The purpose of any security solution is to protect the system and inform users about threats. But what if your antivirus utility flags a harmless program as malware, or sounds the alarm during scanning, seemingly for no reason? There’s a name for that: false positive. As independent tests show, our solutions show more ...
rarely cry wolf, but sometimes caution does prevail. If that happens to you, don’t disable protection — it’ll only put your computer at risk. Instead, designate the app as trusted or add it to the exclusions list. If you’re using a Kaspersky solution for home users, here’s what you should know. What’s the difference between trusted applications and adding programs to the exclusions list We want our programs to be easy to use. Therefore, the process for configuring exclusions is the same across our most popular solutions — Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud. But before proceeding to our detailed guide, let’s shed some light on what it is you are about to do. Modern security solutions employ a comprehensive approach to protection, not only checking for malicious items in program code by scanning programs before they run, but also monitoring installed programs for suspicious activity. The reason for such additional checks is that cybercriminals, trying to bypass protection, sometimes begin an attack with otherwise completely harmless apps that later download more dangerous programs onto victims’ computers. Some also create malware that lies low in the system for a long time before wreaking havoc. That’s why our developers separated the settings into two categories: To prevent the antivirus app from blocking a program when you’re trying to run it, make the blocked program a trusted application; To stop the antivirus app from flagging a program during a regular scan, add it as an exclusion. Now, here’s a detailed look at how and where to configure both options in Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud. What to do if the antivirus app blocks a program As a rule, antivirus apps prevent other programs from starting if they see potentially dangerous behavior. If you’re completely sure an app is safe, use exclusions settings to add it to the trusted list: Open Kaspersky Internet Security’s (or Kaspersky Security Cloud’s) settings; Select Threats and Exclusions; Scroll down and click Specify trusted applications; The Trusted applications settings in Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud Specify the path to the program you want to run; Selecting a trusted application Select which program actions the security solution should ignore. The general rule here is simple: the fewer the check marks, the better. We recommend experimenting with enabling and disabling the following three: Do not scan files before opening, Do not monitor application activity, Do not scan encrypted traffic. Well-behaved applications don’t need to interact with the solution interface, so don’t allow it. Permissible options when adding exclusions What to do if the antivirus app flags a program during a scan If a program prompts questions from the antivirus during scanning, or you added it to the trusted list but that didn’t help, you can try creating a scan exclusion. Here’s how to do that: Open Kaspersky Internet Security’s (or Kaspersky Security Cloud’s) settings; Select Threats and Exclusions; Scroll down and click Manage exclusions; Exclusion settings in Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud In the window that opens, click Add; Adding a new exclusion Click Browse…; Select the file you want to add as an exclusion; Choosing the path to the exclusion file and selecting components to ignore Select the components you want ignored during scanning. Start by checking Scan and File Anti-Virus. If that doesn’t help, experiment with the other checkboxes, but don’t select all of them at once. Conclusion Now you know how to customize your antivirus utility so it won’t interfere with your work, but keep in mind that its purpose is to protect your computer. Don’t go wild and overuse the exclusions list or you might let a genuine threat slip through.
It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isn’t entirely clear who should get the report when remote access to an organization’s internal network is being show more ...
sold in the cybercrime underground. In a bid to minimize these scenarios, a growing number of major companies are adopting “Security.txt,” a proposed new Internet standard that helps organizations describe their vulnerability disclosure practices and preferences. An example of a security.txt file. Image: Securitytxt.org. The idea behind Security.txt is straightforward: The organization places a file called security.txt in a predictable place — such as example.com/security.txt, or example.com/.well-known/security.txt. What’s in the security.txt file varies somewhat, but most include links to information about the entity’s vulnerability disclosure policies and a contact email address. The security.txt file made available by USAA, for example, includes links to its bug bounty program; an email address for disclosing security related matters; its public encryption key and vulnerability disclosure policy; and even a link to a page where USAA thanks researchers who have reported important cybersecurity issues. Other security.txt disclosures are less verbose, as in the case of HCA Healthcare, which lists a contact email address, and a link to HCA’s “responsible disclosure” policies. Like USAA and many other organizations that have published security.txt files, HCA Healthcare also includes a link to information about IT security job openings at the company. Having a security.txt file can make it easier for organizations to respond to active security threats. For example, just this morning a trusted source forwarded me the VPN credentials for a major clothing retailer. Finding no security.txt file at the retailer’s site using gotsecuritytxt.com (which checks a domain for the presence of this contact file), KrebsonSecurity sent an alert to its “security@” email address for the retailer’s domain. Many organizations have long unofficially used (if not advertised) the email address security@[companydomain] to accept reports about security incidents or vulnerabilities. Perhaps this particular retailer also did so at one point, however my message was returned with a note saying the email had been blocked. KrebsOnSecurity also sent a message to the retailer’s chief information officer (CIO) — the only person in a C-level position at the retailer who was in my immediate LinkedIn network. I still have no idea if anyone has read it. Although security.txt is not yet an official Internet standard as approved by the Internet Engineering Task Force (IETF), its basic principles have so far been adopted by at least eight percent of the Fortune 100 companies. According to a review of the domain names for the latest Fortune 100 firms via gotsecuritytxt.com, those include Alphabet, Amazon, Facebook, HCA Healthcare, Kroger, Procter & Gamble, USAA and Walmart. There may be another good reason for consolidating security contact and vulnerability reporting information in one, predictable place. Alex Holden, founder of the Milwaukee-based consulting firm Hold Security, said it’s not uncommon for malicious hackers to experience problems getting the attention of the proper people within the very same organization they have just hacked. “In cases of ransom, the bad guys try to contact the company with their demands,” Holden said. “You have no idea how often their messages get caught in filters, get deleted, blocked or ignored.” GET READY TO BE DELUGED So if security.txt is so great, why haven’t more organizations adopted it yet? It seems that setting up a security.txt file tends to invite a rather high volume of spam. Most of these junk emails come from self-appointed penetration testers who — without any invitation to do so — run automated vulnerability discovery tools and then submit the resulting reports in hopes of securing a consulting engagement or a bug bounty fee. This dynamic was a major topic of discussion in these Hacker News threads on security.txt, wherein a number of readers related their experience of being so flooded with low-quality vulnerability scan reports that it became difficult to spot the reports truly worth pursuing further. Edwin “EdOverflow” Foudil, the co-author of the proposed notification standard, acknowledged that junk reports are a major downside for organizations that offer up a security.txt file. “This is actually stated in the specification itself, and it’s incredibly important to highlight that organizations that implement this are going to get flooded,” Foudil told KrebsOnSecurity. “One reason bug bounty programs succeed is that they are basically a glorified spam filter. But regardless of what approach you use, you’re going to get inundated with these crappy, sub-par reports.” Often these sub-par vulnerability reports come from individuals who have scanned the entire Internet for one or two security vulnerabilities, and then attempted to contact all vulnerable organizations at once in some semi-automated fashion. Happily, Foudil said, many of these nuisance reports can be ignored or grouped by creating filters that look for messages containing keywords commonly found in automated vulnerability scans. Foudil said despite the spam challenges, he’s heard tremendous feedback from a number of universities that have implemented security.txt. “It’s been an incredible success with universities, which tend to have lots of older, legacy systems,” he said. “In that context, we’ve seen a ton of valuable reports.” Foudil says he’s delighted that eight of the Fortune 100 firms have already implemented security.txt, even though it has not yet been approved as an IETF standard. When and if security.txt is approved, he hopes to spend more time promoting its benefits. “I’m not trying to make money off this thing, which came about after chatting with quite a few people at DEFCON [the annual security conference in Las Vegas] who were struggling to report security issues to vendors,” Foudil said. “The main reason I don’t go out of my way to promote it now is because it’s not yet an official standard.” Has your organization considered or implemented security.txt? Why or why not? Sound off in the comments below.
Telegram has exploded as a hub for cybercriminals looking to buy, sell, and share stolen data and hacking tools, new research shows, as the messaging app emerges as an alternative to the dark web.
The Seventh Inferno vulnerability received a CVSS score of 9.8, it was spotted with other two bugs, respectively tracked as Demon’s Cries (CVSS score: 9.8) and Draconian Fear (CVSS score: 7.8).
The U.S. Department of Transportation (USDOT) was impersonated in a phishing campaign that went on for two days. The campaign leveraged a variety of tactics to evade detection. IT systems at South Africa’s Department of Justice were encrypted by a ransomware attack. The attack encrypted all information systems and rendered them unavailable internally as well as to the public.
Long-term cyberespionage operations and covert information heists are two characteristics often associated with China-backed threat actors. Experts believe that the threat actor is linked to Beijing.
In one of its first acts, Groove publicly leaked a set of nearly 500,000 VPN credentials on a new hacker forum named RAMP. The credentials were associated with some 87,000 Fortinet FortiGate SSL-VPN devices.
SSID Stripping is a method that malicious attackers could use to fool users into connecting to fake Wireless Access Points (WAPs). It affects devices running macOS, iOS, Ubuntu, Windows, and Android.
Researchers found several apps that exposed their payment integration key ID and key secret. This is not a flaw in Razorpay but rather how app developers are mishandling their APIs.
Ransomware remains primary threat in the first half of the year. Working with third parties to gain access to targeted networks, they used APT tools and techniques to steal and encrypt victims’ data.
CrowdStrike Intelligence tracked the DarkOxide threat activity cluster which launched attack campaigns against organizations within the Asia Pacific (APAC) semiconductor industry.
Google on Friday said it's bringing an Android 11 feature that auto-resets permissions granted to apps that haven't been used in months, to devices running Android versions 6 and above.
“Beginning in 2012, Fahd, 35, conspired with others to recruit AT&T employees at a call centre located in Bothell, Washington, to unlock large numbers of cellular phones for profit,” said the DOJ.
While most cryptocurrency scams target social media users, scammers are now using phishing email spam to promote a new "Elon Musk Club" or "Elon Musk Mutual Aid Fund" giveaway.
It was found that 32-year old Matthew Gatrel of St. Charles, Illinois allowed users to launch more than 200,000 DDoS attacks through paid services for which he may face 35-years in prison.
While these bugs have been or still are exploited by one ransomware group or another in past and ongoing attacks, the list has also been expanded to include actively exploited flaws.
Over 5,000 current and former NEISD employees received a letter from the district saying their payroll information, including names and social security numbers, was at risk of being compromised.
The suspects defrauded hundreds of victims through phishing attacks and other types of online fraud before laundering the money through a wide network of money mules and shell companies.
The new strategy of the Victoria government is based on three core missions of improving the delivery of government services, creating a cyber safe place, and creating a 'vibrant' cyber economy.
The French containerline told customers today that it had suffered a leak of data on limited customer information involving first and last names, employer, position, email address, and phone number.
The $130 million funding round was led by HPS Investment Partners and PNC Bank, and comes more than three years after Saviynt raised $40 million of Series A financing led by Carrick Capital Partners.
The US government is reportedly set to announce new measures, including sanctions to deter cryptocurrency businesses from getting involved in laundering and facilitating ransomware payments.
Private information including identity, handle, address, cellphone quantity, email, date of beginning, receipt and encrypted password, and encrypted checking account quantity seem to have been stolen.
A recent study claims that an unnoticed threat—dangling DNS records—could be easily used for domain hijacking. According to the study, there are multiple types of dangling DNS records and several techniques to exploit them.
Fidus Information Security, a UK penetration testing consultancy, has published details of the flaw nearly two years after first alerting Virgin Media, a British telecom company.
As customers configured their VoIP equipment to connect to the company's domain name, the DDoS attack disrupted telephony services, preventing them from receiving or making phone calls.
A zero-click vulnerability in a popular IoT security camera could allow an unauthenticated attacker to gain full access to the device and possibly internal networks, a researcher has warned.
Publicly exposed data included full names, emails, company names and registrant’s position, phone numbers, and questionnaire feedback. The data was discovered using the Grayhat Warfare search engine.
Researchers highlighted a new phishing email campaign, involving a new Dridex variant, that uses a specially crafted Excel document as an attachment. The Excel document in the email contains a message at the top of the document in bold letters urging them to enable macros. Victims opening attachments despite threat warning shows organizations’ lethargic approach toward security and a lack of employee training.
Government departments in at least seven countries in the Asia-Pacific and the EMEA regions have been targeted in a phishing campaign that has been ongoing since spring 2020.
Apple has released a security patch update for its range of devices in the wake of a vulnerability exploited by invasive spyware built by NSO Group. The first flaw, tracked as CVE-2021-30860, which is an integer overflow discovered by Citizen Lab. The second flaw (CVE-2021-30858) is a use-after-free bug that was disclosed by an anonymous researcher.
Voting was suspended just two hours after it started -- with "masses of voters" already casting ballots -- after a system crash with organizers suspecting a cyber attack.
Red Hat Security Advisory 2021-3559-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a code execution vulnerability.
This article discusses the CVE-2021-40444 vulnerability and an alternative path that reduces the lines of JS code to trigger the issue and does not require CAB archives.
BSides SF is soliciting papers and presentations for the 2022 annual BSidesSF conference. It will be located at City View at the Metreon in downtown San Francisco February 5th through the 6th, 2022.
Church Management System version 1.0 suffers from a remote SQL injection vulnerability. Original discovery of SQL injection in this version is attributed to Murat Demirci in July of 2021.
ZeroPeril Ltd has discovered two issues inside the amdpsp.sys (v4.13.0.0) kernel driver module that ships with the AMD Chipset Drivers package for multiple AMD chipsets. The first issue is an information disclosure type security vulnerability and the second is a memory leak type bug due to insufficient releasing of show more ...
all associated allocated resources upon request. The researchers have verified both in the latest Revision Number (2.13.27.501) of the package that was released the 4th of February 2021.
Google on Friday said it's bringing an Android 11 feature that auto-resets permissions granted to apps that haven't been used in months, to devices running Android versions 6 and above. The expansion is expected to go live later this year in December 2021 and enabled on Android phones with Google Play services running Android 6.0 (API level 23) or higher, which the company said should cover "
A newly spotted banking trojan has been caught leveraging legitimate platforms like YouTube and Pastebin to store its encrypted, remote configuration and commandeer infected Windows systems, making it the latest to join the long list of malware targeting Latin America (LATAM) after Guildma, Javali, Melcoz, Grandoreiro, Mekotio, Casbaneiro, Amavaldo, Vadokrist, and Janeleiro. The threat actor
Law enforcement agencies in Italy and Spain have dismantled an organized crime group linked to the Italian Mafia that was involved in online fraud, money laundering, drug trafficking, and property crime, netting the gang about €10 million ($11.7 million) in illegal proceeds in just a year. "The suspects defrauded hundreds of victims through phishing attacks and other types of online fraud such
A spam campaign delivering spear-phishing emails aimed at South American organizations has retooled its techniques to include a wide range of commodity remote access trojans (RATs) and geolocation filtering to avoid detection, according to new research. Cybersecurity firm Trend Micro attributed the attacks to an advanced persistent threat (APT) tracked as APT-C-36 (aka Blind Eagle), a suspected
Enterprises that integrate security testing into their CI/CD pipeline fix 91.4 percent of new issues, according to a progress report from ShiftLeft. Recent software supply chain attacks illustrate the growing risks businesses, their partners, and customers face. But a recent report suggests better outcomes for show more ...
those who put security at the heart of app development. Data from […] The post Building a More Secure AppDev Process appeared first on Security Weekly.