Security News > 2022 > April

As you probaby know, so-called quantum computers work in a rather mysterious way compared to conventional computers, inasmuch as they can perform certain sorts of calculation so that they effectively "Compute" all possible answers simultaneously in what's known in the jargon as a quantum superposition. So if quantum computers ever do become both reliable and powerful enough to work their superpositional algorithmic magic on 2000-digit prime factors, then breaking into messages we currently consider uncrackable in practice may become possible in theory.

Instead, you can turn to a lesser known but more privacy-minded browser, and one candidate is the Ghostery Dawn browser. Made by the people behind the Ghostery browser privacy extension, Dawn tries to limit the information that is typically monitored and recorded when you use one of the major browsers.

The Italian luxury fashion house Ermenegildo Zegna has confirmed an August 2021 ransomware attack that resulted in an extensive IT systems outage. To highlight the potential investment risks, the report provides an example of a ransomware attack that hit the firm in August 2021, impacting most of its IT systems and causing a large-scale interruption.

Atlassian, a UK-based company making software development and collaboration tools, estimates it might take two more weeks to restore all customer instances impacted by a week-long ongoing outage affecting its cloud services. While the impact on businesses using its products is undeniable, Atlassian said only around 400 of its more than 200,000 customers are affected.

In a blog post outlining the actions, Microsoft reported attackers used the domains to target Ukrainian media organizations, government institutions and foreign policy think tanks based in the U.S. and Europe. "We obtained a court order authorizing us to take control of seven internet domains Strontium was using to conduct these attacks," said Tom Burt, corporate vice president of Customer Security and Trust at Microsoft.

Software solutions are rightly considered less secure than hardware ones, so let's focus on two leading crypto hardware wallets: Ledger Nano X and the Trezor Model T. SEE: Cryptocurrency glossary: From Bitcoin and Dogecoin to hot wallets and whales. What is Ledger Nano X? Ledger Nano X is a cryptocurrency hardware wallet built on a custom operating system dubbed BOLOS and developed by Ledger.

If you are waiting for Windows 11 side-taskbar support before upgrading to the latest operating system, you may be waiting for a long time, according to a recent Microsoft Ask Me Anything session. When Windows was first released, the most controversial changes were the new centered Start Menu and the reduced functionality of the Windows taskbar.

There has been a land rush of sorts among threat groups trying to use the vulnerability discovered in the open-source Spring Framework last month, and now researchers at Trend Micro are saying it's being actively exploited to execute the Mirai botnet. The Mirai malware is a long-running threat that has been around since 2016 and is used to pull smaller networked and Internet of Things devices such as IP cameras and routers into a botnet that can then be used in such campaigns as distributed denial-of-service and phishing attacks.

Are there any cast iron guarantees when it comes to ransomware? Well, you can guarantee that your organization will come under attack sooner or later. They also need to look inwards, to ensure your backup and recovery practices and technology are also up to the challenge.

A banking trojan for Android that researchers call Fakecalls comes with a powerful capability that enables it to take over calls to a bank's customer support number and connect the victim directly with the cybercriminals operating the malware. While the victim sees the bank's real number on the screen, the connection is to the cybercriminals, who can pose as the bank's customer support representatives and obtain details that would give them access to the victim's funds.