The Apple Pips

Inside All Apple Products

Tag: ransomware (Page 1 of 10)

Camera Guard 2 Professional Offers Improved Webcam and Mic Protection for the Mac

ProtectStar has released Camera Guard 2 Professional for Mac, an update to their popular security application for macOS. The app protects the Mac’s built-in web camera and microphone from access by hackers, and also protects the machine from ransomware attacks by monitoring files and folders for unauthorized access.

Camera Guard 2 Professional Offers Improved Webcam and Mic Protection for the Mac

The new version of the app offers numerous new features, including improved access detection, protection against Mac ransomware, a whitelist for allowed apps and processes, and support for the Apple’s Touch ID sensor that’s found on the latest models of the MacBook Pro.

Camera Guard 2 Professional’s malware protection monitors the files and folders stored on a Mac’s hard drive. It detects changes to the monitored data, alerting the user to any changes or attempts by ransomware to encrypt the files.

Features include:

  • Web camera protection
  • Pop-Up notifications regarding security breaches
  • Logfile protocol
  • Microphone protection
  • Deep Detective(TM)
  • Protection against known and unknown attack attempts
  • Protection against Mac ransomware
  • File and folder monitoring
  • Whitelist
  • Passcode protection
  • Supports Touch ID on compatible MacBook Pro models
  • 24/7 Support by e-Mail

“We’re excited about the new protection abilities we’ve included in the latest version of Camera Guard,” says Niklas Mayle, Security Manager of the Development Team at ProtectStar. “Not only can our users rest easy that they aren’t being monitored by the bad guys via their own Mac, they can also prevent ransomware attacks by those same bad guys with just a few clicks of their mouse!”

Device Requirements:

    • Mac OS 10.11 or higher (Supports macOS High Sierra)
    • 64-bit Processor
    • 50 MB
    • Internet connection for activation and updates

Camera Guard 2 Professional is $29.90, and includes 12-months of updates/upgrades and technical support. A Care Plan is also available for $59.90, and includes 3-years of updates/upgrades and premium technical support.

For more information, visit the the ProtectStar website.

Windows 10 will try to combat ransomware by locking up your data

Enlarge / Cryptolocker was one of the ransomware pioneers, bringing together file encryption and bitcoin payment. (credit: Christiaan Colen / Flickr)

The latest Windows 10 build, today's 16232, contains a few new security features. In addition to the richer control over exploit mitigation that Microsoft announced earlier this week, the new build also includes a trial of a new anti-ransomware capability.

The long-standing approach that operating systems have used to protect files is a mix of file ownership and permissions. On multi-user systems, this is broadly effective: it stops one user from reading or altering files owned by other users of the same system. The long-standing approach is also reasonably effective at protecting the operating system itself from users. But the rise of ransomware has changed the threats to data. The risk with ransomware comes not with another user changing all your files (by encrypting them); rather, the danger is that a program operating under a given user's identity will modify all the data files accessible to that user identity.

In other words, if you can read and write your own documents, so can any ransomware that you run.

Read 4 remaining paragraphs | Comments

Security researchers: Petya malware was designed to destroy information, not make money

Petya Ransomware

Yesterday morning, a new and nasty piece of ransomware dubbed Petya began spreading across the globe. Based on an exploit that was also used during the WannaCry ransomware attack, Petya locked down machines and demanded payment in the form of $300 worth of Bitcoin. As Petya began to spread worldwide, reports surfaced indicating that it had already impacted IT systems at companies such as Merck, Oreo and other large corporations.

Continue reading...

Trending right now:

  1. Samsung’s Galaxy Note 8 specs just leaked
  2. Video: Porsche tries to keep up with a Model S and the result is embarrassing
  3. The iPhone is no longer the fastest phone in the world

Tuesday’s massive ransomware outbreak was, in fact, something much worse

Enlarge / Code in Tuesday's attack, shown on the left, was altered to permanently destroy hard drives. (credit: Matt Suiche)

Tuesday's massive outbreak of malware that shut down computers around the world has been almost universally blamed on ransomware, which by definition seeks to make money by unlocking data held hostage only if victims pay a hefty fee. Now, some researchers are drawing an even bleaker assessment—that the malware was a wiper with the objective of permanently destroying data.

Initially, researchers said the malware was a new version of the Petya ransomware that first struck in early 2016. Later, researchers said it was a new, never-before-seen ransomware package that mimicked some of Petya's behaviors. With more time to analyze the malware, researchers on Wednesday are highlighting some curious behavior for a piece of malware that was nearly perfect in almost all other respects: its code is so aggressive that it's impossible for victims to recover their data.

In other words, the researchers said, the payload delivered in Tuesday's outbreak wasn't ransomware at all. Instead, its true objective was to permanently wipe as many hard drives as possible on infected networks, in much the way the Shamoon disk wiper left a wake of destruction in Saudi Arabia. Some researchers have said Shamoon is likely the work of developers sponsored by an as-yet unidentified country. Researchers analyzing Tuesday's malware—alternatively dubbed PetyaWrap, NotPetya, and ExPetr—are speculating the ransom note left behind in Tuesday's attack was, in fact, a hoax intended to capitalize on media interest sparked by last month's massive WCry outbreak.

Read 8 remaining paragraphs | Comments

Experts say Petya ransomware is just a ‘test’ for something much worse

Petya ransomware: expert analysis

A new ransomware attack, modeled after the recent WannaCry exploit, has hit thousands of organizations and users worldwide. But according to a handful of security experts, it's only the tip of the iceberg. The ransomware attack, which encrypts users' files and demands a ransom to unlock them, could just be a test attack, or cover for more malicious damage being done by the virus.

Continue reading...

Trending right now:

  1. Scientists ‘can’t rule out’ collision with asteroid flying by Earth in 2029
  2. Google Pixel phones of the future may have a feature you’ll never find on an iPhone
  3. Video: Porsche tries to keep up with a Model S and the result is embarassing

Page 1 of 10

Powered by WordPress & Theme by Anders Norén