Digital stalking uses specialized malware, called stalkerware, to gain access to functions of a smartphone, tablet, or PC. The software allows the stalker to listen to and record phone calls, view stored photos and files, activate the camera, read all types of message, log keystrokes and track the victim’s location via the device GPS functionality. Stalkerware thus spies on every action. However, it is most probably not something that you have accidentally installed yourself, but is secretly installed on your device by someone who has access to this. Therefore, as a victim of digital stalking, it will probably only become noticeable when the perpetrator misuses private knowledge for their own purposes.
Spotlight on Security: Malware and Anti-Malware for Apple Silicon
In late 2020, Apple started selling laptop, desktop and all-in-one Mac computers with a new type of ARM-based processor, called the M1. It is expected to be the first in a whole new range of such CPUs, collectively known as Apple Silicon. The change from Intel processors is believed to be partly so that Apple had complete control of their entire manufacturing process. However, the new M1 processors bring a number of technical improvements as well.
Spotlight on Security: Why independent IT-security testing labs are important to enterprise security
If you’re looking for an endpoint protection product to secure your business network, there is a wide variety of solutions available. These include endpoint security (antivirus), and endpoint protection and response systems, which allow you to detect, analyse and respond to suspicious programs, processes and events. How can you select the right enterprise product for your needs? Independent testing labs are the best place to start – here’s why.
Spotlight on Security: Malware authors take advantage of the rush to try Windows 11
Since the next version of Microsoft’s desktop operating system, Windows 11, was announced in June, tech enthusiasts over the world have been keen to try out the new platform. As usual, cybercriminals have jumped on the opportunity to spread malware. Since the next version of Microsoft’s desktop operating system, Windows 11, was announced in June, tech enthusiasts the world over have been keen to try out the new platform. As usual, cybercriminals have jumped on the opportunity to spread malware. Telangana Today reports how malware authors have distributed fake installer programs that include a variety of unwanted and malicious programs along with the new Windows.
Spotlight on Security: Windows 11 and Security
In June 2021, Microsoft announced that it is to release a new version of Windows for PCs, Windows 11, later this year. Aside from new features and an updated user interface, Microsoft is promoting the new security measures in Windows 11. We have taken a look at how the new operating system will affect security for the average PC user.
Spotlight on Security: Laptops for home-schooling British children come with a nasty surprise
A number of websites have recently reported that some laptops funded by the British government for school use were found to be pre-infected with the Gamarue.L worm.
The BBC states that teachers in Bradford discovered the malware when preparing the laptops for use. They said it appeared to be contacting servers in Russia, and they shared their findings in an online forum. Information security consultant Paul Moore told the BBC that the Gamarue worm “presents a very severe threat to any PC or network“. Continue reading…
Spotlight on Security: EvilQuest / ThiefQuest Mac Ransomware
Ransomware for macOS shows the importance of using independently tested Mac antivirus software. EvilQuest / ThiefQuest ransomware is now blocked by all the Mac AV products certified by AV-Comparatives in 2020: Avast, AVG, Avira, Bitdefender, CrowdStrike, FireEye, Kaspersky, and Trend Micro.
Spotlight on security: Why independent testing of anti-virus software is important
If you’ve ever considered doing your own tests of antivirus programs, you might be surprised to find that it’s much, much more difficult than you think. Here’s why:
Spotlight on security: The Curse of the False Positive
By David Harley
When is a false positive (FP) really a false positive? How much care should security vendors take to avoid or at worst fix them: do they really matter at all?
AV-Comparatives found a flaw in a macOS security feature that allowed unidentified apps to run (bypassing Gatekeeper checks)
In spring of 2019, AV-Comparatives ran a team-building event, in which their research team was asked to find security bugs on macOS. This was actually planned as a nice event with co-operative activities, but it happened that they found a security flaw on macOS Mojave 10.14.4 and earlier versions. The issue allows Gatekeeper to be bypassed, and unsigned apps from outside the App Store to be executed. The method used does not require any specialist knowledge or programming ability. Anyone who can create, copy and rename folders in Finder could do it, with a few very simple instructions.