In August, Imperva, a security vendor that provides network security software and services admitted that the company’s cloud firewall product, Cloud Web Application Firewall (Cloud WAF), led to the compromise of customer data. In the results of the survey released recently, Imperva said that the data breach occurred because the AWS API key had been stolen. Read the rest of this post »
Published by Emerson L. Sullivan on October 15, 2019 9:11 am
Can’t uninstall Kaspersky Secure Connection as you don’t know how to uninstall Kaspersky software? Hey. I would like to know how you guys uninstall Kaspersky Secure Connection. This software was installed with my Kaspersky security software. At the beginning, I thought it could help me secure my online traffics and let me download P2P easily, but the data exceeding notification popped up and it stopped working in the middle of my download. Later, my friends recommended a faster VPN with more features and I signed up the service. Now I don’t need Kaspersky Secure Connection, but I can’t uninstall the software. I always get error. Is it possible to uninstall Secure Connection without removing my security software? How do you do that? Read the rest of this post »
Published by Andrew Gonzalez on October 14, 2019 8:57 am and last modified on October 15, 2019 6:22 am.
Recently, a 29-year-old Singaporean hacker Matthew Ho was arrested for stealing mining resources from Amazon AWS and Google Cloud. He faces at least 34 years in prison on 14 counts of wire fraud, illegal access to equipment and identity theft. Read the rest of this post »
Published by Emerson L. Sullivan on October 12, 2019 2:59 am and last modified on October 12, 2019 3:00 am.
New Zealand’s primary health organization Tū Ora Compass Health official website was attacked by hackers in August this year. The later investigation revealed that the hacker had invaded the websites dating back to 2016, and there may be 1 million users’ data has been leak. Read the rest of this post »
Published by Emerson L. Sullivan on October 10, 2019 6:42 am
Did you hear of Segurazo Antivirus? Is it a good program? I didn’t recall installing it, but it is on my PC now, scanning the system and displaying many alerts. Actually, I don’t like this program, but I can’t uninstall it. I tried to uninstall Segurazo Antivirus from control panel, but failed. It told I need sufficient permission from administrator. It is so weird because I am the administrator. I restarted the PC and tried many times, it won’t uninstall. Do you know how to fix this issue? How do I get rid of Segurazo Antivirus completely? Please help. Read the rest of this post »
Published by Andrew Gonzalez on October 9, 2019 6:25 am and last modified on October 15, 2019 6:29 am.
Beginning on September 24th, Bitcoin collapsed for a full week and prices continued to fluctuate around $8,000. Bitcoin buyers have now received warnings that their cryptocurrency investments face another threat. Uniper Threat Labs security researchers say the spyware provided by the Trojan uses the encrypted Telegram messaging platform to reveal cryptocurrency data. Read the rest of this post »
Published by Emerson L. Sullivan on October 8, 2019 2:39 am and last modified on October 8, 2019 2:39 am.
At the end of August, Nemty Ransomware was actively, spreading via compromised RDP connections. The ransomware virus has been traded through the dark network, and the ransomware mode of “blocking the road, robbing and sitting on the ground” has forced the user to accumulate wealth.
Now, 1.5 version of the Nemty ransomware virus has hit again, raging the network. Read the rest of this post »
Published by Emerson L. Sullivan on October 5, 2019 11:27 am and last modified on September 30, 2019 11:56 am.
Since the Astaroth fileless attack was released in July this year, Microsoft has once again revealed a new wave of Nodersok file-free attacks recently. The hackers also use legitimate tools to launch attacks in order to convert infected systems into proxies and perform click-fraud. It is estimated that thousands of Windows computers have been wrapped up.
Nodersok attacks do not infect any files on the device, and do not leave traces on the hard disk. It is only a series of infections are launched through legitimate tools.
Microsoft said that Nodersok, like Astaroth, performs every step of the infection chain only on legitimate tools, whether it’s the built-in mshta.exe and powershell.exe, or node.exe and Windivert.dll/sys downloaded from a third-party website. The functionalities that come with these scripts or Shellcodes appear encrypted form. They then are decrypted, and executed only in memory. No malicious code is written to the hard disk.
Microsoft discovered the Nodersok attack in mid-July this year and launched an investigation because it detected an abnormality in the use of mshta.exe. Now Nodersok’s main goal is to target the average consumer in the US and Europe.
Published by Emerson L. Sullivan on October 2, 2019 7:08 am and last modified on September 30, 2019 8:08 am.
Hi. I need your help to uninstall Adobe Acrobat Reader DC. Few months ago, I downloaded it to convert and edit pdf file. Now I try to uninstall it and use other software. However, it won’t go away. When I click on the uninstall button, the icon comes up with “preparing to remove” but just stays there for up to hours. In the end, it just crashes. Another time I try to uninstall it, the AcroRd32.exe Application Error pops up. Have you guys ever seen this error? How do you uninstall the software in the end? I need your suggestion to remove Adobe Acrobat Reader DC. Thanks. Read the rest of this post »
Published by Andrew Gonzalez on September 30, 2019 3:30 am and last modified on October 15, 2019 6:49 am.
The Captcha verification code mechanism (a method for identifying real humans or network robots by identifying the letters in the picture) is familiar for most Internet users. However, this mechanism is no longer safe. Security researchers have found that hackers are using it to take victims to phishing pages. According to researchers, the phishing campaign uses captcha boxes to hide a fake Microsoft account login page from secure email gateways (SEGs) into order to trick victims into providing sensitive information. Read the rest of this post »
Published by Emerson L. Sullivan on September 27, 2019 2:29 am