Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices tagged with malware, page 4

  1. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Thursday, 13-Feb-2020 21:32:39 EST Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    #microsoft 'harvesting' #linux code to promoting #malware such as #vista10 https://www.phoronix.com/scan.php?page=news_item&px=Quibble-Open-Source-Windows-BL
    In conversation Thursday, 13-Feb-2020 21:32:39 EST from pleroma.site permalink
  2. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Monday, 10-Feb-2020 10:22:30 EST Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    The only people who can use #windows are #microsoft employees. The rest (who have Windows installed without will on a new computer) are being used by that former group. #surveillance #malware
    In conversation Monday, 10-Feb-2020 10:22:30 EST from pleroma.site permalink
  3. Argentux (argentux@gnusocial.net)'s status on Wednesday, 18-Dec-2019 18:16:09 EST Argentux Argentux
    Así de claro. Buen artículo, mejor párrafo:
    "Y para seguir con nuestra #seguridad, nuestra #privacidad, debemos rechazar cualquier programa #privativo. Lo digo porque hay bastante gente que quiere que #Linux sea el sistema más usado. He dicho bien, Linux. Quieren un sistema Linux pero sin #GNU, con muchos programas privativos, #malware. Y eso es lo mismo que usar #Windows: Una mierda."
    https://maslinux.es/la-encrucijada-de-la-sociedad/
    In conversation Wednesday, 18-Dec-2019 18:16:09 EST from gnusocial.net permalink

    Attachments

    1. La encrucijada de la sociedad
      By maslinux from masGNULinuX
      El panorama de las tecnologías de la información, en el tema del software libre es muy oscuro. No hay razones para ser optimistas pero tampoco para perder la esperanza.La sociedad, en su mayoría, está drogada y como todas las personas que son drogodependientes, no reconocen estarlo porque es
  4. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Wednesday, 13-Nov-2019 06:02:18 EST Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    Rebranding #Malware and #Spyware as #Linu to Dilute the Brand (and the News) http://techrights.org/2019/11/13/googlebombing-spyware/ #proprietarysoftware #microsoft
    In conversation Wednesday, 13-Nov-2019 06:02:18 EST from pleroma.site permalink

    Attachments

    1. Rebranding Malware and Spyware as 'Linux' to Dilute the Brand (and the News)
      from Techrights
      Signal-to-noise ratio continues to be reduced, as a lot of "Linux" news has nothing to do with GNU/Linux or even with Free software
  5. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Tuesday, 12-Nov-2019 15:15:04 EST Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    #microsoft #propaganda site explains how to prepare #malware on a #gnu #linux PC https://www.thewindowsclub.com/create-a-windows-10-bootable-usb-on-linux
    In conversation Tuesday, 12-Nov-2019 15:15:04 EST from pleroma.site permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      How to create a Windows 10 bootable USB on Linux
      By Obinna@TWC from The Windows Club
      We show you how to create a Windows 10 bootable USB on Linux (Ubuntu, Linux Mint, Fedora,OpenSUSE) computer using WoeUSB.
  6. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Tuesday, 12-Nov-2019 14:41:30 EST Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    Your VeggieBurger now supports Ham https://www.phoronix.com/scan.php?page=news_item&px=LinuxBoot-Can-Boot-Windows #linux #windows #linuxboot #malware #microsoft
    In conversation Tuesday, 12-Nov-2019 14:41:30 EST from pleroma.site permalink
  7. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Sunday, 03-Nov-2019 04:29:57 EST Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    So now we have a puff piece or a thousand of them about some #malware of #microsoft changing the desktop icon. #corporatemedia #publicrelations #corruption
    In conversation Sunday, 03-Nov-2019 04:29:57 EST from pleroma.site permalink
  8. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Saturday, 02-Nov-2019 09:22:06 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    ● NEWS ● #Facebook 's Sues #Israel #Malware Marketer With A Lawsuit That Aims To Make An Easily-Abused #Law Even More Abusable https://www.techdirt.com/articles/20191031/18013043302/facebooks-sues-israeli-malware-marketer-with-lawsuit-that-aims-to-make-easily-abused-law-even-more-abusable.shtml
    In conversation Saturday, 02-Nov-2019 09:22:06 EDT from pleroma.site permalink

    Attachments

    1. Facebook's Sues Israeli Malware Marketer With A Lawsuit That Aims To Make An Easily-Abused Law Even More Abusable
      from Techdirt.
      Facebook is suing Israeli exploit developer NSO Group for utilizing WhatsApp to target 1,400 users with malware that allowed NSO's clients to circumvent the chat app's end-to-end encryption. That NSO is being accused of helping bad...
  9. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Thursday, 31-Oct-2019 04:16:29 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    ● NEWS ● #india #in #microsoft #windows ☞ Over 15 Indian States Have Been Infected By The Dtrack #Malware : Kaspersky Report https://in.mashable.com/tech/7790/over-15-indian-states-have-been-infected-by-the-dtrack-malware-kaspersky-report
    In conversation Thursday, 31-Oct-2019 04:16:29 EDT from pleroma.site permalink

    Attachments

    1. Over 15 Indian States Have Been Infected By The Dtrack Malware: Kaspersky Report
      from Mashable India
      Kaspersky revealed recently that it has discovered samples of ‘Dtrack’ malware from enterprises across Indian states including Maharashtra, Karnataka and Telangana.
  10. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Monday, 28-Oct-2019 21:14:26 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    #facebook #proprietarysoftware #surveillance #malware #fb https://twitter.com/vah_13/status/1187755829371555840
    In conversation Monday, 28-Oct-2019 21:14:26 EDT from pleroma.site permalink
  11. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Monday, 28-Oct-2019 02:31:15 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    They call it "open source", but it only runs on #malware known as #Microsoft #Windows https://www.ghacks.net/2019/10/23/videocleaner-is-an-open-source-video-enhancement-tool-for-forensic-purposes/
    In conversation Monday, 28-Oct-2019 02:31:15 EDT from pleroma.site permalink

    Attachments

    1. VideoCleaner is an open source video enhancement tool for forensic purposes- gHacks Tech News
      from gHacks Technology News
      VideoCleaner is a popuar tool used by law enforcement to enhance videos to discover hidden details and for detecting tampered videos. Here's how it works.
  12. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Thursday, 24-Oct-2019 15:42:01 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    #Aaeon too chose chips with #nsa back doors. But AFAICT it doesn't impose #microsoft #malware on these. http://linuxgizmos.com/modular-industrial-nvr-system-also-available-in-in-vehicle-model/
    In conversation Thursday, 24-Oct-2019 15:42:01 EDT from pleroma.site permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      Modular industrial NVR system also available in in-vehicle model
      By Eric Brown from LinuxGizmos.com
      Aaeon’s rugged, $356 and up “VPC-3350S” industrial NVR PC runs on an Apollo Lake SoC and offers 4x GbE ports with PoE and up to 4x mini-PCIe. An in-vehicle model adds GPS, CAN, G-sensor, 3x RS-232, and wide-range power with ignition.
  13. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Tuesday, 22-Oct-2019 05:47:15 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    Turns out some 'i' things run #malware from #microsoft instead of #apple https://www.cnx-software.com/2019/10/22/ilife-mp8-micro-pc-world-smallest-windows-10-mini-pc/ #vista10
    In conversation Tuesday, 22-Oct-2019 05:47:15 EDT from pleroma.site permalink

    Attachments

    1. iLife MP8 Micro PC may be the World’s Smallest Windows 10 Mini PC
      from CNX Software - Embedded Systems News
      iLife MP8 Micro PC may be the World’s Smallest Windows 10 Mini PC
  14. Soh Kam Yung (sohkamyung@mstdn.io)'s status on Sunday, 13-Oct-2019 20:58:04 EDT Soh Kam Yung Soh Kam Yung

    Cryptographer Matthew Green on a change Apple made in iOS13: "Apple is sharing some portion of your web browsing history with the Chinese conglomerate Tencent. This is being done as part of Apple’s “Fraudulent Website Warning”, which uses the Google-developed Safe Browsing technology as the back end."

    #Privacy #Security #Encryption #Google #Apple #Tencent #Malware #WebBrowsers

    https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/

    In conversation Sunday, 13-Oct-2019 20:58:04 EDT from mstdn.io permalink

    Attachments

    1. How safe is Apple’s Safe Browsing?
      By Matthew Green from A Few Thoughts on Cryptographic Engineering

      This morning brings new and exciting news from the land of Apple. It appears that, at least on iOS 13, Apple is sharing some portion of your web browsing history with the Chinese conglomerate Tencent. This is being done as part of Apple’s “Fraudulent Website Warning”, which uses the Google-developed Safe Browsing technology as the back end. This feature appears to be “on” by default in iOS Safari, meaning that millions of users could potentially be affected.

      (image source)

      As is the standard for this sort of news, Apple hasn’t provided much — well, any — detail on whose browsing history this will affect, or what sort of privacy mechanisms are in place to protect its users. The changes probably affect only Chinese-localized users (see Github commits, courtesy Eric Romang), although it’s difficult to know for certain. However, it’s notable that Apple’s warning appears on U.S.-registered iPhones.

      Regardless of which users are affected, Apple hasn’t said much about the privacy implications of shifting Safe Browsing to use Tencent’s servers. Since we lack concrete information, the best we can do is talk a bit about the technology and its implications. That’s what I’m going to do below.

      What is “Safe Browsing”, and is it actually safe?

      Several years ago Google noticed that web users tended to blunder into malicious sites as they browsed the web. This included phishing pages, as well as sites that attempted to push malware at users. Google also realized that, due to its unique vantage point, it had the most comprehensive list of those sites. Surely this could be deployed to protect users.

      The result was Google’s “safe browsing”. In the earliest version, this was simply an API at Google that would allow your browser to ask Google about the safety of any URL you visited. Since Google’s servers received the full URL, as well as your IP address (and possibly a tracking cookie to prevent denial of service), this first API was kind of a privacy nightmare. (This API still exists, and is supported today as the “Lookup API“.)

      To address these concerns, Google quickly came up with a safer approach to, um, “safe browsing”. The new approach was called the “Update API”, and it works like this:

      1. Google first computes the SHA256 hash of each unsafe URL in its database, and truncates each hash down to a 32-bit prefix to save space.
      2. Google sends the database of truncated hashes down to your browser.
      3. Each time you visit a URL, your browser hashes it and checks if its 32-bit prefix is contained in your local database.
      4. If the prefix is found in the browser’s local copy, your browser now sends the prefix to Google’s servers, which ship back a list of all full 256-bit hashes of the matching  URLs, so your browser can check for an exact match.

      At each of these requests, Google’s servers see your IP address, as well as other identifying information such as database state. It’s also possible that Google may drop a cookie into your browser during some of these requests. The Safe Browsing API doesn’t say much about this today, but Ashkan Soltani noted this was happening back in 2012.

      It goes without saying that Lookup API is a privacy disaster. The “Update API” is much more private: in principle, Google should only learn the 32-bit hashes of some browsing requests. Moreover, those truncated 32-bit hashes won’t precisely reveal the identity of the URL you’re accessing, since there are likely to be many collisions in such a short identifier. This provides a form of k-anonymity.

      The weakness in this approach is that it only provides some privacy. The typical user won’t just visit a single URL, they’ll browse thousands of URLs over time. This means a malicious provider will have many “bites at the apple” (no pun intended) in order to de-anonymize that user. A user who browses many related websites — say, these websites — will gradually leak details about their browsing history to the provider, assuming the provider is malicious and can link the requests. (Updated to add: There has been some academic research on such threats.)

      And this is why it’s so important to know who your provider actually is.

      What does this mean for Apple and Tencent?

      That’s ultimately the question we should all be asking.

      The problem is that Safe Browsing “update API” has never been exactly “safe”. Its purpose was never to provide total privacy to users, but rather to degrade the quality of browsing data that providers collect. Within the threat model of Google, we (as a privacy-focused community) largely concluded that protecting users from malicious sites was worth the risk. That’s because, while Google certainly has the brainpower to extract a signal from the noisy Safe Browsing results, it seemed unlikely that they would bother. (Or at least, we hoped that someone would blow the whistle if they tried.)

      But Tencent isn’t Google. While they may be just as trustworthy, we deserve to be informed about this kind of change and to make choices about it. At very least, users should learn about these changes before Apple pushes the feature into production, and thus asks millions of their customers to trust them.

      We shouldn’t have to read the fine print

      When Apple wants to advertise a major privacy feature, they’re damned good at it. As an example:  this past summer the company announced the release of the privacy-preserving “Find My” feature at WWDC, to widespread acclaim. They’ve also been happy to claim credit for their work on encryption, including technology such as iCloud Keychain.

      But lately there’s been a troubling silence out of Cupertino, mostly related to the company’s interactions with China. Two years ago, the company moved much of iCloud server infrastructure into mainland China, for default use by Chinese users. It seems that Apple had no choice in this, since the move was mandated by Chinese law. But their silence was deafening. Did the move involve transferring key servers for end-to-end encryption? Would non-Chinese users be affected? Reporters had to drag the answers out of the company, and we still don’t know many of them.

      In the Safe Browsing change we have another example of Apple making significant modifications to its privacy infrastructure, largely without publicity or announcement. We have learn about this stuff from the fine print. This approach to privacy issues does users around the world a disservice.

      It increasingly feels like Apple is two different companies: one that puts the freedom of its users first, and another that treats its users very differently. Maybe Apple feels it can navigate this split personality disorder and still maintain its integrity.

      I very much doubt it will work.

       

  15. ClaudioM (claudiom@mastodon.xyz)'s status on Wednesday, 17-Jul-2019 12:19:44 EDT ClaudioM ClaudioM

    If you're running #GNOME3 or any DE that's based on #GNOME 3, beware. #malware #spyware

    #EvilGnome: A New #Backdoor Implant Spies On #Linux Desktop Users.

    https://thehackernews.com/2019/07/linux-gnome-spyware.html

    In conversation Wednesday, 17-Jul-2019 12:19:44 EDT from mastodon.xyz permalink
  16. lnxw48a1 (lnxw48a1@nu.federati.net)'s status on Saturday, 06-Jul-2019 20:31:58 EDT lnxw48a1 lnxw48a1
    https://nu.federati.net/url/233544 [techdirt . com]

    China border guards install malware on border crossers' devices.

    #malware #privacy
    In conversation Saturday, 06-Jul-2019 20:31:58 EDT from nu.federati.net permalink

    Attachments

    1. Chinese Border Agents Now Installing Malware On Foreigners' Cellphones
      from Techdirt.
      The Chinese government is no longer content to place its own citizens under pervasive surveillance. There's a new twist to border device searches in certain areas of the country: the installation of software that provides government agents with...
  17. Sursiendo (sursiendo@mastodon.social)'s status on Tuesday, 14-May-2019 14:06:26 EDT Sursiendo Sursiendo

    «Presentamos una recopilación de informaciones e investigaciones relacionadas con la Vigilancia Digital en México, realizada en 2018, con los aportes de organizaciones de derechos digitales e investigadores. Queremos mostrar el panorama de la vigilancia de los últimos años contra activistas, periodistas, académicos y sus familiares, sobre todo en el sexenio de Enrique Peña Nieto, pero que tiene un origen anterior»

    https://sursiendo.com/blog/2019/05/vigilancia-digital-en-mexico/

    #vigilancia #México #GobiernoEspía #malware

    In conversation Tuesday, 14-May-2019 14:06:26 EDT from mastodon.social permalink
  18. infosec-handbook.eu (infosechandbook@mastodon.at)'s status on Tuesday, 26-Mar-2019 01:19:06 EDT infosec-handbook.eu infosec-handbook.eu

    Compromissed ASUS update servers delivered signed malware to hundreds of thousands of customers in 2018:

    https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers

    – it is a targeted attack since the malware is only active if your device has certain MAC addresses
    – most victims are in Russia, Germany, and France
    – technical details, and affected MAC addresses: https://securelist.com/operation-shadowhammer/89992/

    #asus #supplychain #attack #malware #update #security #infosec #cybersecurity #shadowhammer

    In conversation Tuesday, 26-Mar-2019 01:19:06 EDT from mastodon.at permalink

    Attachments

    1. Operation ShadowHammer
      By GReAT from Securelist - English - Global - securelist.com
      Operation ShadowHammer
  19. Aurélien Grosdidier ✅ (alatitude77@mastodon.social)'s status on Tuesday, 10-Jul-2018 01:02:03 EDT Aurélien Grosdidier ✅ Aurélien Grosdidier ✅

    #Malware Found On The #Arch User Repository (#AUR) https://www.linuxuprising.com/2018/07/malware-found-on-arch-user-repository.html

    In conversation Tuesday, 10-Jul-2018 01:02:03 EDT from mastodon.social permalink

    Attachments

    1. Malware Found On The Arch User Repository (AUR)
      from Linux Uprising Blog
      On June 7, an AUR package was modified with some malicious code, reminding Arch Linux users (and Linux users in general) that all user-generated packages should be checked (when possible) before installation.
  20. Dr. Roy Schestowitz (罗伊) (schestowitz@gnusocial.de)'s status on Saturday, 12-May-2018 03:20:07 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    "In March tech investor and commentator Om Malik summarized the negativity by tweeting that #Skype was “a turd of the highest quality”" https://gnusocial.de/url/5281830 #canonical markets this #malware http://techrights.org/wiki/index.php/Skype_is_Spy_Campaign
    In conversation Saturday, 12-May-2018 03:20:07 EDT from gnusocial.de permalink

    Attachments

    1. Don't Skype Me: How Microsoft Turned Consumers Against a Beloved Brand
      from Bloomberg.com
      Since buying the internet phone service in 2011, Microsoft has signed up corporations like GE and alienated long-time Skypers.
  • After
  • Before
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.