Tag Archive for: Nearly

$500 zero-day ransomware attack takes council offline for nearly a week – ZDNet


ZDNet

$ 500 zero-day ransomware attack takes council offline for nearly a week
ZDNet
The attack represents the largest of its kind against Lincolnshire Council, which claims it has been the victim of zero-day malware, an attack previously unknown to security experts. Once the malware was discovered, the council closed down its entire
Lincolnshire County Council hit by £1m malware demandBBC News
Lincolnshire council IT ransomware flingers asked for … £350The Register
Lincolnshire IT systems back onstreamUKAuthority.com (press release) (blog)
IT PRO –Government Computing Network –Digital By Default News
all 53 news articles »

“zero day” – read more

Android security: Nearly third of owners don’t use a lockscreen passcode – ZDNet


ZDNet

Android security: Nearly third of owners don't use a lockscreen passcode
ZDNet
Image: ZDNet/CNET. Android security has been labelled a "market for lemons" because Android owners have no idea whether their devices will receive a patch when a new bug is made public. UK researchers last year found that nearly 90 percent of Android …
Android and the enterprise 2016 – old versions remain a big security riskComputerworldUK

all 10 news articles »

“android security” – read more

New type of auto-rooting Android adware is nearly impossible to remove

(credit: UCR Today)

Researchers have uncovered a new type of Android adware that’s virtually impossible to uninstall, exposes phones to potentially dangerous root exploits, and masquerades as one of thousands of different apps from providers such as Twitter, Facebook, and even Okta, a two-factor authentication service.

The researchers have found more than 20,000 samples of trojanized apps that repackage the code or other features found in official apps available in Google Play and then are posted to third-party markets. From the end user’s perspective, the modified apps look just like the legitimate apps, and in many cases they provide the same functionality and experience. Behind the scenes, however, the apps use powerful exploits that gain root access to the Android operating system. The exploits—found in three app families known as Shedun, Shuanet, and ShiftyBug—allow the trojanized apps to install themselves as system applications, a highly privileged status that’s usually reserved only for operating system-level processes.

“For individuals, getting infected with Shedun, Shuanet, and ShiftyBug might mean a trip to the store to buy a new phone,” researchers from mobile security firm Lookout wrote in a blog post published Wednesday. “Because these pieces of adware root the device and install themselves as system applications, they become nearly impossible to remove, usually forcing victims to replace their device in order to regain normalcy.”

Read 5 remaining paragraphs | Comments

Ars Technica » Technology Lab

Nearly 1 in 8 Home Networks Infected: Report – Infopackets


Hot Hardware

Nearly 1 in 8 Home Networks Infected: Report
Infopackets
13 per cent of all home networks are infected. Kindsight's report suggests that about 6.5 per cent of these infections are serious enough to have converted the computers on the infected network into a botnet, or are capable of compromising a user's
Report: 13 Percent of North American Homes Infected with Malware, 2.2 Million Hot Hardware
Kindsight Security Report: 13 Percent of Home Networks Infected by MalwareMidsize Insider

all 3 news articles »

android botnet – read more