Coordinated Effort Underway To Take Down Trickbot Malware

Score one for the good guys. A team led by Microsoft’s DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen’s Black Lotus Labs is working on something new. They have launched a sustained, coordinated attack on Trickbot’s infrastructure in a bid to destroy it, preventing the hackers who control it from making and launching new campaigns against …

Adobe Patches A Number of Critical Vulnerabilities In Latest Update

If you make frequent use of Adobe products, then you’ll definitely want to give priority to applying the latest security update offered by the company. It’s an out of band patch that impacts ten different products in the Adobe lineup and is aimed squarely at addressing a number of critical security flaws. Since this is a big update, released outside …

Latest Windows 10 Update May Block Third Party Drivers

If you haven’t yet installed the latest Windows 10 or Windows Server update, here’s something to be aware of before you do. You may not be able to update or install some third-party drivers. When you try, you might receive an error message that reads ‘Windows can’t verify the publisher of this driver software.’ In addition to that, the company …

New Windows 10 Update Shows App Warnings For Malware

A great many malware strains are designed to engage quietly during a PC’s startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at periodic intervals and uploading them to a command and control server, or doing other nefarious things. Microsoft wants to limit malware’s ability to do that, which is part …

Intel Adding Additional Security To Future Processors

Intel has had more than its share of challenges over the last couple of years. Not the least of which included a whole family of new attack vectors that made headlines and caused panic around the world. This happened as hackers discovered new ways to attack machines with ‘Intel Inside,’ which globally, is a lot of machines. The company responded …

Hacked Networks And Credentials Being Sold At Alarming Rates

Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA. According to their report, the number of ads found on hacking forums advertising ‘Network Access’ tripled between August and September, 2020. The value of the login credentials sold during …

Microsoft Image AI Increases Accuracy To Rival Humans

Skynet just took a step closer to becoming a reality. The word, of course, refers back to the hit movie, ‘Terminator,’ in which a computer network gained sentience and decided to do away with the human race. While Microsoft’s latest advances in AI aren’t Skynet, their new, and recently touted AI image description routine is so good that it’s scary. …

Google Analytics Gains Additional Features

Since Google introduced Google Analytics back in 2005, it has become the industry standard. A simple, free method of getting a bird’s eye view into who’s searching for what on the internet. Millions of business owners around the world rely on Google Analytics to make informed decisions about how to position and present the products and services they make available …

Surge In Ransomware Continues In 2020, Targeting Healthcare

The year 2020 could well be described as the Year of Ransomware. Security researchers around the globe who monitor such things have noted a sharp uptick in the use of ransomware this year, with well known threats like REvil, Ryuk, and Maze being the most common variants deployed by hackers. That’s bad enough by itself, but it gets worse. In …

New Updates For Office 365 Will Include Phishing Protection

Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as “Consent Phishing.” That basically means that the hacker in question will use a variety of social engineering techniques to try …