20% off When you Pre-Order Tom Clancy’s Ghost Recon Wildlands – (XBOX ONE, PS4) – Deal Alert


Old Windows malware may have tampered with 132 Android apps

More than 130 Android apps on the Google Play store have been found to contain malicious coding, possibly because the developers were using infected computers, according to security researchers.

The 132 apps were found generating hidden iframes, or an HTML document embedded inside a webpage, linking to two domains that have hosted malware, according to security firm Palo Alto Networks.

Google has already removed the apps from its Play store. But what’s interesting is the developers behind the apps probably aren’t to blame for including the malicious code, Palo Alto Networks said in a Wednesday blog post.

To read this article in full or to leave a comment, please click here

PCWorld News

IDG Contributor Network: 94% of Microsoft vulnerabilities can be easily mitigated

If you want to shut out the overwhelming majority of vulnerabilities in Microsoft products, turn off admin rights on the PC.

That’s the conclusion from global endpoint security firm Avecto, which has issued its annual Microsoft Vulnerabilities report. It found that there were 530 Microsoft vulnerabilities reported in 2016, and of these critical vulnerabilities, 94% were found to be mitigated by removing admin rights, up from 85% reported last year.

This is especially true with the browser, for those who still use Microsoft’s browsers. 100% of vulnerabilities impacting both Internet Explorer and Edge could be mitigated by removing admin rights, Avecto reported. One bit of progress is that 109 vulnerabilities impacting IE 6 through 11 were reported in 2016, way down from 238 in the previous year.

To read this article in full or to leave a comment, please click here


Not the kind of multitasking we’re looking for

Pilot fish gets a programming assignment at a federal agency that requires a security clearance — and to his surprise, there’s no “leper colony” for new hires whose clearances haven’t yet come through.

“You were assigned a desk with the group you would be working with, so everyone could get to know one another,” says fish. “They trusted the employees with clearances to not ‘share’ with the guy who didn’t have an agency computer yet.

“They also had an extra unsecured network that everyone could use for browsing the Internet. You could bring in your own laptop, but it had to be tested and certified by the agency to be malware-free. After that, you were welcome to browse cat videos all day until your clearances came through.”

To read this article in full or to leave a comment, please click here