby. [ $+ [ $vnick ] ] ) was able to help you) | unset %helpedby. [ $+ [ $vnick ] ] } 

  • 1


#77673 New Server Up & Running

Posted by err0r on 13 October 2010 - 09:29 AM

sorry to tell you this but you have an err0r on your server!
  • 1