ANTI-MALWARE.info | The Reference in Independent Anti-Malware Advice and Information
Subscribe | Log in

Blog

Ubuntu on Windows 10: Good or Bad?

The good news?

Did you all hear the interesting news? During the last Microsoft’s Build developer conference (see https://build.microsoft.com/ ) Microsoft announced the latest tools and technologies and how they can help today’s developers be their most creative and productive. Besides a spectacular improved ‘Cortana’, an innovative HoloLens and a new update of Visual Studio, one specific fact came to us as an interesting surprise. Ubuntu is coming to Windows 10!

Actually it came from a secret project setup by Microsoft and Canonical and it was unveiled at Kevin Gallo’s opening keynote speech during the conference in March. (see https://blogs.windows.com/buildingapps/2016/03/30/windows-10-anniversary-sdk-is-bringing-exciting-opportunities-to-developers/ ) But the good news also has some security implications?

(more…)

Cybergefahr – The German (and updated) version of my book Cybergevaar released!

Famous German publisher Springer launched ‘Cybergefahr’ in the D-A-CH countries, a book written by Eddy Willems, G DATA’s Security Evangelist.

This blog article was originally posted on the G DATA Security Blog and includes an interview with me.

As the boundaries between the real world and the virtual world become blurred, the Internet is turning into a stamping ground for cyber criminals. They are using targeted malicious activities to cause untold damage to private individuals, companies or even entire governments of a country. Internationally renowned security expert Eddy Willems has set himself the target of enlightening company managers, politicians, government representatives and end users to this – and not just in the IT sector. Once equipped with the necessary knowledge, readers of the Springer book on cyber threats are able to recognise dangers in the digital world and protect themselves against cyber attacks. The book does not presume any prior knowledge – whether the solutions needed are for PCs, smartphones or entire company networks.

CybergefahrCover

“It would be nice if we could make the world a little bit safer and at the same time make life a little bit harder for cyber criminals with this book,” says Willems in his introduction to the book. However, no IT system is basically immune to these risks. Both Windows and Apple devices have become victims of malevolent malware. But in the opinion of the expert, professionals disagree as to when the first computer virus was actually born. Some say it was Creeper, the first worm in an experimental program dating from 1971. However, it might also be Elk Cloner, which was only recognised as a virus many years after it was discovered. The only certain thing, says Willems, is that “the distribution of malware initially took place at a snail’s pace, moving from computer to computer via diskette; but with the introduction of the worldwide web, things rapidly intensified in terms of speed and the number of cyber victims.”

This book is an updated and translated version of Willems’ original Dutch book ‘Cybergevaar’ (“Cyberdanger” in English), originally published by Lannoo, in October 2013, in Belgium and the Netherlands. “Writing a book about cyber threats in a comprehensible and comprehensive way is not an easy task, but the book ‘Cybergevaar ‘ succeeds in this”, certifies the book’s first review, conducted by a well-known Belgian IT magazine, Datanews. Another review by the known Virus Bulletin magazine is referencing it as ‘a pleasant read on an important subject’.

(more…)

Internet of (Things) Trouble … the continuing story

Is the IoT industry making the same mistakes again?

A half year ago I wrote about the expected problems related to IoT. And guess what? Unfortunately we were right. It even became worse in the past 6 months. Nearly everything what was described back then became exploited. And that’s not a good thing.

The Car Industry

Especially all hacked cars made it into the latest newsflashes from online news media to the biggest media broadcasters in the world. Some examples were the Fiat Chrysler where 1.4 million cars were called back after the vendors Jeep hack and a Corvette where the brakes of the car could be remotely controlled. These examples confirmed the problems related to the whole car industry described in our former blog (e.g. The BMW problems).

The Fitness Industry

Completely different but fully related to the Internet of Things are the new wristbands, step counters or mobile fitness devices and the data they gather in-the-cloud and on the device and your smartphone. Interesting was the test performed by AV-Test, a worldwide well known independent test organization for security products. This test tried to measure how the private fitness data is transferred from the devices to the smartphones or the cloud and how secure the apps of fitness trackers are. You can find the full test here. These new fitness wristbands are very popular and it is already a trend; all activity results are recorded and analyzed in an app on the user’s smartphone. This means it is possible to immediately see how well the user performed. The question remains, however, is the data transported securely from the wristband to the user’s smartphone? Or is it possible for someone to intercept this link, copying or even manipulating the data? Or could the app itself be manipulated? Those questions were investigated, where 9 fitness wristbands or trackers together with the corresponding Android apps were monitored in live operation. How well performed those trackers in terms of security? And what about eavesdropping? (more…)