Cisco report says growing ransomware attacks are costing people and businesses millions

Cisco security researchers also discovered a sharp increase in HTTPS traffic related to malicious activity between September 2015 and March 2016.[b] The increase is due in large part to malicious ad injectors and adware.[/b] (Bold is mine). Researchers also observed that even though major software vendors make patches available, many users failed to quickly install the patches, giving hackers plenty of time to exploit vulnerabilities.
http://www.bizjournals.com/sanjose/news/2016/08/01/cisco-report-says-growing-ransomware-attacks-are.html

HEIST
yet another attack vs HTTPS, this time also works vs HTTP/2

http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/
http://www.scmagazine.com/heist-attack-on-ssltls-can-grab-personal-info-black-hat/article/514203/

details https://tom.vg/papers/heist_blackhat2016.pdf

New Remcos RAT Available for Sale on Underground Hacking Forums

[b]http://news.softpedia.com/news/new-remcos-rat-available-for-sale-on-underground-hacking-forums-507018.shtml[/b]

Recent Hacks on Forums Show Platforms Remain Vulnerable to Fundamental Exploits
http://www.trendmicro.no/vinfo/no/security/news/vulnerabilities-and-exploits/recent-hacks-on-forums-show-platforms-remain-vulnerable-to-fundamental-exploits

Hitler Ransomware :o

http://news.softpedia.com/news/hitler-ransomware-infects-everyone-not-just-the-jews-507123.shtml

Two days ago, AVG security researcher Jakub Kroustek discovered a quite originally named ransomware variant called the Hitler Ransomware (actually Ransonware but the grammar Nazi lying in me could not let that pass) that deletes your files as a result of bad coding.
The Hitler ransomware infection takes place when the user double-clicks on an infected binary. According to Bleeping Computer, this file drops a batch file on the user’s system, which then drops three files called firefox32.exe, ErOne.vbs, and chrst.exe.

Good news is that Avast! also blocked the ransomware.

Microsoft Security Bulletin Summary for August 2016
https://technet.microsoft.com/library/security/ms16-aug

Researchers crack open unusually advanced malware that hid for 5 years
http://arstechnica.com/security/2016/08/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years/

Google study shows unwanted software worse than malware
https://thestack.com/security/2016/08/08/google-study-shows-unwanted-software-worse-than-malware/

pdf.doc > https://static.googleusercontent.com/media/research.google.com/no//pubs/archive/45487.pdf

Got Ransomware? Negotiate
https://labsblog.f-secure.com/2016/08/10/got-ransomware-negotiate/

pdf.doc > https://fsecureconsumer.files.wordpress.com/2016/07/customer_journey_of_crypto-ransomware_f-secure.pdf

new TeamSpeak 3.0.13 server has several 0-day vulnerabilities which are critical
http://seclists.org/fulldisclosure/2016/Aug/61

A New Wireless Hack Can Unlock 100 Million Volkswagens
https://www.wired.com/2016/08/oh-good-new-hack-can-unlock-100-million-volkswagens/

Another good reason to block adds :
https://securelist.com/blog/incidents/75731/good-morning-android/

Economics Behind Ransomware as a Service: A Look at Stampado’s Pricing Model
http://blog.trendmicro.com/trendlabs-security-intelligence/the-economics-behind-ransomware-prices/

Why do we ignore up to 90% of computer security alerts?
http://www.tripwire.com/state-of-security/featured/security-alerts-multitasking/

Is this bringing Windows insecurity to linux?
“Windows PowerShell helps IT professionals and power users control and automate the administration of the Windows operating system and applications that run on Windows.”
https://technet.microsoft.com/en-us/library/bb978526.aspx
A new development: https://blogs.msdn.microsoft.com/powershell/2015/05/05/powershell-dsc-for-linux-is-now-available/

Is this going to be a linux threat like Java was on Windows?

polonus

The above policy can be seen in quite another light if you read this

https://en.wikipedia.org/wiki/Embrace,_extend_and_extinguish

“Embrace, extend, and extinguish”,[1] also known as “Embrace, extend, and exterminate”,[2] is a phrase that the U.S. Department of Justice found[3] that was used internally by Microsoft[4] to describe its strategy for entering product categories involving widely used standards, extending those standards with proprietary capabilities, and then using those differences to disadvantage its competitors.

Often quoted by MS bashers concerning the Ububtu Debian example, but we have to admit MS is not doing great lately.
In various sectors MS did badly recently, missed the train where Android was concerned. Now they act like a Win10 push-man.
Remember, one always reaps as one sowes, karma is the name of the game.

pol

2016 – The Year of Online Extortion

In all of 2015, we saw 29 new families of ransomware.
In the first half of 2016 alone, we’ve seen 79.

http://blog.trendmicro.com/2016-year-online-extortion-proven/

Whatsapp breaks two promises after being acquired by Farcebook’s:

  1. whatsapp gets facebook directed ads,
  2. whatsapp gets further integrated into facebook.

Click read and do not accept the user license, but one has to do that (not applied as per default) within 30 days.
You also have to set to “do not share” under settings.

Now facebook algoritms have acces to your every whatsapp message,
despite of the Privacy Shield Treaty, as big commerce will anyway do as they please,
what else services besides targeted ads services will be able to read into your every whatsapp message? NSA, FBI?

Do not share with Whatsapp what you do not wanna share with others. Your data is what you pay for free services, and your privacy then stops to exist and what you share may come to bite you later.

polonus

Best heard reaction to the recent French-German requests/plans to undermine/outlaw encryption online to better monitor wannabee terrorists:

[b] if crypto is outlawed, then only outlaws have crypto[/b]

polonus

Fantom Ransomware Encrypts your Files while pretending to be Windows Update

http://www.bleepingcomputer.com/news/security/fantom-ransomware-encrypts-your-files-while-pretending-to-be-windows-update/

http://www.neowin.net/news/fantom-ransomware-pretends-to-be-windows-update-while-it-encrypts-your-files