Antivirus – PJ Magic http://pjmagic.net/ Tue, 09 Aug 2022 04:20:30 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://pjmagic.net/wp-content/uploads/2021/06/icon-1-150x150.png Antivirus – PJ Magic http://pjmagic.net/ 32 32 What is XProtect on Mac? Is it enough to protect your Mac? https://pjmagic.net/what-is-xprotect-on-mac-is-it-enough-to-protect-your-mac/ Tue, 09 Aug 2022 04:20:30 +0000 https://pjmagic.net/what-is-xprotect-on-mac-is-it-enough-to-protect-your-mac/ XProtect, also known as “File Quarantine”, is the built-in anti-malware system for Mac OS operating systems. It’s actually Apple’s analogue of Microsoft’s Windows Defender suite. XProtect is a Mac’s primary defense against infection by malware such as viruses, Trojans, and spyware. How does XProtect work? XProtect is installed on a Mac by default and will […]]]>

XProtect, also known as “File Quarantine”, is the built-in anti-malware system for Mac OS operating systems. It’s actually Apple’s analogue of Microsoft’s Windows Defender suite. XProtect is a Mac’s primary defense against infection by malware such as viruses, Trojans, and spyware.

How does XProtect work?

XProtect is installed on a Mac by default and will also update automatically as part of a set routine. Unlike many other anti-malware programs, XProtect is very light on system resources and runs quietly in the background. A fundamental difference with other programs is that it does not constantly monitor the system (hence why it is light on the processor). Instead, it mainly comes into play only to analyze downloads. When an application initiates a download, XProtect checks the file and compares its contents to known virus definitions. If a potential threat is discovered, the user will be alerted.

Sample alert

Is XProtect secure enough

While Apple has made improvements to XProtect due to the changing threat environment, it’s still meant to offer basic protection – and not much more. Also, since it only focuses on the main types of malware, it arguably overlooks lesser-known grayware such as potentially unwanted programs (PUPs), crypto-mining software, and annoying adware.

That said, it’s also not invincible against traditional malware. Last year, for example, the AdLoad Trojan was reported to slip through XProtect’s defenses and infect Macs. Once a Mac is infected, AdLoad installs a Man-in-The-Middle (MiTM) web proxy to hijack search engine results, and also installs its own malicious LaunchAgents. At the same time, there are other threats capable of bypassing XProtect, such as Shlayer, which allegedly infected more than 10% of all Apple computers.

With the above in mind, it’s abundantly clear that while XProtect is better than no protection, it’s not enough to fully protect your Mac against the backdrop of an ever-changing threat environment.

Introducing Trend Micro Antivirus One

What is XProtect on Mac__Is it enough to keep your Mac safe___2

Trend Micro Antivirus One is the best FREE anti-malware program for your Mac. Developed exclusively by the world’s largest antivirus lab here at Trend Micro, Antivirus One offers live monitoring to protect your Mac 24/7 against viruses, adware, ransomware, spyware and all kinds malware attacks. Additionally, it offers:

  • Privacy Cleaner: Hides your information to prevent others from identifying you, especially after visiting websites.
  • Safe Search: Reports security ratings for each Google search result.
  • Web Threat Protection: Prevents users from visiting phishing websites.

Download it for FREE today on the App Store! As always, we hope this article was an interesting and/or useful read. If yes, please do TO SHARE with your friends and family to help keep the online community informed and safe.

]]>
SC: Right to use Quick Heal Antivirus software not subject to service tax https://pjmagic.net/sc-right-to-use-quick-heal-antivirus-software-not-subject-to-service-tax/ Sat, 06 Aug 2022 03:03:37 +0000 https://pjmagic.net/sc-right-to-use-quick-heal-antivirus-software-not-subject-to-service-tax/ In a relief for antivirus software developers, the Supreme Court ruled on Friday that the right to use Quick Heal Antivirus software would amount to a “deemed sale,” thus not subject to the service tax, as authorities demand. tax. Affirming the Customs Excise Service Tax Appeal Tribunal’s January 2020 judgment that considered Quick Heal Antivirus […]]]>

In a relief for antivirus software developers, the Supreme Court ruled on Friday that the right to use Quick Heal Antivirus software would amount to a “deemed sale,” thus not subject to the service tax, as authorities demand. tax.

Affirming the Customs Excise Service Tax Appeal Tribunal’s January 2020 judgment that considered Quick Heal Antivirus software to be “property” and the transaction that gives the right to use the software would amount to a deemed sale,” a bench consisting of Justices Abhay S Oka and JB Pardiwala said that the artificial separation of the transaction into two parts is not defensible in law.

“It is, in essence, a software sale transaction and once it is accepted that the software placed on the CD is ‘goods’, then there can be no separate service element in the transaction. We say this because even otherwise the user is put in full ownership and control of the software. This amounts to a ‘deemed sale’ which would not attract service tax,” the Supreme Court said.

Also read: Flipkart Wholesale to have an omnichannel approach

The department had appealed the court order which found in favor of Quick Heal Technologies which provided anti-virus software along with license code/product code either online or on replicated CDs/DVDs to end customers in India .

The court held that anti-virus software did not have an element of interactivity and that pre-packaged/boxed software would be treated as a commodity. Once the software is placed on a medium such as a CD and then sold, that software would be treated as a commodity, he said, adding that the Central Board of Excise and Customs guidelines of July 2012 clarified that prepackaged/canned software would not be a commodity. even if there was a license.

The Central Excise Intelligence Branch had requested the assessee to pay a service charge of Rs 62.73 crore on the assessed value of approximately Rs 531 crore on transactions with end customers to provide license codes/keys Quick Heal brand antivirus software in retail. packages between March 2011 and March 2014. While the request had been confirmed by the Deputy Director General (adjudication), the court had canceled it.

Also Read: Costlier Loans Might Not Hurt Credit Demand, Bankers Say

Citing its previous court decisions, the SC judgment stated that the established essential requirement of a transaction for the transfer of the right to use the goods is – it is not the transfer of ownership of the goods, but it is is the right to use the property in the goods; the tax does not apply to the delivery of the used goods, but to the transfer of the right to use the goods, regardless of when or whether the goods are delivered for use, provided that the goods must exist to be used ; and in the operation of transfer of the right to use the goods, the delivery of the goods is not a condition precedent, but the delivery of the goods can be one of the elements of the operation; approvals, concessions, licenses and permits relating to the goods would also be available to the user of the goods, even if such licenses or permits are in the name of the owner (transferor) of the goods, etc.

]]>
Antibacterial and Antivirus Handwashing Market 2022 https://pjmagic.net/antibacterial-and-antivirus-handwashing-market-2022/ Fri, 05 Aug 2022 11:11:27 +0000 https://pjmagic.net/antibacterial-and-antivirus-handwashing-market-2022/ New research published by Market intelligence data on the Antibacterial and anti-virus hand wash Market (COVID 19 version) in various regions to produce a report of more than 250 pages on antibacterial and anti-virus handwashing. This Antibacterial and Antivirus Hand Wash study is a perfect blend of qualitative and quantifiable information highlighting key market developments, […]]]>

New research published by Market intelligence data on the Antibacterial and anti-virus hand wash Market (COVID 19 version) in various regions to produce a report of more than 250 pages on antibacterial and anti-virus handwashing. This Antibacterial and Antivirus Hand Wash study is a perfect blend of qualitative and quantifiable information highlighting key market developments, industry and competitor challenges in the gap analysis, and new opportunities emerging. can be fashionable in the Global Antibacterial and Antivirus Handwashing Market. Some are part of the coverage and are the main and emerging players profiled like Lion Corporation, Walch, Unilever, Procter & Gamble, Amway, Lvsan Chemistry, Medline Industries, Longrich, Bluemoon, 3M, Kami, Shanghai Jahwa, Henkel, L’Occitane, Reckitt Benckiser, Vi-Jon, Kao Corporation, Lonza.

The global Antibacterial and Antivirus Handwash market size is expected to grow at a CAGR of 2% throughout 2022-2029.

Exclusive offer: 30% fixed discount for a limited time

Get Sample PDF Copy of Global Antibacterial and Antivirus Hand Wash Market Report @:

https://www.marketintelligencedata.com/reports/4705340/2022-2029-global-antibacterial-and-antivirus-hand-wash-professional-market-report-production-and-consumption-professional-analysis-impact-of- covid-19/investigation?Mode=Rukaiyya

Global Antibacterial and Antivirus Hand Wash Market development strategy before and after COVID-19, by analysis of company strategy, landscape, type, application and top 20 countries, covers and analyzes the potential of the global antibacterial and anti-virus handwashing industry Antibacterial and Antivirus Hand Wash, providing statistical insights on Market Dynamics, Growth Factors, Major Challenges, PEST Analysis, and Market Entry Strategy Analysis, Opportunities, and Forecast. The biggest strength of the report is to provide companies in the sector with a strategic analysis of the impact of COVID-19. At the same time, this report analyzes the market of the top 20 countries and presents the market potential of these countries.

Antibacterial and anti-virus hand wash KEY BENEFITS

  • The study on the Global Antibacterial and Antivirus Hand Wash Market offers a comprehensive overview of the current market and forecasts by 2022-2029 to help identify emerging business opportunities to capitalize on.
  • The Global Antibacterial and Antivirus Hand Wash Market report provides an in-depth review of the Antibacterial and Antivirus Hand Wash industry dynamics including existing and potential developments to represent consumer pockets of investment.
  • The report provides details regarding major drivers, restraints, and opportunities and their effect on the Antibacterial and Antivirus Hand Wash report.
  • Strategic analysis of industry players and position of the industry in the global Antibacterial and Antivirus Hand Wash Market;
  • The Antibacterial and Antivirus Hand Wash report expands on SWOT analysis and Porter’s five forces model.
  • Examination of the Antibacterial and Antivirus Hand Washer market research value chain gives a good view of the positions of the stakeholders.

Note: Please share your budget by call/mail. We will try to meet your needs on the phone: +1 (704) 266-3234 | +91-750-707-8687 / Email: sales@marketintelligencedata.com

Antibacterial and anti-virus hand wash Quantitative data:

  • Antibacterial and Antivirus Hand Wash Market Data Breakdown by Major Region and Application/End User
  • By growth rate for applications and product types

By type

By app

  • People
  • Industrial
  • Education
  • Office buildings
  • Health care
  • Food handling
  • Other

Get an exclusive discount on this Premium report @

https://www.marketintelligencedata.com/reports/4705340/2022-2029-global-antibacterial-and-antivirus-hand-wash-professional-market-report-production-and-consumption-professional-analysis-impact-of- covid-19?Mode=Rukaiyya

Qualitative Data: Includes factors affecting or influencing market dynamics and growth of the Antibacterial and Antivirus Hand Wash market. To list certain names in related sections

  • Antibacterial and Antivirus Hand Wash Industry Overview
  • Growth Driver of the Global Antibacterial and Antivirus Handwashing Market
  • Global Antibacterial and Antivirus Hand Wash Market Trends
  • Antibacterial and anti-virus hand washing Incarceration
  • Global Antibacterial and Antivirus Handwashing Market Opportunity
  • Entropy of the Antibacterial and Antivirus Handwashing Market** [specially designed to emphasize market aggressiveness]
  • Antibacterial and antivirus hand wash fungal analysis
  • Porter Five Army Model Antibacterial and Antivirus Hand Wash Industry

Research methodology :

Antibacterial and anti-virus hand wash Primary research:

We queried various key sources of supply and demand during primary research to obtain qualitative and quantitative insights related to the Antibacterial and Antivirus Hand Wash report. Major sources of supply include key industry members, subject matter experts from key companies, and consultants from many leading companies and organizations working in the global Antibacterial and Antivirus Handwashing market.

Antibacterial and anti-virus hand wash Secondary research:

A secondary research on Antibacterial and Antivirus Handwashing was carried out to obtain crucial insights into the company’s supply chain, company’s monetary system, global company pools and industry segmentation, with the lowest point, regional area and technology-oriented outlook. Secondary data was collected and analyzed to reach the total Antibacterial and Antivirus Hand Wash market size which the first survey confirmed.

Customization Available For The Following Antibacterial And Antivirus Handwashing Machine Market Regions & Countries: North America, South and Central America, Middle East and Africa, Europe, Asia-Pacific

Buy the report here:

https://www.marketintelligencedata.com/report/purchase/4705340?mode=su?Mode=Rukaiyya

Table of Content of Global Handwashing Antibacterial and Antivirus Market Research Report is:

Section 1: Global Market Review Global Antibacterial and Antivirus Hand Wash Market

  • Antibacterial and anti-virus hand wash
  • Description of Antibacterial and Antivirus Hand Soap
  • Classified Antibacterial and Antivirus Hand Wash
  • Antibacterial and antivirus applications for hand washing
  • Antibacterial and Antivirus Handwashing Facts

Chapter 2: Market Competition by Players/Suppliers

  • Antibacterial and Antivirus Hand Cleaner Manufacturing Cost Structure
  • Hand Washing Antibacterial and Antivirus Raw Material and Suppliers
  • Manufacturing process of antibacterial and anti-virus hand cleaners
  • Industry Chain Structure of Antibacterial and Antivirus Hand Washing

Chapter 3: Sales (Volume) and Revenue (Value) by Region

  • Sale of antibacterial and anti-virus hand cleaners
  • Antibacterial and Antivirus Hand Wash Revenue and Market Share

Chapter 4, 5 and 6: Global Antibacterial and Antivirus Handwashing Market by Type, Application and Players/Suppliers Profile

Continued………

ABOUT US:

Market Intelligence Data is a global leader in the research industry, providing clients with contextual and data-driven research services. The organization helps clients create business plans and achieve long-term success in their respective markets. The industry provides consulting services, market intelligence data research studies, and custom research reports.

Contact us:

Irfan Tamboli (Head of Sales) – MARKET INFORMATION DATA

Phone: +1 (704) 266-3234 | +91-750-707-8687

Mail to: sales@marketintelligencedata.com

]]>
UK antitrust regulator provisionally clears NortonLifeLock’s $8.1bn+ merger with Avast https://pjmagic.net/uk-antitrust-regulator-provisionally-clears-nortonlifelocks-8-1bn-merger-with-avast/ Wed, 03 Aug 2022 18:59:55 +0000 https://pjmagic.net/uk-antitrust-regulator-provisionally-clears-nortonlifelocks-8-1bn-merger-with-avast/ The UK’s antitrust regulator, the Competition and Markets Authority, has provisionally cleared the proposed merger of anti-virus makers NortonLifeLock Inc. and Avast plc. CMA announcement his decision today. The news sent Avast shares up more than 40%, while NortonLifeLock shares rose around 6%. NortonLifeLock, based in Tempe, Arizona, and Avast, based in Prague, both provide […]]]>

The UK’s antitrust regulator, the Competition and Markets Authority, has provisionally cleared the proposed merger of anti-virus makers NortonLifeLock Inc. and Avast plc.

CMA announcement his decision today. The news sent Avast shares up more than 40%, while NortonLifeLock shares rose around 6%.

NortonLifeLock, based in Tempe, Arizona, and Avast, based in Prague, both provide antivirus software for the consumer market. They also offer a variety of other cybersecurity products. Companies provide virtual private network, or VPN, software and tools that make it easy to download updates for programs running on a device.

NortonLifeLock was known as Symantec Corp. until 2019. That year, Symantec sold its enterprise cybersecurity business to Broadcom Inc. in a $10.7 billion deal. The company was later renamed NortonLifeLock and updated its strategy to focus primarily on the consumer market.

NortonLifeLock and Avast announcement their merger plans last August. According to the companies, the deal would value Avast between $8.1 billion and $8.6 billion.

The companies initially sought to complete the acquisition by April. However, the transaction was delayed after the CMA raised antitrust concerns. The regulator launched an investigation in March to assess whether NortonLifeLock’s merger with Avast can reduce competition in the UK cybersecurity market.

The CMA decided to provisionally clear the merger today after its investigation concluded the deal did not raise antitrust concerns. In particular, the regulator found that NortonLifeLock and Avast will continue to face strong competition in the UK after the merger closes.

The CMA appointed McAfee Corp. as one of the main sources of competition. McAfee, who was acquired by a consortium of investors last year for more than $14 billion, provides cybersecurity software for the consumer and enterprise markets. According to the CMA, the company resulting from the merger of NortonLifeLock and Avast will also face competition from a “range of other suppliers”.

The growing line of cybersecurity tools from Microsoft Corp. also factored into the CMA’s decision to provisionally approve the deal. Microsoft’s cybersecurity software for Windows, the regulator determined, has in recent years become competitive with several standalone antivirus products. Additionally, the CMA believes that a series of new tools recently introduced by the company are “likely to further strengthen Microsoft as a competitor in the future.”

“After gathering further information from the companies involved and other industry players, we are currently confident that this agreement will not worsen the options available to consumers,” said Kirstin Baker, president of the group of d CMA survey. “As such, we have tentatively concluded that the agreement can go forward.”

The CMA invited interested parties to submit comments on its decision by August 21. The regulator plans to issue a final report on NortonLifeLock’s proposed merger with Avast by September 8. update released today, the companies said they expect the deal to close on September 12 at the earliest

When the merger was originally announced last year, NortonLifeLock and Avast expected the combined company to have more than 500 million users worldwide. Additionally, the agreement is expected to facilitate annual cost synergies of $280 million. NortonLifeLock and Avast also anticipate “additional upside potential through new reinvestment capability” that will allow for increased investment in product development and growth initiatives.

Photo: NortonLifeLock

Show your support for our mission by joining our Cube Club and our Cube Event community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, ​​Dell Technologies Founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many other luminaries and experts.

]]>
Malicious browser extension targets Gmail and AOL users https://pjmagic.net/malicious-browser-extension-targets-gmail-and-aol-users/ Tue, 02 Aug 2022 00:04:31 +0000 https://pjmagic.net/malicious-browser-extension-targets-gmail-and-aol-users/ We all need to be vigilant in protecting online accounts and personal data. This is because cybercriminals are constantly developing new and clever ways to scam us. Heck, thieves don’t even need to be tech savvy to implement money-stealing malware. They can buy malicious programs from the Dark Web that do all the hard work. […]]]>

We all need to be vigilant in protecting online accounts and personal data. This is because cybercriminals are constantly developing new and clever ways to scam us.

Heck, thieves don’t even need to be tech savvy to implement money-stealing malware. They can buy malicious programs from the Dark Web that do all the hard work. Tap or click here for a recent example of Phishing as a Service (PhaaS) targeting your bank accounts.

Now cybercriminals have a new way to steal private information from your email accounts without you knowing. Read on to see how they do it and ways to stay protected.

Here is the backstory

Browser extensions are useful tools designed to give Google’s Chrome or other browsers such as Firefox and Edge additional functions. They can range from automatic currency conversion and translations to pop-up blockers and screen capture tools.

But not all extensions are safe. Some extensions hide malicious code and Mozilla recently blocked dangerous extensions used by 450,000 Firefox users. Late last year, another extension emptied the accounts of unsuspecting cryptocurrency users.

Cybersecurity firm Volexity has found another dangerous extension, and this one is after your emails and private data. The origin is from North Korea, and Volexity explains to be aware of the developer SharpTongue.

The problem with this extension is that it installs on your browser without your knowledge. You are probably wondering how. Good question. It is an elaborate scheme of infecting your device with malware.

Once the malware infects your device, a malicious extension called SHARPEXT gets installed on your browser. Some malware variants steal usernames and passwords, but SHARPEXT verifies and downloads data from webmail accounts.

Essentially, the malicious Chrome or Microsoft Edge browser extension accesses and scans your emails, extracting any useful information. According to Volexity, the malware’s lucrative targets include US and European citizens who work on “nuclear issues, weapons systems, and other issues of strategic interest to North Korea.”

What can you do about it

If you know that a malicious extension is on your browser, you can uninstall it. But SHARPEXT makes this tricky, because it’s not an extension you’ll find in your browser’s web store.

Instead, the malware developers attempt to breach your browser’s security preferences file by infecting your device with malware. Once infected, the malicious extension is added to your browser.

From there, it hits when you access your email service. Volexity explains that SHARPEXT managed to slip thousands of emails from multiple victims.

As we stated earlier, SHARPEXT’s targets are quite specific and you’re probably not one of them. However, such threats come in clusters, and criminals will likely change the targets of the malicious extension to ordinary people soon. This is why you need to take preventive measures.

Here are the security measures you can take to prevent malware from infecting your devices:

  • Be careful with links – Never click on links you receive in unsolicited emails or text messages. They could be malicious and infect your device with malware.
  • This also applies to attachments – Do not open Word or Excel files attached to unsolicited emails. If you open one of these documents and it says you need to enable macros, close the file and delete it immediately.
  • Update your devices – Keep your computer and mobile devices up to date with the latest version. Operating system and application updates protect you from the latest threats and are your first line of defense against malware.
  • 2FA is your friend – Use two-factor authentication and password managers for better security. Tap or click here for more details on 2FA.
  • Don’t Forget Antivirus Software – Always have a trusted antivirus program updated and running on all your devices. We recommend our sponsor, TotalAV. Get an annual plan with TotalAV for just $19 at ProtectWithKim.com. That’s over 85% off the regular price!

keep reading

Google Ads Scam Warning: Do Not Click This Masked Malware Campaign

Malware is still a huge problem for Android – Here’s what to watch out for

]]>
Main forms of ransomware of concern for businesses identified https://pjmagic.net/main-forms-of-ransomware-of-concern-for-businesses-identified/ Sat, 30 Jul 2022 23:22:14 +0000 https://pjmagic.net/main-forms-of-ransomware-of-concern-for-businesses-identified/ Image: © AFP A review of internet search habits in the UK revealed the most common types of ransomware that are searched for, as well as an idea of ​​the defensive strategies that users seek to implement. This comes from a review by Firewall Technical. The main forms of ransomware of concern are led by […]]]>

Image: © AFP

A review of internet search habits in the UK revealed the most common types of ransomware that are searched for, as well as an idea of ​​the defensive strategies that users seek to implement. This comes from a review by Firewall Technical.

The main forms of ransomware of concern are led by the persistent concerns of the Wannacry ransomware attack. This global threat remains the most searched for ransomware in the world. Wannacry was released in 2017 and is known to affect Windows PCs. In the UK, it was ransomware that attacked the NHS. When released in 2017, it’s clear that Wannacry is still infecting computers in 2022.

Next is Ryuk ransomware, a malicious code released by hacker group WIZARD SPIDER again targeting healthcare services in the UK and US. .

Ryuk is considered one of the most dangerous ransomware attacks by cybersecurity professionals and is responsible for some of the highest ransom demands in the world.

Petya ransomware is a family of ransomware attacks that was launched in 2016. In 2022, it is the third most wanted ransomware attack. Petya ransomware became well known in 2017 when a variant of the Petya family infected the National Bank of Ukraine before moving on to other targets in Europe. The 2017 attacks are estimated to have caused more than $10 billion in damage.

Cryptolocker, Locky, Cerber, Jigsaw, Bad rabbit and GandCrab ransomware are other forms of malware that online system users are worried about.

The main ransomware attack vectors of concern are:

  • want to cry
  • Ryuk
  • Petya
  • Cryptolocker
  • locky
  • Cerberus
  • Jigsaw
  • bad bunny
  • GandCrab
  • CryptoWall

The least researched types of ransomware attacks include: Crysis, Reveton, and GoldenEye.

Antivirus software Kaspersky and Bitdefender are the anti-virus software that got the most searches in the UK.

A Firewall Technical spokesperson says Digital diary“Cyber ​​extortion is real, and small businesses with fewer security measures can be easy and profitable targets for cybercriminals. Looking at the data from this study, it’s clear that ransomware isn’t going away anytime soon. early.

]]>
Microsoft has blocked hackers’ favorite trick. So now they’re looking for a new avenue of attack https://pjmagic.net/microsoft-has-blocked-hackers-favorite-trick-so-now-theyre-looking-for-a-new-avenue-of-attack/ Fri, 29 Jul 2022 10:54:06 +0000 https://pjmagic.net/microsoft-has-blocked-hackers-favorite-trick-so-now-theyre-looking-for-a-new-avenue-of-attack/ Image: Getty There’s good news and bad news about Microsoft’s recent crackdown on unreliable Office macros. The benefit is that it has reduced the use of Office macros in email attachments or links. The problem is, attackers have just changed tack, increasing their use of Windows .LNK shortcut links. According to security firm Proofpoint, since […]]]>
getty-mysterious-hands-on-a-keyboard.jpg

Image: Getty

There’s good news and bad news about Microsoft’s recent crackdown on unreliable Office macros. The benefit is that it has reduced the use of Office macros in email attachments or links. The problem is, attackers have just changed tack, increasing their use of Windows .LNK shortcut links.

According to security firm Proofpoint, since Microsoft cracked down on Office macros, attackers have switched to using container files such as ISO and RAR attachments and Windows Shortcut (LNK) files.

A key turning point in macro usage came in February, when Microsoft announced that it would be rolling out a default block to Visual Basics for Applications (VBA) macros sourced from the Internet starting in April. This deployment plan has been postponed to this week.

“The most notable change in campaign data is the emergence of LNK files; at least 10 tracked threat actors have started using LNK files since February 2022. The number of campaigns containing LNK files has increased by 1675% since October 2021,” Proofpoint notes.

SEE; What exactly is cybersecurity? And why is it important?

Attachments to emails containing malicious macros decreased by around 66% between October 2021 and June 2022, according to Proofpoint.

Adoption of .LNK files by threat actors happened before February, as Microsoft’s macro crackdowns began years ago.

Abusing Office Macros – a script in Word or Excel files that automates repetitive tasks like monthly accounting – is a useful technique for attackers because it is not a patchable flaw and instead relies on Engage employees in activating a capability that most people don’t need.

Microsoft’s latest crackdown, which rolled out this week, was to make Office apps block VBA macros by default in any attachments or links in emails received from the Internet. This eliminates the need for administrators to configure domains to block untrusted VBA macros and makes it harder for users to enable macros after a trick.

Since 2016, Microsoft has gradually imposed more restrictions on running macros. At the time, 98% of threats targeted by Office used macros. In January, it also disabled Excel 4.0 (XLM) macros by default. XLM was added to Excel in 1992 but is still used even though VBA replaced it in 1993.

In 2018, Microsoft gave antivirus vendors a way to integrate with Office to inspect files for malicious VBA macros. It added XML macros to this antivirus interface in March, as attackers had started using XLM in response to its previous crackdown on VBA macros.

“Although more rudimentary than VBA, XLM is powerful enough to provide interoperability with the operating system, and many organizations and users continue to use its features for legitimate purposes. Cybercriminals know this, and they have abused XLM macros, more and more frequently, to call Win32 APIs and execute shell commands,” Microsoft said at the time.

XLM, also known as XL4, has been adopted by professional malware gangs behind the versatile Emotet malware. Again, the use of XLM correlated with when Microsoft decided to block these macros and let antivirus vendors inspect Office files for these scripts.

“Usage of the XL4 macro increased in March 2022. This is likely due to the fact that TA542, the actor delivering the Emotet malware, ran more campaigns with higher message volumes than in previous months. TA542 typically uses Microsoft Excel or Word documents that contain VBA or XL4 macros Emotet’s business then plummeted in April and it began using additional delivery methods including Excel Add In (XLL) files and compressed LNK attachments in subsequent campaigns,” Proofpoint notes.

capture-d-ecran-2022-07-26-at-11-20-30-am.png

Source: Proofpoint
]]>
Best Antivirus Rating – Which Antivirus Software is Best for You? https://pjmagic.net/best-antivirus-rating-which-antivirus-software-is-best-for-you/ Wed, 27 Jul 2022 08:17:50 +0000 https://pjmagic.net/best-antivirus-rating-which-antivirus-software-is-best-for-you/ If you’re considering buying anti-virus software for your computer, you need to make sure you’re getting the best one for your needs. Despite their common status, antivirus apps differ significantly in their functionality. Some are better for Mac computers than Windows Home computers. Others are more user-friendly and less resource-intensive, while some offer the particular […]]]>

If you’re considering buying anti-virus software for your computer, you need to make sure you’re getting the best one for your needs. Despite their common status, antivirus apps differ significantly in their functionality. Some are better for Mac computers than Windows Home computers. Others are more user-friendly and less resource-intensive, while some offer the particular basics. Incidents where to offer offers for multiple devices. Check out our ideal antivirus review to learn more about the different possibilities.

Although no antivirus software is perfect, it should be used frequently. Although some of these programs may cause false alarms, the best antivirus application will not return any false benefits. Plus, they all have parental managers and password managers. An effective antivirus review should also know the pros and cons of each antivirus product. Whether you’re considering basic antivirus or a feature-rich security method, a good antivirus assessment can help you make the right decision.

If you are looking for antivirus software, you can start with free variants. Windows 12, 11, and 8 have built-in Defender Antivirus from Microsoft company already. 1) Avast Free Antivirus is another great move for free protection. Its unlimited password manager is a handy addition, along with a hardened web browser. But the free version of its half-sister AVG lacks the detailed functionality of Avast established. Finally, Malwarebytes Free will act as a post-infection cleanup team. This cleans potentially unnecessary programs and protects your computer against ransomware. Their free anti-virus program is also compatible with anti-virus software.

]]>
McAfee and Visa offer 50% off antivirus subscriptions for small businesses https://pjmagic.net/mcafee-and-visa-offer-50-off-antivirus-subscriptions-for-small-businesses/ Mon, 25 Jul 2022 10:07:10 +0000 https://pjmagic.net/mcafee-and-visa-offer-50-off-antivirus-subscriptions-for-small-businesses/ McAfee and Visa are offering Visa Classic Business cardholders in the UK 50% off a one-year subscription to McAfee Total Protection. Visa’s partners in the UK will be able to bring the offer to its business cardholders through an expanded partnership between them, the two companies announced today. Visa Classic Business cardholders can get up […]]]>

McAfee and Visa are offering Visa Classic Business cardholders in the UK 50% off a one-year subscription to McAfee Total Protection.

Visa’s partners in the UK will be able to bring the offer to its business cardholders through an expanded partnership between them, the two companies announced today. Visa Classic Business cardholders can get up to 50% off the retail price of McAfee’s security product, including a one-year subscription to McAfee Total Protection for five or 10 devices.

The partners added that they are making the offer because many small business owners are not always able to adequately protect themselves and their customers from increased online risk, due to a lack of of resources from a budgetary and personnel point of view. Companies pointed out that more than half of data breaches in 2021 involved small businesses, according to the Verizon Business 2021 Data Breach Investigations report.

“With increasingly complex global issues such as the ongoing impacts of the COVID-19 pandemic and challenges stemming from the global supply chain, small businesses are increasingly dependent on their digital infrastructure, and there is no ‘has never been more important to ensure the proper protections have been implemented,” said Pedro Gutierrez, SVP Global Consumer Sales & Operations at McAfee. “We are proud to partner with Visa to deliver solutions to their Visa Business cardholders and we look forward to helping these organizations stay safe so they can focus on what matters most to their business.”

The two companies have teamed up in the past to offer similar offerings. In July last year, the pair launched McAfee Security for Visa cardholders in the United States, which offered savings of up to 40% with a 24-month plan and up to 60% with an offer. of 12 months.

Similarly, the Royal Bank of Scotland (RBS) is offering Malwarebytes Premium to its customers for free until at least May 2024. It has partnered with the cybersecurity firm to make its premium product, normally worth £49.99, available for free to protect up to 10 devices.

Featured Resources

The challenge of securing teleworkers

The IT Pro’s Guide to Sase and Successful Digital Transformation

Free download

How to choose APM software for your business

A Guide to the Asset Management Performance Software Market

Free download

An EDR Buyer’s Guide

How to choose the best endpoint detection and response solution for your business

Free download

The Role of Storage in Addressing Cyber ​​Resilience Challenges

Understand the role of data storage in cyber resilience

Free download

]]>
The 10 best practices to secure your workstation https://pjmagic.net/the-10-best-practices-to-secure-your-workstation/ Sat, 23 Jul 2022 10:15:00 +0000 https://pjmagic.net/the-10-best-practices-to-secure-your-workstation/ Cyberattacks can seem far-fetched until they hit close to home. But if you own or use a workstation, you could fall victim to a cyberattack at any time. Just as you would lock down your physical workstation to prevent intruders, you need to secure your virtual workstation against cybercriminals who want to gain access to […]]]>

Cyberattacks can seem far-fetched until they hit close to home. But if you own or use a workstation, you could fall victim to a cyberattack at any time. Just as you would lock down your physical workstation to prevent intruders, you need to secure your virtual workstation against cybercriminals who want to gain access to it.

Although attackers deploy several techniques to hack into systems, their efforts are ineffective when there are strong cybersecurity defenses on the ground. So, if you want to secure your workstation, here are the best effective tips to achieve it.

USE VIDEO OF THE DAY

1. Install firewall security

Firewall security, at its core, prevents cyberattacks by creating a barrier between your confidential information and the outside world.

Installing a firewall will prevent unauthorized users from accessing your network and notify you when an intruder tries to break in. Unauthorized users will fail the firewall authentication process until they get the correct login credentials.

Implement strong firewall security that hackers can’t bypass by guessing your login credentials through a brute force attack.

2. Regularly update your antivirus software

Viruses and malware are common online and attackers can use them to break into your system. That’s why you need to double your workstation security by using antivirus software to protect your systems from cyber threats.

Without antivirus software, viruses can delete important files, slow down your computer, or cause other serious damage.

Antivirus software plays an important role in keeping your system safe by identifying threats in real time and keeping your data safe. The most popular antivirus programs offer automatic updates, protecting your machine from any existing or emerging viruses. Perform regular virus checks to confirm that your computer is virus-free.

3. Cached Secure Credentials

Cached credentials allow remote desktops to successfully connect to a local credential cache that grants the computer automatic local access even if a domain controller is not available .

The best ways to secure cached credentials are to use strong passwords that will make it difficult to crack your cached credentials and to disable credential caching on systems that do not need this activity.

4. Apply Application Control Policies

Application control policies are a security approach that protects your network from malware. Applying application control policies helps you decide if you want to allow or block your team members from using productivity tools and apps.

When you apply application policies, only approved applications run. You can enforce application control policies by creating a list of eligible applications and identifying the rules for implementing those applications. Other requirements include maintenance of application rules and regular validation of application control rules.

5. Remove local admin rights

One of the advantages of being a local administrator account is that you can easily download and install programs on the computer without verification or authorization from anyone. However, it’s easy for maintainers to abuse local admin rights, and some of that misuse could lead to hackers gaining unauthorized access to your network.

The alternative to this problem is to remove local admin rights by setting a standard user account that prompts for credentials before any performance. Removing local administrator rights prevents malware from accessing your computers and closes access gaps.

6. Track Preferred Activities

Privileged activity tracking helps protect your data and its systems from cyberattacks and data breaches. Threats from privileged user accounts are usually difficult to detect because they are not suspicious.

To combat threats from privileged users, closely monitor their activities. Perform a privileged user review regularly, regardless of your relationship with the user.

7. Restrict personal email use at work

Restricting the use of personal emails at work or while connected to the corporate network is a great way to improve the security of your workstation.

When you connect your personal email to your workplace network, hackers can use this opening to hack into sensitive data on the network. This security breach often occurs due to the ignorance of the teams in the workplace. Make your team members aware of the importance of this policy so that they can comply with it.

Not removing an employee’s access to your system after they resign can be a corporate liability. Let your IT department know in advance when you need them to revoke this access.

Timing is necessary because you don’t want the departing employee to be unable to access the network before they leave, which can create an awkward situation. Likewise, you don’t want your IT department delaying removing their access after they leave, which can lead to potential risk.

9. Set the screen to lock after 15 minutes or less of inactivity

Although you can lock your screen manually, you tend to forget to do so compared to automatic locking. When you’re done working on your computer or want to take a quick break, make sure you have a screen lock that uses a password.

Set your screen lock to activate after 15 minutes of inactivity. You can make the lock time less than 15 minutes, depending on your environment. This way, people with malicious intentions will find it difficult to log into your system.

Create a strong password for your screen lock and avoid using birthday or anniversary dates as your password. You can also use passphrases to strengthen your passwords.

10. Prevent employees from disabling anti-virus software

Most of the time, computer viruses and cyberattacks occur on your system software because an employee has disabled your anti-virus software.

For example, an employee working on a system is frustrated because the system is late. They can disable several tasks including antivirus software so that the system can work better. In this case, they would get the speed they need, but a virus can enter the system as soon as the antivirus software is down.

So, to make sure you don’t expose your system to cyber threats, prevent employees from disabling anti-virus software. Plan other ways to make their computing devices work properly.

Secure your workstation with proactive security

Since your workstation is where all your business activities take place, it is one of your most valuable assets. An attack on your workstation is an attack that will have a huge impact on your life, so you must protect it religiously. The best way to secure your system is to take a proactive security approach.

You don’t need to wait for an attack to happen to do something. Take the necessary security measures to solidify your cybersecurity. Implement the steps above to keep cybercriminals at bay. If they approach, they will have no way to penetrate.

]]>