Security News > 2022 > April

OpenSSH goes Post-Quantum, switches to qubit-busting crypto by default
2022-04-11 18:58

As you probaby know, so-called quantum computers work in a rather mysterious way compared to conventional computers, inasmuch as they can perform certain sorts of calculation so that they effectively "Compute" all possible answers simultaneously in what's known in the jargon as a quantum superposition. So if quantum computers ever do become both reliable and powerful enough to work their superpositional algorithmic magic on 2000-digit prime factors, then breaking into messages we currently consider uncrackable in practice may become possible in theory.

How to use Ghostery’s privacy-minded Dawn browser
2022-04-11 18:36

Instead, you can turn to a lesser known but more privacy-minded browser, and one candidate is the Ghostery Dawn browser. Made by the people behind the Ghostery browser privacy extension, Dawn tries to limit the information that is typically monitored and recorded when you use one of the major browsers.

Luxury fashion house Zegna confirms August ransomware attack
2022-04-11 18:32

The Italian luxury fashion house Ermenegildo Zegna has confirmed an August 2021 ransomware attack that resulted in an extensive IT systems outage. To highlight the potential investment risks, the report provides an example of a ransomware attack that hit the firm in August 2021, impacting most of its IT systems and causing a large-scale interruption.

Atlassian says ongoing outage might last two more weeks
2022-04-11 18:10

Atlassian, a UK-based company making software development and collaboration tools, estimates it might take two more weeks to restore all customer instances impacted by a week-long ongoing outage affecting its cloud services. While the impact on businesses using its products is undeniable, Atlassian said only around 400 of its more than 200,000 customers are affected.

Microsoft Takes Down Domains Used in Cyberattack Against Ukraine
2022-04-11 17:26

In a blog post outlining the actions, Microsoft reported attackers used the domains to target Ukrainian media organizations, government institutions and foreign policy think tanks based in the U.S. and Europe. "We obtained a court order authorizing us to take control of seven internet domains Strontium was using to conduct these attacks," said Tom Burt, corporate vice president of Customer Security and Trust at Microsoft.

Ledger vs Trezor: Crypto hardware wallet comparison
2022-04-11 17:21

Software solutions are rightly considered less secure than hardware ones, so let's focus on two leading crypto hardware wallets: Ledger Nano X and the Trezor Model T. SEE: Cryptocurrency glossary: From Bitcoin and Dogecoin to hot wallets and whales. What is Ledger Nano X? Ledger Nano X is a cryptocurrency hardware wallet built on a custom operating system dubbed BOLOS and developed by Ledger.

Microsoft: Moving Windows 11 taskbar may never be an option again
2022-04-11 17:15

If you are waiting for Windows 11 side-taskbar support before upgrading to the latest operating system, you may be waiting for a long time, according to a recent Microsoft Ask Me Anything session. When Windows was first released, the most controversial changes were the new centered Start Menu and the reduced functionality of the Windows taskbar.

Attackers exploit Spring4Shell flaw to let loose the Mirai botnet
2022-04-11 17:00

There has been a land rush of sorts among threat groups trying to use the vulnerability discovered in the open-source Spring Framework last month, and now researchers at Trend Micro are saying it's being actively exploited to execute the Mirai botnet. The Mirai malware is a long-running threat that has been around since 2016 and is used to pull smaller networked and Internet of Things devices such as IP cameras and routers into a botnet that can then be used in such campaigns as distributed denial-of-service and phishing attacks.

There are few guarantees when it comes to ransomware, except that you’re a target
2022-04-11 16:15

Are there any cast iron guarantees when it comes to ransomware? Well, you can guarantee that your organization will come under attack sooner or later. They also need to look inwards, to ensure your backup and recovery practices and technology are also up to the challenge.

Android banking malware intercepts calls to customer support
2022-04-11 15:54

A banking trojan for Android that researchers call Fakecalls comes with a powerful capability that enables it to take over calls to a bank's customer support number and connect the victim directly with the cybercriminals operating the malware. While the victim sees the bank's real number on the screen, the connection is to the cybercriminals, who can pose as the bank's customer support representatives and obtain details that would give them access to the victim's funds.