Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Viruses & Malware

Baltimore’s Bill for Ransomware: Over $18 Million, So Far

The city of Baltimore had many of its Windows computers infected by Ransomware, a type of malware that threatens to publish the victim’s data or to perpetually block access to it unless a ransom is paid. When a ransomware computer is used, a message similar to the following is displayed on the screen: “The files on this computer have been encrypted. You have 96 hours to submit payment, otherwise your […]

Continue Reading →

State Governments Warned of Malware-Laden CDs Sent Via Snail Mail from China

Brian Krebs is a well-known computer security expert who often writes about security issues in his excellent online column. He recently wrote about a CD-ROM being sent to various U.S. state and local government agencies. The CD reportedly contains several very vicious viruses and other malware (malevolent software) products. The CDs aere sent by old-fashioned snail mail from a return address in China. If you ever receive a CD-ROM disk […]

Continue Reading →

Hackers are Selling Backdoors into Windows PCs for just $10

If you use Windows, you want to know about this problem that apparently has been around for some time. Cyber criminals are offering remote access to IT systems for just $10 via a dark web hacking store — potentially enabling attackers to steal information, disrupt systems, deploy ransomware and more. Some of the products sold for $10 allow access to tens of thousands of compromised systems. Systems advertised for sale […]

Continue Reading →

If You are Using the Stylish Web Browser Extension, Your Private Information is being Collected and Used for Unknown Purposes

Google and Mozilla have ejected the popular Stylish extension from their respective catalogs following a complaint that it collects data about website visits in a way that could be used to identify users. Software engineer Robert Heaton first identified the security issue and warned, “the Stylish browser extension steals all your internet history” and collects enough information to identify individuals from historical web usage. Details may be found in an […]

Continue Reading →

Every Android Device Launched Since 2012 may be Impacted by a RAMpage Vulnerability

Do you have an Android cell phone, tablet, walkie-talkie, or other mobile device? Assuming it was introduced in 2012 or later, it contains a major security bug. The vulnerability, tracked as CVE-2018-9442, is a variation of the Rowhammer attack, a hardware bug in modern memory cards. While the problem is significant, there is no evidence that hackers have ever used it for malicious purposes. Security researchers found the weakness and […]

Continue Reading →

Free Decryption Tool Released for Destructive File-Locking Thanatos Ransomware

Victims of a destructive form of ransomware, which fails to unlock files even if the ransom is paid, can now retrieve their files for free with a new file decryptor released by security researchers. Thanatos ransomware first started targeting Windows systems in February and multiple versions of it have been released in the months since, indicating that those behind it remain an active threat. Details may be found in an […]

Continue Reading →

This new Windows Malware wants to Add your PC to a Botnet – or Worse

If you use Windows, you need to read an article by Danny Palmer in the ZDNet web site at https://zd.net/2yslXCr. It says: A new malware campaign is roping systems into a botnet and providing the attackers with complete control over infected victims, plus the ability to deliver additional payloads, putting the victims’ devices at risk of Trojans, keyloggers, DDoS attacks and other malicious schemes. The malware comes equipped with three […]

Continue Reading →