Chromium browser cops reset feature to clean up malware messes

Chromium browser cops reset feature to help cleanup after malware

Mopping up after malicious software can land you in a browser quagmire full of sketchy search engines, toolbars or worse. Google’s latest version of its open-source Chromium browser now has a remedy for much of that thanks to a ‘reset profile’ setting discovered by code tinkerer François Beaufort. You can revert the defaults for search, homepage, content settings and cookies all in one go, while also disabling extensions. Since Chromium features often pop up later in Chrome, that means your life may soon be easier after your, ahem, friend has a brush with the dark side of the internet.

Filed under: , ,

Comments

Via: TNW

Source: François Beaufort (Google+)

Fake Firefox spreads spyware as makers Mozilla retort

Mozilla has sent out a cease-and-desist letter to Gamma International, who has been disguising commercial malware as Mozilla’s Firefox web browser. Gamma’s software uses Mozilla’s trademarks and brand to mislead consumers into thinking its product is affiliated with the company. In the properties of the fake Firefox browser, all of the information, including version number, copyright, trademark claims, and more are exactly the same as the genuine Firefox browser.

Fake Firefox spreads spyware as makers Mozilla retort

Mozilla was alerted to Gamma’s illegal activities by a group known as the Citizen Lab. The group discovered that the spyware posing as Mozilla Firefox is called either FinSpy or FinFisher, and it was sold to various governments for usage in criminal investigations. FinSpy has command-and-control servers in 36 countries, including the United States, Canada, Japan, and the UK.

Gamma’s fake Firefox was used in a variety of harmful and deceitful ways. The Citizen Lab provided 3 examples of how it was used, including a spyware attack in Bahrain against pro-democracy activists, tricking the people of Malaysia by posing as a document that discusses Malaysia’s upcoming General Elections, and being demonstrated in promotional videos and brochures by Gamma itself.

Luckily for Firefox users, Mozilla assures everyone that the spyware does not infect the real Firefox. Unluckily for Mozilla, this isn’t the first time its product has been misued for the purpose of evil. Back in 2010, there were nearly 200 sites deceitfully using Mozilla’s brands for illegal activities, including distributing malware or requiring users to pay for the sites’ service. Mozilla developer Asa Dotzler’s statement back then still echoes on today, “If you’re being asked to pay for Firefox, it’s a scam.” Also, always make sure that you download Firefox straight from Mozilla, and not some sketchy site.

[via Mozilla]


Fake Firefox spreads spyware as makers Mozilla retort is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Five Simple Ways to Keep Your Android Malware-Free

While it’s true that Android is a little more susceptible to malware attacks than iOS, the situation isn’t nearly as bad as Apple would have you believe. With a little knowledge and a sprinkling of common sense, you can make your device impervious to even the most dastardly of digital assaults. Here’s how. More »

This Family of Data-Stealing Android Malware Got Downloaded from Google Play Millions of Times

Everyone knows there’s malware on Android, but for the most part it just hides out in the seedier back alleys of the OS. You’re only likely to run into it if you start side-loading pirated apps, or frequenting sketchy unofficial app stores. But a newly uncovered family of malware—fittingly called “BadNews”—was just chillin’ in Google Play, and has been downloaded somewhere between two and nine million times. In other words, a whole lot. More »

Google increases Chrome’s security, singles out shady browser extensions

DNP Google increases Chrome's security, singles out shady browser extensions

We know Google isn’t afraid to make it rain for the sake of Chrome’s security, but today’s provisions appear to be an inside job. Laying the smack down on toxic browser extensions, the company introduced a new set of security measures that label applications in violation of its safety guidelines as malware. These potential threats try to bypass the browser’s silent installation blockers by manipulating its management settings. Once installed, the malicious software is enabled by default and cannot be removed or disabled from within Chrome. Google cautions that within a week people will begin seeing download alerts when attempting to install an identified threat. In the meantime, we suggest you start making plans to check out your current extensions just to be sure your setup has a clean bill of health.

Filed under: , ,

Comments

Via: The Next Web

Source: Google Online Security Blog

NQ: Malware on mobile devices grew 163% last year

According to a security report from NQ Mobile Security, mobile malware is on the high rise. In 2012, malware infections grew by 163% year-over-year. There were 65,227 newly discovered mobile malware floating around, compared to the 24,794 that were discovered back in 2011. The malware is beginning to spread to various markets, including China, India, Russia, the United States, and Saudi Arabia.

NQ Malware on mobile devices grew 163 percent last year, 32.8M Android devices infected 1

NQ says that 94.8% of the newly discovered malware were design to infect Android devices. Over 32.8 million Android devices were infected in 2012, over 3x the 10.8 million Android handsets infected back in 2011. The most infected countries are China, with 25.5% of its Android devices being infected, followed by India with 19.4% infected mobile devices, and Russia with 17.9% infected mobile devices. United States and Saudi Arabia are also highly affected, both with 10% of their mobile devices being infected by malware.

NQ Malware on mobile devices grew 163 percent last year, 32.8M Android devices infected (2)

There are 4 new pieces of Malware that NQ says is infecting mobile devices. There’s the VDloader, which runs as a client inside Android devices. It then connects to a remote server. It disguises itself as a regular app, and only activates when requested. FireLeaker is disguised as a widget, but remains invisible on your device. It collects specific device info from the victim, including their mobile number, IMEI number, system number, contact data, and more, and it uploads it all to a remote server.

DDSpy is an invisible malware that disguises itself as Gmail, but is invisible in the apps list. It communicates through SMS, and it features a GPS hook, which activates malware based on specific GPS or cell site location. Lastly, we have DyPusher, which uploads specific device information like FireLeaker, but also downloads apps and files to the device without the user’s permission.

NQ Malware on mobile devices grew 163 percent last year, 32.8M Android devices infected

NQ says that there are many factors to why these infections are massively spreading. One has to do with the fragmentation in Android, with 39% of users still running Android 2.3 Gingerbread. Second, there is app sideloading, where users install apps via other methods instead of Google Play. Then, to piggyback off of app sideloading, there are 58% young Android users who download around 41+ apps for their devices, many of which who use App Sideloading to do so.

Lastly, many Android users lack security features on their devices, such as passcodes or antivirus software. Yesterday, Lookout demonstrated just how easy it is to hack into someone’s phone. So the lesson for today is, download anti-virus software for your Android device, and don’t install suspicious apps from 3rd parties.

[via NQ]


NQ: Malware on mobile devices grew 163% last year is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Microsoft reports that 24% of all PCs are unprotected

Many of you are probably sporting some kind of anti-malware software on your computer, whether it’d Norton, McAfee, Kaspersky, etc. However, it turns out that almost a quarter of all PCs in the world are unprotected, leaving them wide open for all kinds of havoc that no one really wants lurking around.

malware

According to Microsoft’s latest Security Intelligence Report, 24% of all PCs are absent of any kind of anti-malware software. Microsoft says that unprotected computers are 5.5 times more likely to catch a virus than computers that have anti-malware software installed. However, it seems some users are willing to take the risk.

According to the report, the country who has the most unprotected computers roaming around is Egypt, with a whopping 40% of unprotected PCs laying around, with India coming in second at 30%, and Russia with 29%. The US comes in at 26%, with the UK at 21%, which ties for the lowest percentage along with Brazil and Australia.

However, Microsoft notes that the reason for unprotected PCs may not just be about laziness on the users’ part, but they simply may not be well-informed on the importance of having anti-virus software on their computer. There’s also other contributing factors, like free trials expiring without notice, or a virus itself disabling your anti-virus software.


Microsoft reports that 24% of all PCs are unprotected is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

New Self-Deleting Trojan Malware Discovered By Microsoft

New Self Deleting Trojan Malware Discovered By MicrosoftMicrosoft, one of the major names worldwide where software is concerned, has stumbled upon a rather interesting discovery. First of all, a little context to help us get started off on the right footing. Microsoft does have their own anti-virus solution on the computer, where some have deemed to be added on as an afterthought since it is perceived to be nowhere near the capability of other third-party programs, but this does not mean the bunch of Microsoft researchers are no good. On the contrary, a recent post on the Microsoft Malware Protection Center blog has showed that Microsoft has discovered a totally new Trojan malware threat which has been called “TrojanDownloader:Win32/Nemim.gen!A”.

This particular new threat is said to be able to delete its own files right after it has been installed on a computer, in an effort to prevent the files from being isolated and analyzed, and hence, would also mean being a whole lot harder to identify and remove. It is highly recommended that those who were infected by TrojanDownloader:Win32/Nemim.gen!A change all account passwords after the system has been cleaned up.

By Ubergizmo. Related articles: Titan Supercomputer Has World’s Fastest Storage System, Google Autocomplete Results Censored By Tokyo Court,

    

Android Malware Infections Tripled In 2012

Android Malware Infections Tripled In 2012The smartphone used to be a safe environment to develop for, especially in its early days when there was no such thing as malware or viruses, or other kinds of malicious code. Well, times have definitely changed over the years, where the explosive growth of smartphones have led to numerous “backdoors” being discovered in mobile operating systems, and it seems that there is a concentrated effort in developing malicious software for the Android platform in this season.

Mobile security vendor NQ mentioned that the total number of reported Android devices infected with malware grew from 10.8 million in 2011 to 32.8 million in 2012, while would translate to a 300% increase year-over-year, with nearly 95% of malware detected in 2012 being limited to the Android platform, which means that Google’s mobile operating system is almost the de facto target for potential cybercriminals. Interestingly enough, majority of the mobile malware infections reported happened in China, India and Russia. You know what to do to stay safe – download only apps that are certified and from official sources.

By Ubergizmo. Related articles: Taiwan Investigating Samsung For Using Dirty Advertisement Tricks Against HTC, Star Wars Guitars Places Millennium Falcon At Your Fingertips,

    

Malware Infected Results In Search Five Times More Common From Bing Than Google

Malware Infected Results In Search Five Times More Common From Bing Than Google

AV Test, an antivirus testing company from Germany, reports that Bing is five times more likely to show malware infected websites in search results than Google. The company evaluated searches over a number of search engines, Google and Bing included, for more than a year and a half. Google vs Bing evaluated almost 40 million websites, of which the latter showed five times as many websites containing malware. Google search brought up 272 malware infected websites out of the 10.9 million searches, whereas Bing displayed 1,285 infected websites after the same amount of searches.

These infected websites have malware that exploit existing security vulnerabilities, if a user has updated browsers and add-ons, the risk is significantly decreased. The malware exploits vulnerabilities in old add-ons, outdated PDF readers and old web browsers. This goes to show how important it is to keep everything up to date, be it browsers or add-ons. Even the smallest of updates can bring patches for any such vulnerability that can be easily exploited. It is a never ending battle against online malware, so its always better to strengthen up your defenses.

By Ubergizmo. Related articles: Greenland Kicks The Pirate Bay Out After Just Two Days, Fix For Recent WordPress Brute Force Attack Is Easier Than You Think,