Hackers at DEF CON took only 12 Minutes to Hack US Voting Machines

DEF CON is supposed to be a convention for hackers where they come together to discuss some of the issues on computer security and how to make the world a better place. 


This time at the DEF CON hacking convention in Las Vegas, 30 ballot boxes running on software used in American elections was set up in a simulated public White House race and hackers got to work actually tearing the gear apart to find out what was hidden inside.

In less than 90 minutes, the opening cracks in the systems’ defenses began resembling, revealing an embarrassingly low level of security. Then one was completely hacked wirelessly.

“Without issue, US voting systems are vulnerable and susceptible. Thanks to the participation of the hacker association today, we’ve revealed even more concerning exactly how,” said Jake Braun, who sold DEF CON originator Jeff Moss on the plan earlier this year.

“The scary point is we also understand that our foreign adversaries including Russia, North Korea, Iran maintain the abilities to hack them too, in the manner undermining systems of democracy and endangering US national security.”

The devices from Diebold to Sequoia and Winvote equipment were purchased on eBay or from government disposals, and an examination of them at the DEF CON Voting Village exposed a sorry state of affairs. Some were operating very outdated and exploitable software such as unpatched apps of OpenSSL and Windows XP and CE. Some had real ports open that could be managed to install wicked software to tamper with votes.

It’s one person to really nobble a box in presence of you, which isn’t difficult for election administrators to spot and stop. It’s different to do it in the air from a mile. Apparently, some of the boxes included inadequately secured Wi-Fi connectivity. A WinVote method used in former county elections was, it seems, hacked via Wi-Fi and the MS03-026 vulnerability in WinXP, allowing info sec academic Carsten Schurmann to enter the machine from his laptop using RDP. Another method could be possibly cracked remotely via OpenSSL bug CVE-2011-4109, it is claimed.

Source: Latest Hacking News

WhatsApp Scam Steals Users' Banking Information!

WhatsApp users are being warned about a new scam.


Criminals have started sending out messages designed to trick you into sharing your banking details.


While this type of ploy is nothing new, Action Fraud has described it as “clever”, and believes it could successfully dupe long-term users of the messaging app.


“Our records indicate that your WhatsApp trial service is exceeding the one-year period,” the fraudulent message reads.


“At the completion of your trial period your WhatsApp will no longer be able to send or receive message [sic]. To continue using WhatsApp without interuption [sic], we need you to subscribe for any of our subscription periods.”


It then encourages you to click on a link to “the customer portal”, where it claims you’ll need to “sign in” using your number.


WhatsApp used to charge a small subscription fee. However, it was scrapped several years ago, when the company was bought by Facebook in 2014.


You absolutely should not open any of the links in the message.


“Whilst late adopters of the service might look at the email below and simply brush it off, long term users will remember paying and could quite easily think the app has gone back to its subscription model and get caught out,” said Action Fraud.


According to the organisation, it has been receiving an increasing number of reports about such messages.


If you do receive such a message, you should block the sender, so they can no longer message or call you through WhatsApp.


Just open the conversation and hit Block. You can also report the user as Spam from here.

Head over to the source link for more info >>>


Source  INDEPENDENT.UK 


China Planning to Launch A Non-hackable Internet Application


China is pioneering a new system in technology that will make messages sent via messaging applications unhackable and free from eavesdropper. 



In using an unencrypted instant messaging applications messages sent can be easily intercepted and otherwise private information becomes public when released by the attacker. But using platforms like BBM and Telegram which make use of encryption, security flaws against message integrity is averted. But that does not guarantee full proof protection from eavesdropper and hackers. The process of encryption requires the use of a key - private or public key depending on the technology used.
The process of hiding the key requires to read the information in a very complex mathematical problem. The difficulty in mathematics requires that you need to think very fast in order to figure it out using different numeric keys from different organization which provides solutions for encryption. in 2017 that means you need to get a very powerful computer.

According to Agent Smith of Latest HackingNews "Steady increases in processor power mean that the number-based keys have to be increased periodically. Encryption has a shallow life and is rapidly growing more vulnerable.
There are also concerns that the growth of quantum computers, which definitely represent a huge step difference in number crunching ability, will render much of modern encryption software vulnerable."
the chinese project in the city of Jinan is pioneering a quantum computing system to make all these a slap on the wrist. with this application data can be sent in a more robust security encryption system that cannot be hacked creating a secure internet.
In the Jinan system, any 200 users of the military, government, banking and electricity sectors will be capable of sending messages safe in the information that only they are reading them.

China’s potential in quantum communication suggests the nation is catching huge strides improving applications that sway make the increasingly exposed internet more secure. Applications that other nations soon force find themselves buying from China.

Organisations must empower IT staff to mitigate cyber threats - Bitdefender

Written by Aisha McLean for ZDNET





With the WannaCry ransomware and Petya malware attack recently causing damage to organisations worldwide, even halting chocolate production at Cadbury's Hobart factory, security firm Bitdefener has urged organisations to assist IT teams in preparing for, and mitigating against, future attacks.

According to Bogdan Botezatu, senior e-threat analyst at Bitdefender, organisations need to have mitigation in mind as it's a matter of when an attack happens, not if.

Speaking with ZDNet while visiting Sydney from Romania, Botezatu said organisations first need to understand what type of security they need and not overlook any aspect, while also trying to see through the noise, such as marketing buzzwords and an over-saturated cybersecurity industry.

"An enterprise has a diverse range of technologies ... all these are potential threats," he explained. "It's no use for you to have the best end-point security solution if your payment processor in the cloud is left open."
Botezatu said a standard IT team finds itself constantly under fire, and it's important that the responsibility doesn't just lie with them.

"They have external attacks, they have users inside who need technical support -- the IT team needs to always be on the lookout to help non-tech savvy departments ensure they don't shoot themselves in the foot by opening [an executable] promising kittens," he explained.

"They don't have time to monitor 60 security solutions ... because everything is on fire around them and their time needs to go to good use."
With organisations, particularly in Australia, relying heavily on cloud-centric applications, it results in most of an organisation lying outside of the physical boundaries of the HQ. As a result, Botezatu said many organisations are running security solutions built for on-premises protection, noting the solutions don't translate well into the virtualised world.

Despite claims that some organisations have employed services from over 80 security vendors, Botezatu said the majority of attacks start with some form of social engineering targeting an organisation's employees.

To Botezatu, education is an organisation's greatest defence mechanism.

"You need to encourage the user to adopt security best practices and to stay aware about what they're allowed to do with company property," he explained, noting it's better to speak with them in order to prevent, rather than to punish.

"This is probably the most basic security measure ... make them understand what you're trying to achieve."

Botezatu said that while educating the people within an organisation is free, in many organisations, the sentiment is falling on deaf ears.

"That's one of the issues with the industry, that most of the IT workforce is mobilised to plugging phones into the infrastructure rather than getting some coffee time with people to understand what they are trying to protect the organisation against," he said.

"Very few people would hazard to do stupid stuff on company resources if they knew they were harming the company, with the exception of disgruntled employees.

"People will lend you a helping hand to protect your organisation if you told them your organisation needs protecting, but usually, the IT guy comes among the masses saying, 'hey guys, you know nothing about security, you need to do that, that, and that -- otherwise I'm suspending you'."

He said as an employee, individuals need to be a part of the cybersecurity effort, not trying to outsmart the IT guy who has disallowed access to Facebook.

"I'm still waiting for when the CIO will have a solid place at the board table," he added. "It's not happening and the finance department is pulling all the strings."

Although estimations suggest an organisation should be spending 20 percent of its yearly revenue on cybersecurity-related initiatives or products, Botezatu said it's rarely the case.

It's a trend experienced globally, he added, especially in the public sector where the lowest bid always wins.


Source ZDNET

Types Of Attacks AND How They Can Be Prevented

Written by Ejueyitchie T. Godswill








Today hacking has become one of the "get money quick" methods for people without jobs or people with little or no experience in hacking. Information is easily acquired this days if you know the right source.   Anyone can easily go online and learn one or two things that can help them in hacking after all.
This is causing a lot of challenges for system administrators and security experts.   Securing a network infrastructure can be sometimes tedious and our focus shouldn't just lie in fighting attackers on the cloud alone. Hackers have various means of getting to your networks, so in order for you to be safe you have to make sure you are secured in all fronts. i am going to be listing the basic ways hackers can use to get access to your company's network(s).

PHYSICAL ATTACK

As the name connotes this is a form of attack where attackers  get acces to your physical network infrastructures and perform whatever is it they want to achieve. this ranges from Data theft from a specific host or from your internal server to a Malware implant either to cause a system breakdown or for remote access that the hackers can use to gain access to your system anytime they want to.
In the series Quantico Season 2, Alex Parish and Nathalie Vasquez broke into the FBI server room by triggering bomb scare alert after using social engineering to get both Ryan Boot's Access card and FBI's head  fingerprint. This a perfect example of a physical attack.

       How to prevent physical attack?

Access Control List

in order to be safe from intrusion, an organisation must implement access list for employees working in such organisation or business location. this aid the control of who enters and the time of access to a given facility. in doing this a record is kept of people entering and going out. This also help to prevent unauthorized access to the given facility or organization. In a computerized environment, biometrics solutions like fingerprint, iris or eye scanner can be used for access. Adding multi-factor level of authentication is a more robust way of implementing security. In addition to biometrics, access cards can be given to employees for easy access. But a security personnel must always be available to monitor the validity of users with cards to prevent a stolen access card from  being used.





Fencing

Perimeter security, whether physical or technological, is the first line of defense in your security model. In the case of a physical security issue, the intent is to prevent unauthorized access to resources inside a building or facility. this can be achieved with proper fencing of company's perimeter. In addition, motion detectors & electric fencing also beef up security and prevent intruders from accessing your perimeter.

Few security systems can be implemented that don’t have weaknesses or vulnerabilities.
A determined intruder can, with patience, overcome most security systems. The task may not be easy, and it may require careful planning and study; however, a determined adversary can usually figure out a way. This is why deterrence is so important.
If you want to deter intruders from breaking into your building, you can install
improved door locks, coded alarm systems, and magnetic contacts on doors and windows (Sybex, Security + study guide. 2014).

Remember that you can’t always keep an intruder out of your building; however, you can
make an intrusion riskier and more likely to be discovered if it happens.





Mantraps

As seen in most banks today in Nigeria and other parts of the world, Mantraps is another addition to physical security where access to a facility are controlled and limits are set to one or two persons at a time. A properly developed mantrap includes bulletproof glass, high-strength doors, and locks. After a person is inside the facility, additional security and authentication may be required for further entrance.

Video Surveillance

In high-security and military environments, an armed guard as well as video surveillance
would be placed at the mantrap. Beyond mantraps, you can combine guards with cameras (or even the threat of cameras) to create a potent deterrent. The cameras can send signals to a room where they are monitored by a guard capable of responding to a situation when the need arises.





CCTV is an effective system for video surveillance in an organization. Apart from using it around the perimeter, In-office usage is also important for activities to be monitored around the organisation.  CCTV can be used in supermarkets, stores, warehouses,at homes etc.



 To be continued.........


Social Engineering (Part 3) - The Tendency To Trust Others

In his book, The Art of Deception, Kevin Mitnick describes a fatal flaw that most people share: A tendency to have trust and faith in each other. we all want to trust and be trusted - trusting someone can sometimes mean giving a part of you to them.




This blind trust in others has resulted in thousands of people doling out personal information, large amounts, and cooperate data to random strangers. It's like a bad relationship where you have complete trust in someone but they still go at your back cheating on you or taking advantage of your trust.

A perfect example can be seen in victims believing stories as ridiculous as a Nigerian prince that needs to enlist the help of a random stranger to transfer vast amounts of money out of his own country.

While it is possible that the popularization of the Internet has hardened our defenses against such obvious attempts at social engineering such as advance fee fraud perpetuated by “Nigerian prince”, this has not changed the fact that we are still very vulnerable to well-crafted social engineering attacks.



In fact, as security administrators hold up obvious cases of social engineering in their organization’s awareness campaigns, they unfortunately reinforce a tragic misconception that the average person possesses: that they are too smart to be deceived. The result is that the person has an inflated sense of security and will be easily exploited by social engineers that are discreet enough to only make reasonable requests that will draw no suspicion until it is too late.

A well thought campaign must create the awareness that no matter how smart you are, someone is out there to outsmart you, hence the need to always be on the look-out and sharp in carrying out daily activities.

A New Smartphone Virus That’s Disguised As WhatsApp Secretly Monitors, Films You And Keeps Copies Of Your Video And Voice Calls!

A spooky new virus that films and record smartphone owners activities while in use is spreading across the world – and its possible you might be infected.



The malware is called "GhostCtrl" and often disguises itself as popular apps like WhatsApp, facebook messenger, instagram, and pokemon Go. when you download and install the fake app - which looks exactly like the real deal, a backdoor is inadvertently installed on the your phone.

This grants hackers access to the camera, mic, web browser history and searches and lets them intercept text messages being sent to you. This is like taking full control of your mobile phone without you even noticing - they monitor every activity you do on the phone remotely.
They can also secretly record voice or audio and upload it to their computer servers.
A version of GhostCtrl was used in a large-scale attack which recently targeted Israeli hospitals.

The digital assault used a “worm” called RETADUP to steal information from desktop PCs, but it appears that hackers have used similar code to create an Android bug that could spread worldwide.

In other to be safe from such malware it is advisable you download apps only from google play store and apple store.

Please don't forget to click the subscribe button to get latest updates on security news.

Two Platforms Offering Cybercrime-as-a-Service To Upcoming Hackers






This Article was written by Swati Khandelwal  from The Hackers News

Cybercrime has continued to evolve and today exists in a highly organised form.

Cybercrime has increasingly been commercialised, and itself become big business by renting out an expanded range of hacking tools and technologies, from exploit kits to ransomware, to help anyone build threats and launch attacks.

In past few years, we have witnessed the increase in the popularity of malware-as-a-service (MaaS), which is today a prosperous business on the underground black market that offers an array of services, including ransomware-as-a-serviceDDoS-as-a-service, phishing-as-a-service, and much more.

Two such services have recently been spotted by two separate group of researchers, which we have detailed in this article.






1. Ovidliy Stealer - $7 Password stealing malware for everyone

A new credential stealing malware that targets primarily web browsers is being marketed at Russian-speaking web forums for as cheap as $7, allowing anyone with even little technical knowledge to hack as many computers as they want.

Dubbed Ovidliy Stealer , the malware was initially appeared just last month but is being regularly updated by its Russian-speaking authors and actively adopted by cyber criminals.

2. HackshitThe Phishing Tool

Another crimeware-as-a-service uncovered by researchers from Netskope Threat Research Labs detailed a Phishing-as-a-Service (PhaaS) platform that offers low cost, "automated solution for the beginner scammers," allowing them to trick people into handing over their credentials.

Dubbed Hackshit, the PhaaS platform attracts new subscribers by offering them free trial accounts to review their limited set of hacking tutorials and tricks to make easy money.






For more details head over to the source link >>>
The Hacker News 


Ovidiy Stealer - The New Password Stealing Malware

A new worrisome malware is in town! The malware which is designed to steal victims credentials such as passwords is now on sale by a Russian hacker. The malware which is available for as little as $7, providing wannabes with a worryingly easy entry point into the world of cybercrime.

Ovidiy Stealer is regularly updated by its Russian-speaking authors and the malware has hit targets around the world including the UK, the Netherlands, India, and Russia. Despite its low price the malware is designed to avoid analysis and detection. This a worrisome feature for small, medium and big organizations - How can you fight what you don't know?.

Discovered by guys from proofpoint, the malware is spread via a number of methods, including malicious email attachments, file-hosting websites, and even within software packages. This is a perfect malware for "Yahoo Boys" in Nigeria to operate with, as it features some of their attack Vectors.

It comes with functionality to target multiple applications, but buyers are able to purchase a version of the malware which only focuses on a single browser if they so wish.

If the malware is able to find passwords in its targeted applications, it will send them to the gang using it, putting the victim and their organisation at risk of compromise, especially if the same password is used across multiple accounts. In simple term, if the malware finds it's way to your PC, every website you have accessed being banks or your social media accounts, the login password credentials will be automatically sent to the attackers! That's trouble enough to be afraid of.

Payment for the malware is taken by RoboKassa, the Russian equivalent of PayPal.

For more details on Ovidiy Stealer head over to ZDNET 


Meet The Nigerian CEO Of Reach Robotics & Builder Of World’s First Gaming Robots - Silas Adekunle


Silas Adekunle told his alma mater he got the idea to build the robots while studying there, teaching maths and science in local schools on the university’s partnership scheme. and noticed how unpopular science, technology is.


He noticed the students didn’t really like studying science, technology, engineering, and maths (STEM) subjects. Many schoolchildren didn’t plan on pursuing careers in these areas. So he decided to try and bring them on board by teaching robotics.


Silas Adekunle told his alma mater he got the idea to build the robots while studying there, teaching maths and science in local schools on the university’s partnership scheme. and noticed how unpopular science, technology is.


He noticed the students didn’t really like studying science, technology, engineering, and maths (STEM) subjects. Many schoolchildren didn’t plan on pursuing careers in these areas. So he decided to try and bring them on board by teaching robotics.


“Robotics ties in many aspects of STEM, and who doesn’t like robots?” he said.


Source:  lunbeynija 


Android Malware Alert - Why You Need To Upgrade To Android 7.1









Recently, google released an upgrade to Android 7.1 Nougat. Addition to the upgrade include a great new feature that will protect users from the threat of malware hidden away in one of their apps.

The latest version of Android contains a secret ‘panic mode’ that kicks in if malicious software tries to lock a user’s screen without permission. The feature, called “panic detection”, looks for multiple presses of the back button. If the phone record four consecutive button presses in a row, it automatically overrides whatever is on the screen and returns a user to the home screen.


(adsbygoogle = window.adsbygoogle || []).push({});

The feature was  introduced as some malware apps are capable of disabling the back button and other buttons. If you realise something is wrong with your phone, you might start panicking and furiously pressing the back button to see if your Android phone responds. That’s when the Google failsafe will kick in - Android 7.1 Nougat would realise your back button isn’t behaving normally. Then override whatever that is causing the issue. Google kept this feature a secret as they don’t want hackers to find out, but it was discovered by some XDA Developers.

After google released android 7.1 updates not all OEMs have updated their devices. The list of mobile phones getting Android 7.1 Nougat ( some devices like Pixel X & XL already got the update) update are:

  • Google Pixel
  • Google Pixel XL
  • Nexus 5X
  • Huawei Nexus 6P
  • LG V20
  • Samsung Galaxy Note 7
  • Samsung Galaxy Note 7 Duos
  • Samsung Galaxy S8
  • Samsung Galaxy S8 Plus
  • Samsung Galaxy S7
  • Samsung Galaxy S7 Edge
  • Samsung Galaxy S7 Active
  • Samsung Galaxy Note 5
  • HTC 10
  • LG G5
  • LG G6
  • General Mobile GM 5







Source: UK Express 

Social Engineering (Part 2) - The desire to be helpful to others



One of the most popular targets for social engineers is an organization’s customer care representative that provide information and support to external customers because they tend to be easily accessible to an attacker. This can also take place in a social sphere where the attacker presents itself as a vulnerable person in need of help. On the process vital information could be divulged from the target that will be helpful in carrying out the attack. While companies typically attempt to train these employees to guard confidential information and access to the company’s systems by providing detailed conversation scripts, social engineers have found that these employees are easy to manipulate. As a follow up to Part One  of this series, hackers carry out a thorough recon on any of their targets before exploit.
 .........A clouded mind is quite easy to be socially engineered.
Customer care representatives spend every day continually helping a never-ending line of customers and psychological research has shown that it is incredibly difficult in this situation to question the validity of every interaction. Instead the employee will try every means possible to resolve whatever issue the customer is facing even if it deviates from policy put in place to prevent social engineering.



For example a social engineer could take advantage of this by feigning a poor ability to communicate in English using igbo in hopes that a call center employee will circumvent the policy in place to better assist the troubled “customer”. If successful, the social engineer may be able to bypass security questions put in place to verify the caller’s identity.

The first step in preventing attacks such as this, is to reduce the workload of customer care representatives by getting more people to do the job - a clouded mind is quite easy to be socially engineered.The next step is providing quarterly training and bulletins on social engineering attacks to keep employees abreast with modern techniques employed by hackers.

Kindly leave a comment below and don't forget to share!


Social Engineering - I Love You With Hidden Agenda

We have heard so much about hacking of systems, accounts, organizations and so many other situations caused by a breach in security infrastructures. 


In response to this threat, companies around the world are projected to invest over 150 billion dollars on IT security projects in 2017 in an attempt to protect their businesses.So why, despite these large investments, do we often constantly see large companies with strong IT systems suffer from service disruptions and leaked information? the answer lies in the persuasiveness of Social Engineering! According to Kevin Mitnick, described by the US government as one of the most dangerous hacker in the world, the cause of this could be because “it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system” (Alvin Cheung ACC 626).



Social Engineering, according to Mitnick, is the use of influence and persuasion to deceive people into divulging information. in the past we have heard so much of the infamous Nigerian prince as used by some fraudulent Nigerians called "yahoo yahoo". the secret is to be your friend, socialize with you and make you comfortable with them. Once they win your trust the exploit begins. This is the method these guys have been using against foreign folks for years. Taking advantage of the vulnerable old widow or the vulnerable young woman who just had a broken relationship or the want to get rich quick young man. In most cases they act like they are from other countries other than Nigeria. and yes identity theft is one major tactic they use in achieving this.




Another dangerous aspect of social engineering is taking advantage of company's employees, socializing with the sole hidden purpose of getting information or password that might allow this attackers or hackers get access to the target organization, either physically or remotely via the internet, compromising the security infrastructures in place. once they are in all sorts of activities from financial theft to propriety theft to important information that might be used to blackmail such organizations. in other to prevent all these from happening it is advisable that organization conduct ICT training from time to time, enlightening them on some of these methods used by hackers and for them to report any questionable activities they might encounter while carrying out their daily job activities. Ignorance is a weakness knowledge is strength!


Minimizing Data Consumption On Your Windows PC - Just like you are using your mobile phone





 Imagine wanting to browse on your PC to experience that complete web experience but hell yeah like me you don't  have enough  data left on your mobile  line. Today i will be showing you how to minimize data consumption on your PC when sharing your mobile internet data.






Step 1 (Disable unused services)

well, what are using using your PC for if not to use internet explorer or chrome or Firefox. it will surprise to you to know that those apps consume less data compared to other background services that run on your PC.






So we are going to disable every other services & apps that is not needed  except your antivirus! - of course you know i'm an advocate of cyber security!

Go to Control Panel => security and maintenance => windows firewall, then look at the left pane you will find
"Allow an app or a feature through windows firewall".






click on it, but before you do make sure your windows firewall is turned on. Double click on 'change settings'  then tick off every apps & services seen under 'Name' while leaving Chrome.exe, Google chrome, Firefox, your installed antivirus and its services, core networking, delivery optimization, internet connection sharing, Microsoft WiFi, network discovery, Windows defender security center, Windows firewall management, wireless display, wireless portable devices, and WLAN Service(both).






Do all that and enjoy minimum data consumption just like you are using your phone!

Step 2 (THE END)
please don't forget to click share...😉


Petya Ransomeware - The new trouble in town!

A massive cyberattack swept across computer networking systems worldwide this week, spanning across Europe, the Middle East, and the United States and affecting a variety of companies, from banking institutions to airlines to hospitals. The breach comes just weeks after the WannaCry Attack that hit at least 150 countries. The global Petya virus has “significantly affected” the worldwide operations of TNT Express, a subsidiary of FedEx that’s based in the Netherlands. Both the domestic and international shipping.

The virus that began spreading through European computer systems yesterday informed users that they could unlock their machines by paying a $300 ransom. But it looks like the program’s creators had no intentions of restoring the machines at all. In fact, a new analysis reveals they couldn't; the virus was designed to wipe computers outright.

Matt Suiche, founder of the cybersecurity firm Comae, writes in a blog post today that after analyzing the virus, known as Petya, his team determined that it was a “wiper,” not ransomware. “We can see the current version of Petya clearly got rewritten to be a wiper and not a actual ransomware,” Suiche writes.


The virus going around is a modified take on an earlier version of the Petya virus that was true ransomware. But Comae saw that code had been specifically modified to change it from a virus that encrypts a disk and demands a ransom into a virus that simply destroys the disk.


So then why purport to be ransomware? There’s no way to say for certain right now, but Suiche believes it was about hiding who was really behind the attack. “We believe the ransomware was in fact a lure to control the media narrative,” he writes, saying that ransomware suggests “some mysterious hacker group” being behind the virus “rather than a national state.”


That’s still speculation for now, but the virus did appear to primarily target Ukrainian infrastructure, including an electricity supplier, the central bank, the state telecom, and an airport. Analysis from Kaspersky Lab yesterday showed the virus remaining primarily in Ukraine.

This is call for companies in Africa and Nigeria especially, to start installing Various security patches on  systems including the one in Microsoft’s MS17-010 bulletin. Also Antivirus and Anti-malware softwares need to be updated regularly to fight against such attacks.


Intel Tiger Lake CPUs to come with Anti-Malware Protection

Intel’s Tiger Lake CPUs will come with Control-flow Enforcement Technology (CET), aimed at battling common control-flow hijacking attacks. I...