follow

help me to improve quality

donate

Pages

Friday 20 January 2017

trend micro maximum security 11 review


should i buy trend micro Titanium Maximum security 2017?

is trend micro Titanium Maximum security Version 11.0 good enough to protect my pc from all malware and unsafe websites?

if you have this kind of  questions then you will get answer of your question in this video

Trend Micro™ Maximum Security provides comprehensive multi-device protection so you can enjoy your digital life safely.
Features the latest in anti-ransomware technology
-Blocks dangerous websites
-Shields your privacy on social media
-Safeguards kids online
-Secures 3 devices (PC, Mac, or mobile)
-Securely manages online passwords

Which kind of security suite you choose depends on what kinds of devices you need to protect. If you're strictly a PC household, a traditional Windows-centric suite should do fine. But if you use multiple platforms, you're better off with a cross-platform suite like Trend Micro Maximum Security. It offers feature set on Windows and Android, but less so for mac OS and iOS devices.

The Windows module in Trend Micro Maximum Security sports a competitive list of security and convenience features. Three of its features are present in every all-in-one internet security product in our lineup: anti-phishing, malware detection on removable media and a gamer mode, which suppresses alerts during full-screen applications so you can enjoy movies and games without annoying interruptions. You also get parental controls to manage your children's internet activity, a password manager and file vaults to secure any especially sensitive information you want to protect. In addition, you get a file shredder to completely eradicate deleted files. Absent from Trend Micro's Windows component are anti-theft features, which would allow you to remotely lock down your computer if you lose it, and a rescue mode to boot a PC that has succumbed to infections, which some competing products offer.

To counter the uptick in ransomware attacks, Trend Micro includes Folder Shield, a component that bans unauthorized programs from making changes in your Documents folder. The company also maintains a ransomware hotline that's free for anybody who needs help.

Trend Micro's scores from the independent testing labs are mixed. It earned a perfect 18 points in the latest test by AV-Test Institute, as did Kaspersky and Bitdefender. Simon Edwards Labs certified it at the AA level, the second-best of five certification levels. However, it failed one of two tests performed by MRG-Effitas (to be fair, many products fail these tests). Out of three tests by AV-Comparatives, Trend Micro took a just-passing Standard rating in one and a second-best Advanced rating in the other two.

The software's mobile modules turned in excellent scores for malware detection and usability when AV-Test conducted tests on the Android module during November 2016 . An app adviser alerts you about apps that want to take too many liberties with your privacy. It can block calls and help you manage passwords. It also supports antiphishing and parental controls.

Trend Micro Maximum Security's iOS module did not undergo AV-Test evaluations in 2016. However, the iOS features built into this software include antiphishing, antitheft and password management.

From the Trend Micro account dashboard, you can manage all your subscriptions in one place. For example, you can check if anything has expired and renew or convert a trial version. You can also update your account details.

The support webpage is organized well and contains tutorials and useful advice on important topics. Product guides are available as PDFs. To reach support, you can email the company. If you want to call with questions, you can get customer support by phone from 5 a.m. to 8 p.m. Pacific Standard Time on weekdays. For premium customer service, for which you need to pay an extra fee, you can call a hotline 24/7.

Smile! Hackers Can Remotely Access Your Samsung SmartCam Security Cameras


It's not necessary to break into your computer or smartphone to spy on you. Today all devices in our home are becoming more connected to networks than ever to make our lives easy.

But what's worrisome is that these connected devices can be turned against us, anytime, due to lack of stringent security measures and insecure encryption mechanisms implemented in these Internet of Things (IoTs) devices.

The most recent victim of this issue is the Samsung's range of SmartCam home security cameras.

Yes, it's hell easy to hijack the popular Samsung SmartCam security cameras, as they contain a critical remote code execution (RCE) vulnerability that could let hackers gain root access and take full control of these devices.

SmartCam is one of the Samsung's SmartThings range of devices, which allows its users to connect, manage, monitor and control "smart" devices in their home using their smartphones or tablets.

Back in 2014, the hacking group Exploiteers, which was previously known as GTVHacker, listed some SmartCam exploits that could have allowed remote attackers to execute arbitrary commands and let them change the camera's administrator password.

But instead of patching the flaw, Samsung decided to rip out the accessible web interface and use an alternate route that forced its users to run their SmartCams through the company's SmartCloud website.

So, it turns out that Exploiteers broke into the Samsung's SmartCam devices again with a different hacking exploit, allowing hackers to view what are supposed to be private video feeds.

What went wrong? Samsung had patched the original flaws but left one set of scripts untouched: Some PHP scripts that provide firmware updates through the SmartCam's "iWatch" webcam monitoring software.

These PHP scripts have a command injection vulnerability which could allow unauthorized users without admin privileges to execute remote shell commands with root privileges.
"The vulnerability occurs because of improper sanitization of the iWatch firmware update filename," a post on Exploiteers website reads. "A specially crafted request allows an attacker the ability to inject his command providing the attacker remote root command execution."
This defect, in turn, allows the web management system to be turned on, which was turned off by the vendor.

Exploiteers has also provided a proof-of-concept video demonstration that shows their exploit successfully working on the SmartCam SNH-1011 model, but security experts believe all Samsung SmartCam devices are affected.

How to Mitigate the Vulnerability?


An official patch from Samsung does not appear to be available yet, but the good news is that the folks at Exploiteers have shared a DIY patch that can be downloaded by SmartCam users.

However, I personally advise users to wait for an official firmware update from the company, rather than running untrusted code on their devices, though there's no indication yet if Samsung has any plan to issue a proper patch in upcoming days.

Another way to mitigate the vulnerability is by keeping your SmartCam behind a network firewall.

Samsung has yet to respond on the issue.

Newly Discovered Mac Malware with Ancient Code Spying on Biotech Firms



Security researchers have discovered a rare piece of Mac-based espionage malware that relies on outdated coding practices but has been used in some previous real-world attacks to spy on biomedical research center computers.

Dubbed Fruitfly, the malware has remained undetected for years on macOS systems despite using unsophisticated and "antiquated code."

Infosec firm Malwarebytes discovered Fruitfly, detected as 'OSX.Backdoor.Quimitchin,' after one of its IT administrators spotted some unusual outgoing activity from a particular Mac computer.

According to the researchers, the recently discovered what they're calling "the first Mac malware of 2017" contains code that dates before OS X, which has reportedly been conducting detailed surveillance operation on targeted networks, possibly for over two years.

Fruitfly uses a hidden pearl script to communicate back to two command-and-control (C&C) servers and has the ability to perform actions like capturing webcam and screenshots from both Mac and Linux systems, grabbing the system's uptime, and moving and clicking a mouse cursor.

Fruitfly can also collect information about other devices connected to the same network as the infected Mac, and then tries to connect to them, according to a blog post published by Malwarebytes.

The malware also uses a secondary script and Java class to hide its icon from showing in the macOS Dock, though it's still unclear how the malware got distributed and infected the machines.

What's more interesting is that the malware uses code that pre-dates Apple's OS X operating system, including SGGetChannelDeviceList, SGSetChannelDevice, SGSetChannelDeviceInput, and SGStartRecord.

Researchers said the malware is even running open-source "libjpeg" code to open or create JPEG-formatted image files, which was last updated in 1998.

On further digging into the code, the researchers discovered the malware had even gone through changes to "support" Mac OS X Yosemite indicating Fruitfly is at least two years old.

However, the old code and upgrade to support Mac Yosemite do not indicate the exact creation date of the malware.
"The only reason I can think of that this malware has not been spotted before now is that it's being used in very tightly targeted attacks, limiting its exposure," Thomas Reed of Malwarebytes wrote in the post. 
"There have been [many] stories over the past few years about Chinese and Russian hackers targeting and stealing the United States and European scientific research. Although there is no evidence at this point linking this malware to a specific group, the fact that it has been seen specifically at biomedical research institutions certainly seems like it could be the result of exactly that kind of espionage."
The Fruitfly's code even includes Linux shell commands that show signs of the malware potentially running just fine on Linux operating system. So, it would come as no surprise if a Linux variant of Fruitfly was in operation.

Reed also said he has also come across related Windows executables that connected to the same C&C server used by the Fruitfly malware but date back to at least 2013.

However, the good news is that Apple has released an update for macOS to address Fruitfly. Although Apple automatically pushes the update, Mac users should consider checking their systems for infections, which is actually known as OSX.Backdoor.Quimitchip.

Billion-Dollar Hacker Gang Now Using Google Services to Control Its Banking Malware



Carbanak – One of the most successful cybercriminal gangs ever that's known for the theft of one billion dollars from over 100 banks across 30 countries back in 2015 – is back with a BANG!

The Carbanak cyber gang has been found abusing various Google services to issue command and control (C&C) communications for monitoring and controlling the machines of unsuspecting malware victims.

Forcepoint Security Labs researchers said Tuesday that while investigating an active exploit sent in phishing messages as an RTF attachment, they discovered that the Carbanak group has been hiding in plain site by using Google services for command and control.
"The Carbanak actors continue to look for stealth techniques to evade detection," Forcepoint's senior security researcher Nicholas Griffin said in a blog post. "Using Google as an independent C&C channel is likely to be more successful than using newly created domains or domains with no reputation."
The RTF document features an embedded OLE object that contains a VBScript (Visual Basic Script), which is previously associated with the Carbanak malware, and uses social engineering to trick victims into clicking on an envelope image to "unlock the contents."


It turns out that the envelope image actually hides the embedded OLE object, so as soon as the victim double-clicks that picture, a dialog box opens asking if the victim wants to run the file unprotected.vbe.

If the victim runs the file, Carbanak's VBScript malware will get executed, and, according to Forcepoint, the malware will "send and receive commands to and from Google Apps Script, Google Sheets, and Google Forms services."

Besides VBScript malware, Forcepoint researchers also discovered a new 'ggldr' script module encoded inside the main VBScript file along with various other VBScript modules, capable of using Google services as a command and control channel.
"The ‘ggldr’ script will send and receive commands to and from Google Apps Script, Google Sheets, and Google Forms services," "For each infected user a unique Google Sheets spreadsheet is dynamically created to manage each victim," Griffin said.

"The use of a legitimate third party service like this one gives the attacker the ability to hide in plain sight. It is unlikely that these hosted Google services are blocked by default in an organization, so it is more likely that the attacker will establish a C&C channel successfully."
Forcepoint researchers reckon it is probable that the hacking group is using Google services because these services are allowed by default at many companies and organizations, which makes it easier for hackers to exfiltrate data and send instructions.

Carbanak, also known as Anunak, is one of the most successful cybercriminal operations in the world and is a highly organized group that continually evolves its tactics to carry out cyber crime while avoiding detection by potential targets and the authorities.

The group was first exposed in 2015 as financially-motivated cybercriminals targeting mainly financial institutions. Since it started operating in 2013, Carbanak has stolen upwards of $1 Billion from more than 100 banks across the globe.

Forcepoint has already notified Google of the issue, and its researchers are working with the web technology giant on this particular abuse of its legitimate web services.

Friday 13 January 2017

do i need antivirus in windows 10?

do i need antivirus in windows 10 ?

should i pay money to buy any antivirus software? or builtin security of windows 10 is strong enough to protect me?

is windows defender good enough to protect my pc?

can smart screen filter of microsoft edge browser protect me from unsafe websites?

Do you even need an antivirus with Windows 10?

For Windows 10 ,is Windows Defender good enough? 

Do you really need an antivirus software for Windows 10?

should i use smartscreen of windows 10

Do you really need an antivirus software for Windows 10?

is edge browser safe?

Do you even need an antivirus with Windows 10?


if you have this kind of  questions then you will get answer of your question in this video

Microsoft has dabbled in the antivirus business for longer than you might imagine. Back in 1993, MS-DOS 6 included an antivirus licensed from Central Point. That antivirus was later acquired by Symantec and integrated into the Norton Security product line. Over the years we've seen Microsoft Anti-Virus for Windows, Microsoft Security Essentials, and Microsoft Windows Defender. Unfortunately, Microsoft's free antivirus tools will not protect your computer from all modern malware.

It's important to distinguish the version of Windows Defender found in Windows 8 and 8.1 from the same-named component in Windows 7 and Vista. Before Windows 8, Defender only promised protection against spyware. You needed Security Essentials for full-scale antivirus protection. The modern Windows Defender offers the same protection as Microsoft Security Essentials; in fact, you can't even install MSE on Windows 8 and window 10.

As for Windows 10, we haven't heard much about tweaks to Windows Defender. However, the operating system itself can block execution of untrusted programs. So, as long as the bad guys don't steal any trusted certificates (and that never happens, right?), Windows 10 may be a bit safer. 

Results from the big labs are important, but I always run my own hands-on tests to make sure I have a good feel for each program.  Windows Defender totally missed quite a few of my malware samples, and some of them were really nasty. 

Browser AutoFill Feature Can Leak Your Personal Information to Hackers



Just like most of you, I too really hate filling out web forms, especially on mobile devices.

To help make this whole process faster, Google Chrome and other major browsers offer "Autofill" feature that automatically fills out web form based on data you have previously entered in similar fields.

However, it turns out that an attacker can use this autofill feature against you and trick you into spilling your private information to hackers or malicious third parties.

Finnish web developer and whitehat hacker Viljami Kuosmanen published a demo on GitHub that shows how an attacker could take advantage of the autofill feature provided by most browsers, plugins, and tools such as Password Managers.

Although, this trick was first discovered by Ricardo Martin Rodriguez, Security Analyst at ElevenPaths, in the year 2013, but it seems Google haven't done anything to address weakness in Autofill feature.

The proof-of-concept demo website consists of a simple online web form with just two fields: Name and Email. But what's not visible are many hidden (out of sight) fields, including the phone number, organization, address, postal code, city, and country.

Giving away all your Personal Information Unknowingly




So, if users with an autofill profile configured in their browsers fill out this simple form and click on submit button, they'll send all the fields unaware of the fact that the six fields that are hidden to them but present on the page also get filled out and sent to unscrupulous phishers.

You can also test your browser and extension autofill feature using Kuosmanen's PoC site.

Kuosmanen can make this attack even worse by adding more personal fields out of user's sight, including the user's address, credit card number, expiration date, and CVV, although auto-filling financial data forms will trigger warnings on Chrome when sites do not offer HTTPS.

Kuosmanen attack works against a variety of major browsers and autofill tools, including Google Chrome, Apple Safari, Opera, and even the popular cloud security vault LastPass.



Mozilla's Firefox users do not need to worry about this particular attack as the browser currently, does not have a multi-box autofill system and forces users to select pre-fill data for each box manually.

Therefore, the Firefox browser can't be tricked into filling text boxes by programmatic means, Mozilla principal security engineer Daniel Veditz says.

Here's How to Turn Autofill Feature Off


The simplest way to protect yourself against such phishing attacks is to disable form autofill feature in your browser, password manager or extension settings.

Autofill feature is turned on by default. Here's how to turn this feature off in Chrome:

Go to Settings → Show Advanced Settings at the bottom, and under the Passwords and Forms section uncheck Enable Autofill box to fill out web forms with a single click.

In Opera, go to Settings → Autofill and turn it off.

In Safari, go to Preferences and click on AutoFill to turn it off.

Phone-Hacking Firm Cellebrite Got Hacked; 900GB Of Data Stolen



The company that sells digital forensics and mobile hacking tools to others has itself been hacked.

Israeli firm Cellebrite, the popular company that provides digital forensics tools and software to help law enforcement access mobile phones in investigations, has had 900 GB of its data stolen by an unknown hacker.

But the hacker has not yet publicly released anything from the stolen data archive, which includes its customer information, user databases, and a massive amount of technical data regarding its hacking tools and products.

Instead, attackers are looking for possible opportunities to sell the access to Cellebrite system and data on a few selected IRC chat rooms, the hacker told Joseph Cox, contributor at Motherboard, who was contacted by the hacker and received a copy of the stolen data.

Meanwhile, Cellebrite also admitted that it recently experienced "unauthorized access to an external web server," and said that it is "conducting an investigation to determine the extent of the breach. The impacted server included a legacy database backup of my.Cellebrite, the company's end user license management system."

The 900 GB of stolen archive also includes login data (usernames and passwords) of Cellebrite customers, which suggests that it has been taken from the web servers related to Cellebrite's site.


The dump also contains "evidence files from seized mobile phones, and logs from Cellebrite devices," as well as it appears that company has sold phone hacking tools to repressive regimes, such as Turkey, the United Arab Emirates, and Russia.

On the other hand, the hacker did not clearly state the actual extent of what he/she had done to Cellebrite's systems.
"I can't say too much about what has been done," the hacker told Motherboard. "It's one thing to slap them, it's a very different thing to take pictures of [their] balls hanging out."
Cellebrite is known for its powerful hacking tool Universal Forensic Extraction Device (UFED) that help investigators bypass the security mechanisms of mobile phones, especially iPhones, and extract all data, including SMS messages, emails, call logs and passwords from them.

Just a few months back, Cellebrite's most sensitive in-house capabilities were made public by one of its products' resellers, who distributed copies of Cellebrite's firmware and software for anyone to download.

Donald Trump appoints a CyberSecurity Advisor Whose Own Site is Damn Vulnerable



Former New York City Mayor Rudolph W. Giuliani has been appointed as a cyber security advisor for the President-elect Donald Trump, but it appears that he never actually checked the security defenses of his own company's website.

Giuliani is going to head a new Cybersecurity Working group for the President-elect, and "will be sharing his expertise and insight as a trusted friend concerning private sector cyber security problems and emerging solutions developing in the private sector," the Trump's Transition Team announced Thursday.

Trump administration has appointed Giuliani after citing his 16 years of experience "providing security solutions in the private sector," but the news met online criticism with many users on Twitter asking:

'What does the former New York mayor know about cyber security?'

As the news broke, online users started scanning his website "www.giulianisecurity.com" and found that the site for Giuliani Security & Safety is simply a disaster.

The site runs on an old version of Joomla! — a free, open-source content management system (CMS) — which is vulnerable to more than a dozen flaws.

The website also uses an outdated version of the script language PHP, uses an expired SSL certificate, runs over a 10-year-old version of FreeBSD OS server and even fails to follow other basic security practices.

According to Robert Graham of Errata Security, Giuliani did not build the site himself; instead he "contracted with some generic web designer to put up a simple page with just some basic content."

"There's nothing on Giuliani's server worth hacking. The drama over his security, while an amazing joke, is actually meaningless," Graham said in a blog post. "All this tells us is that Verio/NTT.net is a crappy hosting provider, not that Giuliani has done anything wrong."
Although it really doesn't matter who has created the website, if you are in cyber security business to "help the government plan to make us more secure," such ignorance hardly inspires confidence in the expertise of that person.

Giuliani is the CEO of his own private-sector cybersecurity venture, Giuliani Partners, which is an international cyber security consulting firm that claims to offer "a comprehensive range of security and crisis management services."

What Giuliani Partners actually does is not known, because the company promotes its crime reduction successes in countries, but not its cybersecurity work.

The venture recently struck a deal with BlackBerry to provide companies and governments cyber security support by assessing infrastructures, identifying potential cyber security vulnerabilities, addressing gaps and securing endpoints "with the goal of offering another channel to bring customers to a new standard of security."

This clearly suggests that the company is doing something right.