Support scams that plagued Windows users for years now target Mac customers

Enlarge (credit: Malwarebytes) For years, scammers claiming that they’re “calling from Windows” have dialed up Microsoft customers and done their best to trick them into parting with their money or installing malicious wares. Now, the swindlers are turning their sights on Mac users. Researchers at antivirus provider Malwarebytes spotted a Web-based campaign that attempts to trick OS X and iOS users into thinking there’s something wrong with their devices . The ruse starts with a pop-up window that’s designed to look like an official OS notification. “Critical Security Warning!” it says. “Your Device (iPad, iPod, iPhone) is infected with a malicious adward [sic] attack.” It goes on to provide a phone number people can call to receive tech support. The site ara-apple.com is designed to masquerade as https://ara.apple.com/ , Apple’s official remote technical support page. People who are experiencing problems with their Macs can go there to get an official Apple tech support provider to remotely access the person’s computer desktop. Ara-apple provides links to the remote programs the supposed technician will use to log in to targets’ Macs. Read 1 remaining paragraphs | Comments

Read this article:
Support scams that plagued Windows users for years now target Mac customers

Android 6.0 re-implements mandatory device encryption for new devices

(credit: Google) Shortly after the announcement of iOS 8 in 2014, Google made headlines by saying that it would make full-device encryption mandatory for new Android devices running version 5.0. It then made more headlines several months later when we discovered that the company backed down , “strongly recommending” that Android device makers enable encryption but stopping short of actually requiring it. Now Google has published an updated version of the Android Compatibility Definition Document ( PDF ) for Android 6.0, and it looks like mandatory encryption is back with a couple of exceptions. New devices that come with Marshmallow and have AES crypto performance above 50MiB-per-second need to support encryption of the private user data partition (/data) and the public data partition (/sdcard). The relevant portion of the document, emphasis ours: Read 2 remaining paragraphs | Comments

Originally posted here:
Android 6.0 re-implements mandatory device encryption for new devices

Cage against the EMP: New composite cases protect against the electro-apocalypse

A Faraday Cases travel case, configured to keep communications gear safe in transit from unfriendly electromagnetism. 2 more images in gallery WASHINGTON, DC—A small company from Utah has developed a composite material that combines carbon fibers with a nickel coating. The result is an extremely lightweight electric-conducting material with the properties of plastic. And now that material is being used to create cases and computer enclosures that are essentially lightweight Faraday cages—containing electromagnetic radiation from digital devices and shielding them from electronic eavesdropping or electromagnetic pulse attacks. Ars got a brief hands-on with some of the materials at the Association of the United States Army expo this week. The company, Conductive Composites , is now selling cases built with the Nickel Chemical Vapor Deposition (NiCVD) composite material through its Faraday Cases division . The cases range in size from suitcase-sized units for carrying smaller digital devices to wheeled portable enclosures that can house servers—providing what is essentially an EMP-shielded portable data center. The cases and enclosures are being marketed not just to the military but to consumers, corporations, and first responders as well. The materials used in Faraday Cases can also be used to create ultra-lightweight antennas, satellite communications reflector dishes, and hundreds of other things that currently need to be made with conductive metal. And they could be a boon to anyone trying to prevent electronic eavesdropping—be it through active wireless bugs, radio retroreflectors used by nation-state intelligence agencies, or passive surveillance through anything from Wi-FI hacking to electromagnetic signals leaking from computer cables and monitors. And in some cases, they could make it possible to create the kind of secure spaces used by government agencies to prevent eavesdropping nearly anywhere. Read 9 remaining paragraphs | Comments

View article:
Cage against the EMP: New composite cases protect against the electro-apocalypse

New zero-day exploit hits fully patched Adobe Flash [Updated]

Update on October 14 at 1:15pm PDT: Adobe officials have confirmed this vulnerability affects Flash version 19.0.0.207 , which was released on Tuesday. The vulnerability has been cataloged as CVE-2015-7645. The company expects to release a fix next week. Attackers are exploiting a previously unknown vulnerability in fully patched versions of Adobe’s Flash Player so they can surreptitiously install malware on end users’ computers, security researchers warned Tuesday. So far, the attacks are known to target only government agencies as part of a long-running espionage campaign carried out by a group known as Pawn Storm, researchers from antivirus provider Trend Micro said in a blog post published Tuesday . It’s not unusual for such zero-day exploits to be more widely distributed once the initial element of surprise wanes. The critical security flaw is known to reside in Flash versions 19.0.0.185 and 19.0.0.207 and may also affect earlier versions. At this early stage, no other technical details are available. The researchers wrote: Read 3 remaining paragraphs | Comments

See more here:
New zero-day exploit hits fully patched Adobe Flash [Updated]

University of Cambridge study finds 87% of Android devices are insecure

The study’s estimate of the proportion of known “insecure,” “maybe secure” and “secure” devices over time. (credit: androidvulnerabilities.org ) It’s easy to see that the Android ecosystem currently has a rather lax policy toward security, but a recent study from the University of Cambridge put some hard numbers to Android’s security failings. The conclusion finds that “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.” Data for the study was collected through the group’s ” Device Analyzer ” app, which has been available for free on the Play Store since May 2011. After the participants opted into the survey, the University says it collected daily Android version and build number information from over 20,400 devices. The study then compared this version information against 13 critical vulnerabilities (including the Stagefright vulnerabilities ) dating back to 2010. Each individual device was then labeled “secure” or “insecure” based on whether or not its OS version was patched against these vulnerabilities, or placed in a special “maybe secure” category if it could have gotten a specialized, backported fix. As for why so many Android devices are insecure, the study found that most of the blame sits with OEMs. The group states that “the bottleneck for the delivery of updates in the Android ecosystem rests with the manufacturers, who fail to provide updates to fix critical vulnerabilities.” Along with the study, the University of Cambridge is launching ” AndroidVulnerabilities.org ,” a site that houses this data and grades OEMs based on their security record. The group came up with a 1-10 security rating for OEMs that it calls the “FUM” score. This algorithm takes into account the number of days a proportion of running devices has no known vulnerabilities ( F ree), the proportion of devices that run the latest version of Android ( U pdate), and the mean number of vulnerabilities not fixed on any device the company sells ( M ean). The study found that Google’s Nexus devices were the most secure out there, with a FUM score of 5.2 out of 10. Surprisingly, LG was next with 4.0, followed by Motorola, Samsung, Sony, and HTC, respectively. Read 3 remaining paragraphs | Comments

Read the article:
University of Cambridge study finds 87% of Android devices are insecure

Sprint offers $2.1 billion to acquire the rest of Clearwire

As most observers  expected , Sprint has finally made a formal offer to acquire the rest of Clearwire. On Thursday, Sprint said it would pay $2.1 billion for the remaining 49.7 percent of Clearwire that it does not currently control. As we reported yesterday , the move is widely seen as a play for Sprint to acquire Clearwire’s valuable 2.5 GHz spectrum, which it would use to offer LTE and strengthen its position against Verizon and AT&T. The bid works out to $2.90 per share—higher than the company’s closing price on Wednesday—but analysts say the offer may not be good enough. Read 2 remaining paragraphs | Comments

Read more here:
Sprint offers $2.1 billion to acquire the rest of Clearwire

Man arrested after filming fatal crash from inside car

Paul Pelton Lorain Police Department Whether Paul Pelton is a Good Samaritan is beside the point. The 41-year-old Ohio man was charged Wednesday in connection to him going inside a vehicle in the immediate aftermath of a car crash to film the two teen victims before one of them died in the grisly mishap. All the while, Good Samaritans were struggling to rescue the boys as the car caught fire. It’s not unlawful to film a crime scene with a mobile phone. And it’s not illegal to try to sell the footage of a heinous crime scene, which police suggest was Pelton’s motive. But it is illegal to trespass on a crime scene, the Lorain Police Department said. Read 7 remaining paragraphs | Comments

Visit link:
Man arrested after filming fatal crash from inside car

New iPod Touch’s A8 CPU running at 1.1GHz, includes 1GB of RAM

The new iPods that Apple announced this morning were outed a couple of weeks ago, but the insides of the new iPod Touch were still a surprise: Apple put an A8 in the new Touch, the same SoC that powers the iPhone 6 and 6 Plus. The iPod Touch is quite a bit smaller than either iPhone, though, and preliminary benchmarks suggest that the chip’s speed has been reduced somewhat to keep the temperature down and the battery life up. Geekbench tests run by TechCrunch say the A8 in the Touch is running at about 1.1GHz, down from 1.3GHz in both iPhones. They also confirm that the A8 includes 1GB of RAM, the same amount as the iPhone 6 and 6 Plus. The scores in that Geekbench run suggest that the slowed-down A8 is roughly equivalent to the 1.3GHz Apple A7 chip in the iPhone 5S , which if accurate still represents a substantial improvement over the A5 in the fifth-generation Touch (Primate Labs’ John Poole told us that he believes the listed clock speed to be accurate). What we don’t know is whether the GPU’s speed has been similarly reduced and how aggressively the A8 in the Touch will throttle its speed as it warms up. Read 1 remaining paragraphs | Comments

Link:
New iPod Touch’s A8 CPU running at 1.1GHz, includes 1GB of RAM

Here’s what Windows 10’s DVD and USB packaging will look like

Glorious purple for the Windows 10 Pro DVD. @MicrosoftInside Windows 10 will be available on both DVD and USB memory stick for the first, and possibly even the last, time. By the time the next version of Windows is released— if there is one —it’s hard to imagine that optical media will still be abundant, but this release comes on both the old shiny disc and the new USB key. Mundane blue for the Windows 10 Home DVD. @MicrosoftInside The different media have different packaging, and Twitter user @MicrosoftInside  has posted pictures of what they’ll look like. The DVD boxes will include a screenshot of the operating system on the front. The USB version will stick with a simple logo. The two versions of the operating system, Home and Pro, will sport different colors. The Pro version’s superiority is affirmed through its striking purple color, leaving Home to blue mediocrity. And the USB media get a simpler look. @MicrosoftInside   Read on Ars Technica | Comments

Continue reading here:
Here’s what Windows 10’s DVD and USB packaging will look like

Adobe Flash exploit that was leaked by Hacking Team goes wild; patch now!

Adobe Systems has updated its Flash media player to patch a vulnerability that attackers started exploiting soon after attack code leaked from the devastating Hacking Team breach. As Ars reported Tuesday morning, the previously unknown Flash vulnerability was part of some 400 gigabytes of data dumped on the Internet by unknown attackers who hacked Hacking Team over the weekend. By Tuesday afternoon, the critical flaw was being targeted in the wild by an array of malware titles, including the Angler and Nuclear exploit kits, as first documented by the security researcher known as Kafeine . The exploit has also been folded in to the Metasploit hacking framework . The vulnerability is cataloged as CVE-2015-5119 and is active in Flash versions 18.0.0.194 and earlier. According to security firm Rapid 7, it stems from a use-after-free bug that can be exploited while Flash is handling ByteArray objects. The update is available for Windows, Mac OS X, and Linux systems. Adobe has credited Google’s Project Zero and Morgan Marquis-Boire, director of security, First Look Media, for reporting the critical bug and working to protect Flash users. Read 1 remaining paragraphs | Comments

More:
Adobe Flash exploit that was leaked by Hacking Team goes wild; patch now!