Since the next version of Microsoft’s desktop operating system, Windows 11, was announced in June, tech enthusiasts the world over have been keen to try out the new platform. As usual, cybercriminals have jumped on the opportunity to spread malware. Telangana Today reports how malware authors have distributed fake installer programs that include a variety of unwanted and malicious programs along with the new Windows.
Spotlight on Security: Malware authors take advantage of the rush to try Windows 11
Spotlight on Security: Windows 11 and Security
In June 2021, Microsoft announced that it is to release a new version of Windows for PCs, Windows 11, later this year. Aside from new features and an updated user interface, Microsoft is promoting the new security measures in Windows 11. We have taken a look at how the new operating system will affect security for the average PC user.
Spotlight on Security: Laptops for home-schooling British children come with a nasty surprise
A number of websites have recently reported that some laptops funded by the British government for school use were found to be pre-infected with the Gamarue.L worm.
The BBC states that teachers in Bradford discovered the malware when preparing the laptops for use. They said it appeared to be contacting servers in Russia, and they shared their findings in an online forum. Information security consultant Paul Moore told the BBC that the Gamarue worm “presents a very severe threat to any PC or network“. Continue reading…
Spotlight on Security: EvilQuest / ThiefQuest Mac Ransomware
Ransomware for macOS shows the importance of using independently tested Mac antivirus software. EvilQuest / ThiefQuest ransomware is now blocked by all the Mac AV products certified by AV-Comparatives in 2020: Avast, AVG, Avira, Bitdefender, CrowdStrike, FireEye, Kaspersky, and Trend Micro.
Spotlight on security: Why independent testing of anti-virus software is important
If you’ve ever considered doing your own tests of antivirus programs, you might be surprised to find that it’s much, much more difficult than you think. Here’s why:
Spotlight on security: The Curse of the False Positive
By David Harley
When is a false positive (FP) really a false positive? How much care should security vendors take to avoid or at worst fix them: do they really matter at all?
Spotlight on security: the inconvenient truth about CEO-impersonation fraud
Reported incidents of CEO-fraud or business email compromise (BEC) scams are so bizarre that most people think they are urban myths, told by security specialists to spice up their business and catch the attention of board-level executives. Sadly, these “April Fools’ Day” story lines have the opposite effect on C-level management. Let’s take a look at a recent € 19.2 million CEO-fraud case and put BEC-scams in a cyber-crime perspective to see whether you still think “it won’t happen to me”.
Spotlight on Security: why the claims of Google Play Protect are misleading
In October, Google announced two contract changes for European Android device vendors. One concerned a minimum security-patch requirement, and the other involved charging a fee for Google services (e.g. Google Play Store). These announcements indicate that many Android smartphones suffer from significant security weaknesses. Let us explain (and prove) why Google’s claims about the effectiveness of their Play Protect service are misleading, to say the least.
Spotlight on security: Politics and cyber security, a troubled relationship
The relationships between various countries in the world are worsening, not only with regard to economic and political issues, but also in the field of cybersecurity. The recent bans on Chinese (such as Huawei) and Russian security products (such as Kaspersky Lab) are examples of the troubled relations between politics and cyber security.
Spotlight on security: The problem with false alarms
False Positives (FPs, also known as False Alarms) are harmless and legitimate programs that are incorrectly identified as malicious by an antivirus program. A false positive can have very serious consequences. In some cases, it will not be possible to run a legitimate program if it is blocked by the security software.






