Online PC Support

OPS Technical Solutions : +1 833-522-1003

Welcome

WIKIPEDIA® warns on browser malware

Wikipedia Foundation, the organization operating the popular online encyclopedia, has issued a warning to its users, telling them that if they are seeing adverts while browsing WIKIPEDIA site, it is likely that their computers have become a victim of malware infection.

“We never run ads on Wikipedia,” said Philippe Beaudette, director of community advocacy for the Wikimedia Foundation, in a blog post. “If you’re seeing advertisements for a for-profit industry… or anything but our fundraiser, then your web browser has likely been infected with malware.”

Then how WIKIPEDIA is running?

WIKIPEDIA’s operating costs are covered by donations. Every year an online fundraiser is organized, and that’s usually the only time when a banner is displayed on the site’s pages.

Google™ fixes 18 security flaws in Google™ Chrome

Google has announced the release of newest version of its popular Chrome web browser after fixing 18 security glitches and has also added a easy-to-use new feature for its customers.

Updating Chrome

Seven of the vulnerabilities that were fixed in the Chrome version 19.0.1084.46 were classified as high-risk flaws, which means that they could be exploited to take control of infected systems. The users of Chrome can update to version 19 by clicking the wrench icon in the top right corner of the browser and selecting ‘About Google Chrome’.

The latest release of Google Chrome even allows the users to access the open tabs they viewed on their office PC with their tablet or smartphone. To do so the user has to sign in to his Google account. Signing into Chrome syncs other browser settings too, including bookmarks, apps, extensions, history, and themes.

Android™ Trojan Mimics PC Drive-by Malware Attack

Lookout Mobile Security, a security company, has discovered an Android ‘drive-by’ malware that is used to infect Windows computer systems. Discovered on a number of websites, the odd Trojan is distributed using a webpage containing a hidden iFrame.

How the malware infects?

Any Android browser visiting an affected page (the attack ignores PC browsers) will automatically start downloading the malware without the user being aware what has happened. The malware is not quite a PC drive-by attack because the app needs to be installed by the user. It relies on the user having ticked the ‘Unknown Sources’ box, which is in most cases unchecked.

The rough equivalent of this layer on a Windows Vista or Windows 7 PC would be the User Access Control (UAC) which is usually circumvented using social engineering or by misrepresenting the nature of the application.

The purpose of the infection is a bit of a mystery. “This specific sample, while relatively well constructed, does not appear to go to great lengths to hide its intended purpose: it can be used to access private networks,” commented Lookout Mobile Security in its blog post.

Microsoft® identifies malware targeting Mac® OS X

Microsoft Corporation’s security research team has discovered a new malware that exploits an old bug in Microsoft Office. The strange thing about this malware is that instead of attacking the PCs, the bug is actually targeting Mac OS X systems.

The vulnerability, which was categorized as critical when it was discovered and patched in 2009, allows the attackers to execute remote code, which enables them to take control of a computer system. According to threat researcher Jeong Wook (Matt) Oh, a new malware utilizing the vulnerability has likely surfaced now, because not all machines are kept up to date, indicating that malware authors are taking advantage of users’ reluctance to patch.

Microsoft’s perspective

The malware is put under severe category by Microsoft, and named MasOS-X/MS09-027.A. Due to the way that the exploit code is loaded into memory, and how OS X Lion protects certain segments of memory, the exploit fails under Lion. But, Snow Leopard and earlier versions do not protect the area of memory that the malware targets, and are also vulnerable if Office for Mac is not patched.

Oh said that the RunFile function proves that it was designed specifically for OS X. He also indicated that the developers of this malware had a particular target group in mind, since it seemed they knew their target would not be running Lion.

Facebook® partners with security vendors

The social networking giant Facebook has joined hands with security solution providing companies like Microsoft, McAfee, TrendMicro, Sophos, and Symantec Corporation to enhance the security of its users.

 

The social networking platform has gained the attention of hackers and malicious code designers due to its massive popularity. As Facebook is planning to go public next month, it has taken this step to keep the spammers and hackers at bay from its 845 million users. Facebook is also integrating malicious URL data provided by its security partners into its URL blacklist system. Facebook will now give a warning to its users beforehand when they click on a website that could possibly pose a threat to their computers.

 

“So whenever you click a link on our site, you benefit not just from Facebook’s existing protections, but the ongoing vigilance of the world’s leading corporations involved in computer security,” explains Facebook on its security blog.

 

As part of the new partnerships, users are being given the option to sign-up for a free six-month subscription to install the anti-virus software on their computer.

 


Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003