Archive | Security

Computer security has always been important, but the rise of the Internet and the global Internet community have made it more pressing than ever. New threats have emerged with the Internet, including phishing attacks that spread via email, computer worms that replicate over the Internet, a new bread of trojans that take over a computer to include it in a bot network that is used for malicious activities, and spam and viruses are all threats that Internet users encounter these days.

We cover security updates when they are released for major software including Microsoft Windows, plugins like Java or Adobe Flash, and web browsers like Google Chrome or Firefox. In addition, we are also reporting about services, online and offline, that help you protect your systems against security threats, and post tutorials that explain how to recover a system when it has been successfully attacked.

ransomware simulator

Ransim is a ransomware simulator for Windows that simulates attacks of ten ransomware families against the computer system. Ransomware is without doubt a relatively new threat category that has gained some prominence in recent time. Security companies have added ransomware protection to their tools as a response, or released standalone programs with the aim to […]

netgear router update

Netgear has released the first batch of production firmware fixes for company routers affected by a serious security vulnerability. Cert issued a warning on December 9, 2016 that several Netgear routers are vulnerable to arbitrary command injection. Cert listed only two router models but has since then added other models to the list. Currently, the […]

avira password manager

Avira Password Manager is a new security product by German company Avira which is probably best known for its antivirus offerings. The password manager niche is crowded, and if you want to conquer it with a new product, you better make sure it is offering something unique. Avira's reputation may certainly help the company acquire […]

malwarebytes free anti exploit

Malwarebytes 3.0, released a couple of days ago, marks a big jump from the company's previous policy of releasing individual security tools. Instead of offering Malwarebytes Anti-Malware, Anti-Exploit and Anti-Ransomware as individual downloads and installations, Malwarebytes decided to integrate them all in one product. The new Malwarebytes 3.0 looks on first glance like an upgrade […]

password leak

A recent password use study by the German Hasso-Plattner-Institute of roughly 1 billion user accounts concluded that 20% of users were reusing passwords. Additionally, 27% of users used password that were nearly identical with other account passwords. User accounts and passwords are still the dominating method of authentication both locally and online. While companies work […]

malwarebytes 3.0

Malwarebytes 3.0 is a new product by Malwarebytes, makers of security software that unifies the company's main security products in a single program. Home users had the choice between three different products for Windows desktop PCs up until now: There was Malwarebytes Anti-Malware, Malwarebytes Anti-Exploit, and Malwarebytes Anti-Ransomware. The first two products were available as […]

top vulnerabilities 2016

If you needed another reason not to use Flash anymore, a new security report by Recorded Future may convince you to consider this at the very least. The company analyzed 141 exploits kits that were available between November 16, 2015 and November 15, 2016. The main takeaway of the research study is that Adobe Flash […]

bitlocker bypass windows 10

A security researcher discovered a new issue in Microsoft's Windows 10 operating system that allows attackers to gain access to BitLocker encrypted data. A post on the Win-Fu blog highlights the method. Basically, what the method does is exploit a troubleshooting feature that is enabled during the upgrade process. There is a small but CRAZY […]

windows mitigations updated

Microsoft plans to discontinue support for its Enhanced Mitigation Experience Toolkit in July 2018, and won't release a new version of EMET either. This makes EMET 5.51 the last release version of the anti-exploit security software for Windows. The reason given by Microsoft was that Windows 10, Microsoft's new operating system, includes all the mitigation […]

malwarebytes telecrypt decryptor

Malwarebytes Telecrypt Decryptor is a free program for devices running Microsoft Windows to decrypt files that are encrypted by the ransomware Telecrypt. Telecrypt is a rather troubling piece of ransomware that is distributed through various means including emails, exploits, and drive by downloads. What makes Telecrypt special is that it uses the API of the […]

keepass source audit

We reported back in June 2016 that KeePass, a popular password manager, was getting a security audit by the European Commission's EU Free and Open Source Software Auditing project (EU-FOSSA). EU-FOSSA is a pilot project to create a formal process for contributing software security reviews to open source communities. The project created an inventory of […]

password managers no storage

If you read password managers that don't store passwords here on Ghacks, you know already what deterministic or stateless password managers are. Broken down to the basics, these password managers don't store passwords or account information. So, instead of having to use local or remote storage for the password database, these programs rely on algorithms […]

web of trust ratings

Add-on companies are selling the browsing history of millions of users to third-parties according to a report that aired on German national TV. Reporters of Panorama managed to gain access to a large data collection that contained the browsing history of roughly 3 million German Internet users. The data was collected by companies that produce […]

MBRFilter is a new open source software for Windows devices designed to protect the Master Boot Record against manipulation. The Master Boot Record holds information about how partitions and file systems are organized on a storage device. It triggers the loader of installed operating systems as well, which makes it an important part of any […]