Ads

Featured Posts

[Travel][feat1]

Ads

Library

June 24, 2018




A library is a collection of sources of information and similar resources, made accessible to a defined community for reference or borrowing. 






Library Library Reviewed by Unknown on June 24, 2018 Rating: 5

UNIVRRSITY

June 24, 2018

university (Latin: universitas, "a whole") is an institution of higher (or tertiary) education and research which awards academic degrees








UNIVRRSITY UNIVRRSITY Reviewed by Unknown on June 24, 2018 Rating: 5

SCHOOL

June 24, 2018




A school is an institution designed to provide learning spaces and learning environments for the teaching of students (or "pupils") under the direction of teachers.




SCHOOL SCHOOL Reviewed by Unknown on June 24, 2018 Rating: 5

EDUCATION

June 24, 2018

Education is the process of facilitating learning, or the acquisition of knowledge, skills, values, beliefs, and habits. Educational methods include storytelling, discussion, teaching, training, and directed research.





EDUCATION EDUCATION Reviewed by Unknown on June 24, 2018 Rating: 5

windows 10 'S Mode' Coming Soon — For Security and Performance

March 10, 2018
Microsoft has confirmed that the company is planning to convert Windows 10 S from a dedicated operating system to a special "S Mode" that will be available in all versions of Windows.

Windows 10 S, a new operating system designed for simplicity, security, and speed, was released by Microsoft last year. It locks a computer down to run applications only downloaded from official Windows Store, but the slimmed-down and restricted flavor of Windows did not exactly turn out to be a success.

Therefore, the company has now decided Windows 10 S be offered as an optional mode rather than a dedicated operating system.

Windows 10 S was developed to simplify administration for school or business sysadmins that want the 'low-hassle' guaranteed performance version. It has been designed to deliver predictable performance and quality through Microsoft-verified apps via the Microsoft Store.

However, in a blog post published Wednesday, the corporate VP of Microsoft's operating systems group, Joe Belfiore admitted that the naming for Windows 10 S "was a bit confusing for both customers and partners."

Microsoft, therefore, decided that the original version of Windows 10 S would disappear and become an S Mode in Windows.

"Starting with the next update to Windows 10, coming soon, customers can choose to buy a new Windows 10 Home or Windows 10 Pro PC with S mode enabled, and commercial customers will be able to deploy Windows 10 Enterprise with S mode enabled," Belfiore said.

"We expect the majority of customers to enjoy the benefits of Windows 10 in S mode," he added.

Previous rumors also suggested that Windows 10 Pro customers with S Mode enabled on their devices would have to pay $49 to disable the mode to get access to a full version of Windows 10 Pro, but these rumors were inaccurate.

No user, be it a Windows 10 Home, Enterprise, and Pro customer, has to pay anything to disable the S Mode, as Belfiore wrote that "if a customer does want to switch out of S mode, they will be able to do so at no charge, regardless of edition."

"We hope this new approach will simplify and make it possible for more customers to start using Windows in S mode: a familiar, productive Windows experience that is streamlined for security and performance across all our editions," Belfiore said.

S Mode is expected to with the next major Windows 10 update, thought to be called the Spring Creators Update, likely to arrive next month, and it is now up to PC makers to choose whether to enable the new
windows 10 'S Mode' Coming Soon — For Security and Performance windows 10 'S Mode' Coming Soon — For Security and Performance Reviewed by Unknown on March 10, 2018 Rating: 5

New Cryptocurrency Mining Malware Infected Over 500,000 PCs in Just Few Hours

March 10, 2018


The research team found that all these instances, rapidly spreading across Russia, Turkey, and Ukraine, were carrying a digital coin-mining payload, which masqueraded as a legitimate Windows binary to evade detection.

However, Microsoft has not mentioned how these instances were delivered to such a massive audience at the first place in this short period.

Dofoil uses a customized mining application that can mine different cryptocurrencies, but in this campaign, the malware was programmed to mine Electroneum coins only.
Malware

According to the researchers, Dofoil trojan uses an old code injection technique called 'process hollowing' that that involves spawning a new instance of a legitimate process with a malicious one so that the second code runs instead of the original, tricking process monitoring tools and antivirus into believing that the original process is running.

"The hollowed explorer.exe process then spins up a second malicious instance, which drops and runs a coin mining malware masquerading as a legitimate Windows binary, wuauclt.exe."

To stay persistence on an infected system for a long time to mine Electroneum coins using stolen computer resources, Dofoil trojan modifies the Windows registry.

"The hollowed explorer.exe process creates a copy of the original malware in the Roaming AppData folder and renames it to ditereah.exe," the researchers say. "It then creates a registry key or modifies an existing one to point to the newly created malware copy. In the sample we analyzed, the malware modified the OneDrive Run key."

Dofoil also connects to a remote command and control (C&C) server hosted on decentralized Namecoin network infrastructure and listens for new commands, including the installation of additional malware.

Microsoft says behavior monitoring and Artificial intelligence based machine learning techniques used by Windows Defender Antivirus have played an important role to detect and block this massive malware
New Cryptocurrency Mining Malware Infected Over 500,000 PCs in Just Few Hours New Cryptocurrency Mining Malware Infected Over 500,000 PCs in Just Few Hours Reviewed by Unknown on March 10, 2018 Rating: 5

Android apps for creating ransomware

August 25, 2017

Mobile ransomware can now be created automatically without the need to write code.

Having little to no coding experience is no longer a problem for wannabe mobile malware authors, thanks to Trojan Development Kits (TDKs). Criminals can now install an app that will allow them to quickly and easily create Android ransomware with their own devices. It should be noted that the use of TDKs is different from malware being created using the Android integrated development environment (AIDE),

I first noted the emergence of these TDKs earlier this year, with the most recent one spotted just several days ago.

The whole process of creating new variants has been automated by adopting a CASE (Computer-Aided Software Engineering) tool model or, to be more precise, a DAME (Device-Aided Malware Engineering) tool model.

On-device malware generation kit

Wannabe malware authors can start using TDKs by firstly downloading the free app. The apps are available from hacking forums and through advertisements on a social networking messaging service popular in China.

The app, which has an easy-to-use interface, is no different from any other Android app apart from the fact that it creates malware.

To generate the malware, all the user needs to do is choose what customization they want by filling out the on-screen form.

Options available for customizing include:

The message that is to be displayed on the locked screen of the infected deviceThe key to be used to unlock the infected deviceThe icon to be used by the malwareCustom mathematical operations to randomize the codeType of animation to be displayed on the infected device

Once all of the information has been filled in, the user hits the “create” button and, if they haven’t already done so, is asked to subscribe to the service. The app allows the user to start an online chat with the app’s developer where they can arrange a one-time payment. Once the user has subscribed, they can continue with the process, making as many ransomware variants as they desire.

After the payment has been made, the malware is created and stored in the external storage in ready-to-ship 

It is then up to the user how they want to spread their newly created ransomware. Anyone unlucky enough to be tricked into installing the malware will end up with a locked device held to ransom. The malware created using this automation process follows the typical Lockdroid behavior of locking the device’s screen with a SYSTEM_ALERT_WINDOW and displaying a text field for the victim to enter the unlock code.

The entire process of creating a ready-to-use piece of malware is done on a smartphone without any requirement to write a single line of code.




The TDK samples I’ve analyzed so far are all aimed at Chinese-speaking users but modifying the interface language would be simple. If it is not already the case, it is likely different language versions will soon be made available.

The emergence of easy to use malware development kits such as these lowers the bar for aspiring cyber criminals wanting to enter the ransomware game. Individuals with little technical knowledge can now create their very own customized Android ransomware. However, these apps are not just useful for aspiring and inexperienced cyber criminals as even hardened malware authors could find these easy-to-use kits an efficient alternative to putting the work in themselves. We expect to see an increase in mobile ransomware variants as these development kits become more widespread.

Mitigation

To protect against this kind of threat on mobile devices, Symantec recommends users observe the following security best practices:

Keep your software up to dateRefrain from downloading apps from unfamiliar sitesOnly install apps from trusted sourcesPay close attention to the permissions requested by an appInstall a suitable mobile security app, such as Norton, in order to protect your device and dataMake frequent backups of important data

Protection

Symantec and Norton products detect Trojans created using these kits as the following:

Android.Lockdroid.E

Android apps for creating ransomware Android apps for creating ransomware Reviewed by Unknown on August 25, 2017 Rating: 5
ads 728x90 B
Powered by Blogger.