Tag Archive for: Check

Check your email security, and protect your customers – NCSC.GOV.UK – National Cyber Security Centre



Check your email security, and protect your customers – NCSC.GOV.UK  National Cyber Security Centre

Source…

Check these settings to protect your Android device from malware scams


SINGAPORE – Android phone users’ freedom to download apps outside of official app stores – a defining feature of the operating system – is being curtailed amid pressure on tech companies to crack down on malware scams that have proliferated on the mobile platform.

Google, which develops Android, announced on Feb 7 that it would, by default, block attempts to install apps from unverified sources that require sensitive permissions, starting from the week of Feb 21.

Sideloading, as it is called, is common practice for the installation of apps for tech enthusiasts or for overseas businesses that are not supported by Google’s ecosystem.

This open door to unverified apps has been exploited by fraudsters to plant viruses. Malware scams left a trail of losses worth more than $34 million in 2023, according to the police’s scam statistics, which found that many victims were duped into installing virus-laden apps on Android phones.

In response, Google and phone manufacturers have had to tighten security measures on their devices in Singapore.

The blocking of installations of apps from unverified sources is part of a Singapore trial by Google and the Cyber Security Agency of Singapore (CSA) that will involve all Android users.

It is among a slew of security features available on the Android operating system – some of which are tucked away in the many sub-menus of the phones’ settings.

Here is a guide on how you can ensure your Android phone is shielded from the malware menace.

Look out for the new software update 

The new Android security feature that blocks attempts to install sideloaded apps will be pushed automatically to all Android devices – there is no need to manually update a device, said Google’s director of Android security strategy Eugene Liderman, in reply to questions from The Straits Times.

The update will beef up Google Play Protect, an in-built program on Android devices that scans for harmful behaviour, issues warnings and blocks or automatically disables suspicious apps.

ST understands that users will not be notified when the new software is enabled on their devices, but they will find that any new attempts to install apps from suspicious…

Source…

A ransomware reality check as US is a top target of attacks


While you might think, as many people do, that ransomware attacks are a worldwide problem, a new report reveals hackers are targeting specific countries, and the United States is one of the top targets.

According to critical infrastructure security company Dragos, 44% of ransomware attacks last year targeted North American industrial organizations. Europe was also a top threat, with 32% of attacks targeting organizations there. Industrial ransomware attacks spiked nearly 50% on a global scale, growing to 905 last year compared to 600 in 2022.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

A ransomware reality check as US is a top target of attacks

Illustration of ransomware attacker (Kurt “CyberGuy” Knutsson)

What is ransomware?

In a ransomware attack, hackers will encrypt data on a system and demand a ransom to restore access to the owners. They may also threaten to delete or leak the data if you don’t pay. While these attacks tend to target large organizations, some hacker groups will also target individuals.

In fact, anyone who uses a computer or a device connected to the internet can be a potential victim of ransomware. This means that your personal files, such as your photos, videos, documents and emails, could be locked by hackers who demand a ransom for their release.

MORE: RANSOMWARE RAMPAGE HITS RECORD HIGH WITH US ITS TOP TARGET

A ransomware reality check as US is a top target of attacks

Person conducting ransomware attack (Kurt “CyberGuy” Knutsson)

What can I do to protect myself from ransomware?

Ransomware criminals will try to get you to pay money to them to get your files back. However, paying the ransom does not guarantee that you will regain access to anything a criminal takes from you and will only permit them to do it more.

Your best bet is to prevent an attacker from gaining access to your files altogether so that you don’t have to try to fight to get them back. Here are some of my tips for avoiding having your data stolen in a ransomware attack.

MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS

1) Be careful about opening suspicious links or attachments

If you receive an email from an address you do not recognize, don’t open it. If you open it by mistake, avoid…

Source…

Indian Govt Reveals ‘High-Risk’ Vulnerabilities Affecting Android Users: Check Details


If you are using an Android device, it’s crucial to be aware that the Indian government’s Computer Emergency Response Team has issued a warning regarding ‘high’ security risk vulnerabilities in Android. The team emphasises that these exploits have the potential to allow attackers to gain sensitive information and execute arbitrary code on your phone.

Which Android Versions Are Affected?

These vulnerabilities are found in Android versions 11, 12, 13, and 14. This implies that even if you have the latest Android version, you are not exempt from these risks.

CERT-In highlights that multiple vulnerabilities exist within the framework, system, arm components, and MediaTek components, Unisoc components, Qualcomm components, and Qualcomm close-sourced components.

How To Protect Yourself?

To safeguard your device, you will need to have Android “Security patch levels of 2024-02-05 or later to address all of these issues.” So, when the OEM of your device releases the said update, simply download the latest available update.

Considering the ‘high’ severity rating, it’s advisable to focus on additional security-enhancing features. Enable two-factor authentication, use a robust passcode, and maintain good digital hygiene practices.

These Are The Vulnerabilities Affecting the Aforementioned Android versions

CVE-2023-32841, CVE-2023-32842, CVE-2023-32843, CVE-2023-33046, CVE-2023-33049, CVE-2023-33057, CVE-2023-33058, CVE-2023-33060, CVE-2023-33072, CVE-2023-33076, CVE-2023-40093, CVE-2023-40122, CVE-2023-43513, CVE-2023-43516, CVE-2023-43518, CVE-2023-43519, CVE-2023-43520, CVE-2023-43522, CVE-2023-43523,CVE-2023-43533, CVE-2023-43534, CVE-2023-43536, CVE-2023-49667, CVE-2023-49668, CVE-2023-5091, CVE-2023-5249, CVE-2023-5643, CVE-2024-0014, CVE-2024-0029, CVE-2024-0030, CVE-2024-0031, CVE-2024-0032, CVE-2024-0033, CVE-2024-0034, CVE-2024-0035, CVE-2024-0036, CVE-2024-0037, CVE-2024-0038, CVE-2024-0040, CVE-2024-0041, CVE-2024-20003, CVE-2024-20006, CVE-2024-20007, CVE-2024-20009, CVE-2024-20010, CVE-2024-20011.

top videos

  • Samsung Will Bring Its AI Features To These Old Galaxy

  • Will AI Take Jobs? Microsoft CEO Satya Nadella Explains

  • Meta To Start Labelling AI-Generated Images on Its…

  • Source…