After the massive data breaches of web giants Dropbox, Badoo, MySpace, Tumblr, LinkedIn and Yahoo! in September 2016 (the biggest massive piracy of individual data against a single company never made public), Dailymotion, one of the most visited video platforms in the world has been attacked. The French online video giant remains behind YouTube, bringing in more than 300 million unique visitors per month. More than 85 million accounts are affected by this massive data leak, which still makes it one of the most important attacks of the year.
One of the most important attacks of the year
LeakedSource sounded the alarm this week by acquiring some of the stolen data. According to them, Dailymotion’s database was victim to an intrusion in early October which allowed the hackers to recover the data of more than 85 million users: mainly identifiers, passwords and email addresses.
Unwanted calendar invitations have invaded the calendars of iOS and Mac users for the past week. These messages seem to be targeted to everyone with an iCloud email account via invitations on the calendar. There have also been reports that users of the iCloud Photo Sharing library have received the spam.
Within the last year, ransomware has risen to become the new “it” malware – we have seen a 105% year over year growth in ransomware attacks. Therefore, we are happy to announce today, that we have released four more ransomware decryption tools for the latest ransomware threats: Alcatraz Locker, CrySiS, Globe, and NoobCrypt. All the decryption tools are available, together with a detailed description of each ransomware strain. We now have tools to help you recover encrypted files if your computer has been infected with one of the following ransomware strains:
Earlier this summer, we told you about our proprietary CyberCapture technology. CyberCapture is a vital component of the Avast Antivirus Nitro Update, providing users with increased speed and a higher level of protection against zero-second attacks. In this post, I’d like to dive deeper into the engineering behind CyberCapture and explain the components that give the feature its technical integrity.
In essence, CyberCapture is a cloud-based smart file scanner. In order to provide immediate analysis, CyberCapture automatically establishes a two-way channel of communication with the Avast Threat Labs while securing suspicious files on the user’s PC until analyses are completed. Once a file has been isolated, our team can clear away all the false code, misdirection, obfuscation, and other stuff malware creators use to mask malware’s true intentions. By doing so, CyberCapture is able to dissect malicious file, observe the binary level instructions inside the malware,and understand the true purpose hidden within it.
Truecaller, CM Security, and Sync.ME, three popular caller blocking and ID apps used by millions of customers, have just been outed for storing the contact details of three billion people in publicly searchable databases. According to Digital Journal, research published earlier this week by Factwire, a group of investigative journalists in Hong Kong, said that the mobile phone numbers of politicians, celebrities, and billions of other people, can be found via searches on the app publisher’s websites.
You may have heard names like Cryptolocker or Heartbleed and wondered: Who comes up with these names? Why? The next question you may have is: Do all viruses and vulnerabilities get named?
During Black Friday and the weeks leading up to Christmas, tech savvy shoppers visit brick-and-mortar stores to see the items they want to buy, but they use price comparison apps on their phones to check for the best deal. This is called “showrooming”. Shopping apps do things like scan barcodes for price comparisons between your local retailer and online stores, send alerts when the price drops, find money-saving coupons, and even tell which stores in the mall have a particular item on sale.
Back in the day when families had one phone in the house, it was guaranteed that as they sat down to dinner, a telemarketer would call. Now that we carry our phones with us, we can be interrupted at any time by telemarketers, robocallers, scammers, political campaigners, and even the crazy ex.