Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to stop, disable ...

 Tips

Most smartphones have an average of around 80 installed apps, of which at least 30% are never used since most are forgotten about. But such ballast is harmful: theres less free space on the device; potential bugs and compatibility issues multiply; and even unused apps at times distract you with pointless alerts. To   show more ...

make things worse, abandoned apps can continue collecting data about the phone and its owner and feed it to advertising firms, or simply gobble up mobile data. Hopefully, weve already convinced you to debloat your smartphone at least a couple of times a year and uninstall apps you havent used for ages — not forgetting to cancel any paid subscriptions to them! But, unfortunately, some apps are vendor-protected against uninstallation, and so arent all that easy to jettison. Thankfully, there are some ways to get round this problem… Uninstall the app Sometimes you cant find an unwanted app under the Manage apps & device tab of the Google Play app. First, try to remove it through the phone settings: look there for the Apps section. This lists all installed programs and has a search feature to save you from having to scroll through them all. Having found the unwanted app and tapping it, youre taken to the App Info screen. Here you can view the apps mobile data, battery, and storage consumption, and, most importantly, find and tap the Uninstall button. If the button is there and active, the jobs done. List of all installed apps and the App Info screen with the Uninstall button Disable the app If the app was installed on the phone by the vendor, its likely to be non-removable and have no Uninstall button on the App Info screen. That said, its not necessarily linked to the OS or core components of the smartphone — it could be, say, a Facebook client or a proprietary browser. Such apps are often called bloatware since they bloat the phones firmware and the list of standard apps. The easiest way to disable such apps is on the above-mentioned App Info screen; instead of Uninstall, the relevant button will be marked Disable. A disabled app is not much different from an uninstalled one — it vanishes from the set of icons on the startup screen and wont run manually or when the phone boots up. Should you need it later, you can easily turn it back on with a single tap on that same App Info screen. Disabling reduces the risk of data leakage, but does nothing to save storage space — unfortunately, the disabled app continues to take up memory on your phone. If you absolutely have to uninstall it — but theres no Uninstall button — read on! For non-removable apps, instead of an Uninstall button, the App Info screen shows a Disable button Stop the app But what if the Disable button on the App Info screen is grayed out and untappable? For especially important programs, vendors take care to block the disabling option — often for a good reason (theyre vital to the system) — so you need to think very carefully before trying to disable or uninstall such apps manually. Open your favorite search engine and punch in the query exact smartphone model number + exact app name. Most likely youll see Android user forum discussions at the top of the search results. These often give information about whether the given app is safe to disable or whether there could be any side effects. To perform a harmless experiment with an app that cant be disabled, you can use the Force Stop button. This is the second button on that App Info screen and its almost always active — even for apps that cant be disabled. Force Stop simply stops the app temporarily, without attempting to remove or permanently disable it. However, it no longer consumes power or mobile data — and can no longer spy on you. And if your phone continues to work as normal, then perhaps the app isnt that important after all. But stopped apps can start up again when certain events occur or after a phone restart, and stopping them manually each time — moreover regularly — can be troublesome and inconvenient. Fortunately, you can automate this task with the Greenify app. It doesnt require superuser rights to work, but merely automates navigating to the now-familiar App Info screen and tapping the Force Stop button. You simply supply Greenify with a list of unwanted apps and set a Force Stop schedule to, say, twice a day. Other tools offer similar functionality, but Greenifys advantage is its lack of extra features. If the Disable button is inactive, try using Force Stop Freeze or uninstall the app despite its objections If you tested stopping a non-removable app and suffered no negative effects, you might consider freezing it or removing it altogether. Freezing is the same as disabling but is done using different tools. Before delving into the details, note that freezing requires technical skill and the activation of Developer mode on your phone. This mode itself creates certain information security risks by allowing connections to the phone via USB or LAN in special technical modes, plus the ability to view and modify its contents. Although Google has fenced off this functionality with many safeguards (permission requests, additional passwords, and so on), the room for error (thus creating risks) is high. One more thing: before you start tinkering, be sure to create the fullest possible backup of your smartphone data. If all of the above hasnt scared you off, see the guide in the box. Freezing and uninstalling non-removable Android apps in Developer mode Download and install Android SDK Platform-Tools on your computer. Of the tools inside, youll only need the Android Debug Bridge USB driver and the ADB command line. Enable Developer mode on your phone. The details vary slightly from vendor to vendor, but the general recipe is roughly the same: repeatedly tap the Build Number option in the About Phone. Enable USB Debugging under Developer Settings on your smartphone. There are multiple options there — but dont touch any apart from these two! Connect your smartphone to your computer through USB. Allow Debug mode on your phone screen. Test Debug mode by getting a list of all packages (what developers call apps) installed on your phone. To do so, type the following in the ADB command line adb shell pm list packages The response will be a long list of packages installed on the phone, in which you need to find the name of the unwanted app. This might look something like facebook.katana or com.samsung.android.bixby.agent. You can often (but not always) tell which app is which by their names. Freeze (disable) the unwanted app using the ADB command line. To do so, enter the command adb shell pm disable-user --user 0 PACKAGENAME , where PACKAGENAME is the name of the unwanted app package. Different vendors may have different usernames (0 in our example), so check the correct PM command for your smartphone. As before, an online search helps out: phone model + Debloat or phone model + ADB PM. You can use developer commands to not only disable an app but also completely uninstall it. To do so, replace the previous command with adb shell pm uninstall --user 0 PACKAGENAME Restart your phone. The free Universal Android Debloater tool somewhat simplifies all this sorcery. It issues ADB commands automatically, based on the cleaning packages selected from the menu, which are prepared with both the vendor and model in mind. But since this is an open-source app written by enthusiasts, we cant vouch for its efficacy.

image for Cybersecurity is a T ...

 Feed

Enterprise security goes beyond tech leadership, and beyond the CISO's office. Achieving cybersecurity and resilience is a team effort, and requires building a culture of security awareness. 

 Malware and Vulnerabilities

The campaign involves the use of Windows Shortcut files embedded with malicious JavaScript to deliver the components of the trojan, and there are indications that a Chinese-speaking threat actor is behind the attacks based on the samples.

 Malware and Vulnerabilities

The vulnerability arises from the failure to safely sanitize user-supplied extensible stylesheet language transformations (XSLT), enabling attackers to upload malicious XSLT and gain remote access to Splunk Enterprise instances.

 Malware and Vulnerabilities

LogoFAIL is a set of security vulnerabilities that affect the image-parsing components in the UEFI code used by various vendors. These vulnerabilities can be exploited to hijack the booting process and deliver bootkits.

 Security Products & Services

WhatsApp has introduced a new Secret Code feature that allows users to set a custom password to hide and protect their locked chats. The Chat Lock feature automatically conceals locked chat details from notifications.

 Threat Actors

Black Basta has collected over $100 million in ransom payments from over 90 victims since April 2022. High-profile victims targeted by Black Basta include the American Dental Association, Sobeys, Knauf, Yellow Pages Canada, and Rheinmetall.

 Feed

Debian Linux Security Advisory 5569-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

 Feed

Ubuntu Security Notice 6502-4 - Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem discovered that the InfiniBand RDMA driver in the Linux kernel did not properly check for zero-length STAG or MR registration. A remote attacker could possibly use this to execute arbitrary code. Yu Hao discovered   show more ...

that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service.

 Feed

Ubuntu Security Notice 6496-2 - Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem discovered that the InfiniBand RDMA driver in the Linux kernel did not properly check for zero-length STAG or MR registration. A remote attacker could possibly use this to execute arbitrary code. Yu Hao discovered   show more ...

that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service.

 Feed

Ubuntu Security Notice 6495-2 - Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service. Manfred Rudigier discovered that the Intel PCI-Express Gigabit Ethernet driver   show more ...

in the Linux kernel did not properly validate received frames that are larger than the set MTU size, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 6494-2 - Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service. Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not   show more ...

properly validate some attributes passed from userspace. A local attacker could use this to cause a denial of service or possibly expose sensitive information.

 Feed

Red Hat Security Advisory 2023-7616-01 - An update for postgresql is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

 Feed

Zyxel has released patches to address 15 security issues impacting network-attached storage (NAS), firewall, and access point (AP) devices, including three critical flaws that could lead to authentication bypass and command injection. The three vulnerabilities are listed below - CVE-2023-35138 (CVSS score: 9.8) - A command injection vulnerability that could allow an

 Feed

Apple has released software updates for iOS, iPadOS, macOS, and Safari web browser to address two security flaws that it said have come under active exploitation in the wild on older versions of its software. The vulnerabilities, both of which reside in the WebKit web browser engine, are described below - CVE-2023-42916 - An out-of-bounds read issue that could be exploited to

 Feed

The most recent Gcore Radar report and its aftermath have highlighted a dramatic increase in DDoS attacks across multiple industries. At the beginning of 2023, the average strength of attacks reached 800 Gbps, but now, even a peak as high as 1.5+ Tbps is unsurprising. To try and break through Gcore’s defenses, perpetrators made two attempts with two different strategies.

 Feed

Meta-owned WhatsApp has launched a new Secret Code feature to help users protect sensitive conversations with a custom password on the messaging platform. The feature has been described as an "additional way to protect those chats and make them harder to find if someone has access to your phone or you share a phone with someone else." Secret Code builds on another feature

 Feed

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Thursday sanctioned the North Korea-linked adversarial collective known as Kimsuky as well as eight foreign-based agents who are alleged to have facilitated sanctions evasion. The agents, the Treasury said, helped in "revenue generation and missile-related technology procurement that support the DPRK's

 Feed

Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has been observed targeting users in Southeast Asian countries like Indonesia, Thailand, and Vietnam since early September 2023. "Spreading primarily through messaging services, it combines app-based malware with social engineering to defraud banking customers," Oslo-based mobile app

 Feed

The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle the notorious Qakbot malware and botnet. While the operation was successful in disrupting this long-running threat, concerns have arisen as it appears that Qakbot may still pose a danger in a reduced form. This article discusses the aftermath of the takedown, provides mitigation

 Feed

A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets the Uzbekistan Ministry of Foreign Affairs and South Korean users with a remote access trojan called SugarGh0st RAT. The activity, which commenced no later than August 2023, leverages two different infection sequences to deliver the malware, which is a customized variant of Gh0st RAT 

2023-12
Aggregator history
Friday, December 01
FRI
SAT
SUN
MON
TUE
WED
THU
DecemberJanuaryFebruary