Recent Posts

Pages: [1] 2 3 ... 10
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by Shmu26 on Today at 12:16:45 pm »
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by Geri123 on Today at 11:56:20 am »
@Shmu26 From memory i also got a prompt every now and then for Windows Defender. But coudn't tell you for sure at which settings it occured. I change between "always on" or "smart" mode and/or "moderate" or "aggressive" quite a lot the past days.
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by Shmu26 on Today at 08:01:21 am »
Hi Guys
I was checking out what is new with VS.
Looks great.
Shortly after installing the latest stable version on Win 10 1803, and setting it to smart mode, I got a prompt for a Windows Defender process. It came with a recommendation that it is safe, but is that normal, to be prompted for Windows Defender?
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by gorblimey on Today at 07:17:28 am »
Although since VS is in pretty good shape now with only a few minor bugs to fix ...

Hi Dan - how are we going with multi-user on current versions?  I remember you writing that we may have to use a separate (older) driver for Win7.

And I would very much like to have a version that doesn't ping helppane and hh :)  4.20 does work reliably, but the help-file blacklist is annoying.
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by VoodooShield on Today at 06:04:45 am »
I assume that with no interaction we are at the end of development. ???
Not at all ;).  Although since VS is in pretty good shape now with only a few minor bugs to fix, there will certainly be less to discuss unless we start adding new features to VS.  I am working on several different things.  One thing I have played around with was having an option for SRP instead of our whitelist snapshot... but I have yet to find an advantage in doing so... but if there is one, please let me know!  I think our current approach is much more granular and user-friendly than having an option like that.  One thing is for sure, we do not want to add features that will only bloat VS and not offer anything useful or significant, but there are certainly new features we can consider adding.

Having said that, please keep in mind... the years we spent developing VS and posting on security forums, it was truly an exciting time for everyone.  But now that VS is built out and almost bug free, there is not as much to discuss.  Security discussions in general have died down significantly since April 2018... who knows, maybe the "golden age" of online security discussions are behind us?

But I am working on several different things.  We now have the only user-friendly patented toggling computer lock, and my focus now is to figure out how to put it on every web connected device ;).  Most security products have come a very long way the last 5 or so years, and honestly, the only thing left to do is to lock the computer when it is at risk ;).  So I will be around... I am just really tied up with several things at the moment.  I hope to catch up soon, thank you guys!
You only get one Mom in your life. Don't take her for granted and definitely don't disrespect or take advantage of her. When you were young, you were her world and everything she did was for you. You may not always see eye to eye on things but just remember, she was just like you once. Love and cherish her. Respect her, listen to her, if she's sick take care of her. Always take care of her regardless!! Buy her a gift without asking. Take her out to eat. Tell her you love her. Remember that she always has your back, too. Moms are not replaceable! Nobody can come close to her. There's no one like her.
There are people who would give anything to have their Mom back in their lives, remember that!

(This statement holds true and its meaning rings loud for all)

BY: Chris Mills @chrisfmills
September 20th, 2018 at 7:14 PM

Apple sees nothing wrong with charging $19 for a single Lightning-to-USB cable and $9 for the privilege of using your headphones with your $1,000 phone, so it’s no real surprise that the trade in fake Apple accessories is rampant. If you’ve ever spent any time on Aliexpress — or in your local bodega — you’ve undoubtedly seen plenty of 3-for-$5 iPhone cables for sale where the Made-for-iPhone sticker is only dubiously attached.

In a new report, USA Today details how the trade in fake Apple accessories not only runs much deeper than you might expect, but also how the accessories can pose a legitimate danger to consumers. Poorly-designed accessories that deal with 120 volts of electricity can lead to a risk of electrocution or fire, experts say, and consumers might be buying them without knowing.

The report digs into a counterfeiting scheme that Apple first sued in 2016, and which settled with the company this past May. According to the report, the products originated in China and Hong Kong, before being imported under the radar to Brooklyn, NY:

full article here:

BY: September 20, 2018  By Pierluigi Paganini

The US State Department confirmed that hackers breached one of its email systems, the attack potentially exposed personal information of some of its employees.

The incident seems to have affected less than 1% of employee inboxes, 600-700 employees out of 69,000 people.

“The Department recently detected activity of concern in its unclassified email system, affecting less than 1 per cent of employee inboxes. Like any large organization with a global presence, we know the Department is a constant target for cyber attacks,”  states the US State Department.

“We have not detected activity of concern in the Department’s classified email system. We determined that certain employees’ personally identifiable information (PII) may have been exposed. We have already notified those employees.”

full article here:

By Ionut Arghire on September 20, 2018

Cybercriminals are targeting the online payroll accounts of employees in a variety of industries to divert funds, the Federal Bureau of Investigation (FBI) warns.

According to an alert from the FBI’s Internet Complaint Center (IC3), numerous such attacks have been already reported, with education, healthcare, and commercial airway transportation being the most impacted industries.

The preferred attack method is phishing, which allows cybercriminals to capture an employee’s login credentials. Armed with this information, the cybercriminals then access the employee’s payroll account and swiftly change their bank account information.

The cyber-thieves also add rules to the employees’ payroll accounts to ensure that they do not receive alerts regarding direct deposit changes. Next, the attackers change direct deposits and redirect them to accounts they control.

full article here:

Author: Tara Seals
September 20, 2018 5:07 pm

The threat actor’s Android-focused cyber-arms package, dubbed Black Rose Lucy, is limited in reach for now, but clearly has global ambitions.

There’s a fresh bloom in the malware-as-a-service garden: Researchers have uncovered a new Russian-speaking threat actor hawking a proprietary cyber-weapon dubbed “Black Rose Lucy.”

The offering is a malware-as-a-service (MaaS) bundle with two parts, consisting of a controlling web interface (which acts as a dashboard and command-and-control server), and malware that targets Android systems. Infected devices are enslaved to a botnet that’s placed at an operator’s disposal, according to analysis from Check Point.

full article here:
Pages: [1] 2 3 ... 10