Lenovo Warns Users To Upgrade Pre-Installed Tool With Severe Security Holes

Long-time Slashdot reader itwbennett writes: Lenovo is advising users to upgrade to version 3.3.003 of Lenovo Solution Center (LSC), which includes fixes for two high-severity vulnerabilities in the tool. [The tool] allows users to check their system’s virus and firewall status, update their Lenovo software, perform backups, check battery health, get registration and warranty information and run hardware tests. The CVE-2016-5249 vulnerability allows an attacker who already has control of a limited account on a PC to execute malicious code via the privileged LocalSystem account. And the CVE-2016-5248 vulnerability allows any local user to send a command to LSC.Services.SystemService in order to kill any other process on the system, privileged or not. Read more of this story at Slashdot.

View original post here:
Lenovo Warns Users To Upgrade Pre-Installed Tool With Severe Security Holes

Giant Viruses Feature Their Own Built-In Antivirus Software 

Mimiviruses are viruses so big they can actually be seen with the naked eye. European scientists have now learned that these bizarre organisms have their own immune system that makes them virtually invulnerable to predatory viruses, suggesting these creatures may actually represent a new branch in the tree of life. Read more…

Read More:
Giant Viruses Feature Their Own Built-In Antivirus Software 

AVG Proudly Announces It Will Sell Your Browsing History To Online Advertisers

An anonymous reader writes: AVG, the Czech antivirus company, has announced a new privacy policy in which it boldly and openly admits it will collect user details and sell them to online advertisers for the purpose of continuing to fund its freemium-based products. This new privacy policy is slated to come into effect starting October 15. The policy says: We collect non-personal data to make money from our free offerings so we can keep them free, including: Advertising ID associated with your device; Browsing and search history, including meta data; Internet service provider or mobile network you use to connect to our products, and Information regarding other applications you may have on your device and how they are used. Read more of this story at Slashdot.

Read More:
AVG Proudly Announces It Will Sell Your Browsing History To Online Advertisers

Top 10 Incredibly Useful Windows Programs to Have On Hand

Sometimes, all you need is the right app to get something done—whether it’s an essential everyday tool, or something a bit more specialized. Today, as part of Lifehacker’s 10th anniversary celebration , we’re looking at 10 of our favorite apps in the latter category. Read more…

Read More:
Top 10 Incredibly Useful Windows Programs to Have On Hand

Decryptolocker Saves You From the Popular Cryptolocker Ransomware

Cryptolocker is a nasty piece of malware that encrypts the files on your computer and holds them ransom. If you don’t pay for a code to unlock the files, you don’t get them back. FireEye and Fox-IT recently launched a tool to help users get their files back. Read more…

Read the original:
Decryptolocker Saves You From the Popular Cryptolocker Ransomware

10 Malware Removal Apps Tested, Malwarebytes Comes out on Top

A recent test done by the independent antivirus research group AV-TEST— whose tests we’ve mentioned in the past —took a look at the performance of today’s most popular malware removal applications. Most of the applications showed excellent performance, but only Malwarebytes—a free download—managed a perfect score. Read more…

Read the article:
10 Malware Removal Apps Tested, Malwarebytes Comes out on Top

Find Out Your Uber Passenger Rating with this Script

Uber is a great way to get a ride without having to hail a cab. When you finish a ride, you get a chance to rate your driver and your experience. However, the drivers get to rate you too. Here’s how to find out your rating, which is normally a closely-kept secret. Read more…

Original post:
Find Out Your Uber Passenger Rating with this Script

New Mayhem Malware Targets Linux and UNIX-Like Servers

Bismillah writes: Russian security researchers have spotted a new malware named Mayhem that has spread to 1, 400 or so Linux and FreeBSD servers around the world, and continues to look for new machines to infect. And, it doesn’t need root to operate. “The malware can have different functionality depending on the type of plug-in downloaded to it by the botmaster in control, and stashed away in a hidden file system on the compromised server. Some of the plug-ins provide brute force cracking of password functionality, while others crawl web pages to scrape information. According to the researchers, Mayhem appears to be the continuation of the Fort Disco brute-force password cracking attack campaign that began in May 2013.” Read more of this story at Slashdot.

See the original post:
New Mayhem Malware Targets Linux and UNIX-Like Servers

Stung By File-Encrypting Malware, Researchers Fight Back

itwbennett (1594911) writes “When Jose Vildoza’s father became the victim of ransomware, he launched his own investigation. Diving into CryptoDefense’s code, he found its developers had made a crucial mistake: CryptoDefense used Microsoft’s Data Protection API (application programming interface), a tool in the Windows operating system to encrypt a user’s data, which stored a copy of the encryption keys on the affected computer. Vildoza and researcher, Fabian Wosar of the Austrian security company Emsisoft, collaborated on a utility called the Emsisoft Decrypter that could recover the encrypted keys. In mid-March Vildoza had launched a blog chronicling his investigation, purposely not revealing the mistake CryptoDefense’s authors had made. But Symantec then published a blog post on March 31 detailing the error.” Read more of this story at Slashdot.

More:
Stung By File-Encrypting Malware, Researchers Fight Back