A new antivirus bug called AVGater was discovered by a Vienna, Austria researcher named Florian Bogner. The bug can be exploited by local users only and allows the attacker to have full control over the computer by misusing the restore from quarantine in antivirus. The three access areas of antivirus are the unprivileged domain that consists of the user interface, the SYSTEM that consists of the Windows service, and the Kernel that consists of the operating system kernel (the core of the operating system). The image below depicts the basic functions and communication of antivirus. (more…)
Human traffickers worldwide are increasingly using social media to contact vulnerable victims. Human traffickers know how to search out a needy child or teenagers who may be insecure and wanting attention. The trafficker may appear to take a special interest in the child and tell them what they want to hear…this is called grooming.
Once limited to luring victims in the street, traffickers can now message thousands of people through Instagram, Facebook, Kik, Tagged and Twitter, with WhatsApp and Snapchat some of the latest tools in their arsenal. A trafficker may meet their potential victim on Facebook or other well-known site but ask the child to transfer their conversation to Kik or another less popular site. (more…)
A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros (software code inside of a Word document) to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. (more…)
Online advertising companies are notorious for not protecting their information systems from malware, and that has resulted in a flood of malware infections commonly known as a malvertisement. Thousands of computers can be infected within minutes of a malvertisement going live. Online advertisement companies have made a small course correction in the last two years, but the effort is not nearly enough to stem the tide of malvertising. Publishers and ad brokers still lack authentication and authorization mechanisms along with necessary malware scanning because of the volume of advertisements that are submitted, so a complaint system is used to tackle issues. We carefully review which advertisements are placed on our website, so you don’t have to worry. (more…)
Think Before You Click
Before we get into the anatomy of phishing emails, we need to define what social engineering is. For the sake of simplicity, it’s a scam that is created by con artists using the same tricks from decades ago when scams were done on the street and over the phone to now, where it’s conducted over the phone, but predominately through email. (more…)