Jump to content

Search the Community

Showing results for tags 'ios'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 257 results

  1. Draw Pad Pro² is a simple yet powerful way to capture your thoughts, notes, and ideas. With a beautiful and clean interface designed for iOS 9, the app is a joy to use and easy to learn. Underneath the simplicity, Draw Pad Pro² packs powerful features. Each stroke you make is synced in real time to all your devices. Your work is organized into notebooks, with the ability to add titles to each page. http://www.fishingtonstudios.com/ https://itunes.apple.com/pl/app/draw-pad-pro-2-amazing-notepads-and-sketchbooks/id823103356?l=pl&mt=8
  2. bolo33

    LeechTunes

    *** FREE for a limited time!! Get it now!! *** Love Apple Music? Enhance the experience with LeechTunes! Add all your favourite music via Apple Music then enjoy them with LeechTunes. LeechTunes is the fresh new way to enjoy your music. Now you can listen to your music with great ease and style. LeechTunes features customized gesture controls in a skinned interface that shouts out your personality. LeechTunes is perfect for in-car use for safer music control. No need to look away from the road while changing track & playlist. Also great while doing other tasks like jogging, working-out or just general listening. https://itunes.apple.com/pl/app/leechtunes/id345439314?l=pl&mt=8
  3. bolo33

    Adrian James 6 Pack Abs Workout

    **FREE 24 HOUR GIVEAWAY** Adrian James 6 Pack Abs Workout has become an international sensation. Download the chart-topping app to transform your body and gain a newfound lust for life. With over one million downloads, and popularised by celebs and sports stars, the Adrian James 6 Pack Abs Workout is the ultimate abdominal routine. You can exercise anytime, anywhere - no equipment and no internet connection required. https://itunes.apple.com/pl/app/adrian-james-6-pack-abs-workout/id493912733?l=pl&mt=8
  4. bolo33

    Math Pro

    Get six applications for the price of two and ace your math classes. Rated 5/5 by AppleBitesize: www.applebitesize.com/posts/math-pro-review "Math Pro" will take you through high-school Math and beyond. It is a powerful tool that is overflowing with the tutorials, examples, and solvers from the following applications: Algebra Pro, Geometry Pro, Probability Pro, Statistics Pro, PreCalculus Pro, and Calculus Pro. https://itunes.apple.com/pl/app/math-pro/id340780974?l=pl&mt=8
  5. bolo33

    Week Calendar

    ***** BEST CALENDAR APP WORLDWIDE ***** Whether you use iCloud, Exchange or Google calendar, Week Calendar is the most user friendly and the all-round calendar app worldwide for everyone that needs to get the most out of their calendar app. Does your ordinary iPhone or iPad calendar give you insufficient insight and options? Then Week Calendar is the solution for you. http://weekcal.com/ https://itunes.apple.com/pl/app/week-calendar/id381059732?l=pl&mt=8
  6. bolo33

    Splashtop CamCam

    ***** LIMITED TIME SALE!! (Regular: USD$9.99) ***** Best high performance remote monitoring solution ***** Over 30 million users are enjoying Splashtop apps! Peace of Mind from Anywhere! CamCam is the easiest way to remotely check on people, places and things you care about with live video streaming from your computer's webcam! Keep an eye on whatever matters most to you from anywhere on your iPhone, iPod touch or iPad. Download Use Splashtop Personal for free https://www.splashtop.com/personal https://itunes.apple.com/pl/app/splashtop-camcam/id461511788?l=pl&mt=8 Tested on Windows 10 / iOS 10.3.1
  7. Pukka Promotion!! Free May 1 - May 5 !!! Cook + Cure finds you quality nutrition + natural health information tailored exactly to you. It’s like having your own team of health experts right in your pocket, giving you the what, why, and how to eat healthy. info www.cookandcure.com https://itunes.apple.com/pl/app/cook-cure-nutrition-herbs-natural-health-app/id1065100038?l=pl&mt=8
  8. Proton VPN 0.9.7 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v0.9.7.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/
  9. Proton VPN 0.9.6 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v0.9.6.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/
  10. MiniTool Mobile Recovery for iOS is a piece of iOS data recovery software. This tool supports recovering lost data, like photos, messages/imessages, contacts, call history, notes and etc files from iPhone (or other iOS devices), iTunes and iCloud backup. MiniTool Mobile Recovery for iOS has three recovery modules: “Recover from iOS Device”, “Recover from iTunes Backup File” and “Recover from iCloud Backup File”. You can choose a proper module according to the actual situation to recover the lost data.MiniTool iOS Data Recovery provides free iPhone data recovery service. No matter your files were lost due to accidental deletion, iOS upgrade failure, factory resettings or white apple, etc.. MiniTool Mobile Recovery for iOS will find and fully restore all files. LINK
  11. Used An iPhone And Social Media Pre-2013? You May Be Due A Tiny Payout Twitter, Instagram, and others are stumping up $5.3m to settle a privacy suit with implications for those who used social-media apps on an iPhone in 2012 or earlier. Given the millions who downloaded the social-media apps in question, it's likely the settlement will result in a very small payment for each individual. Eight social-media firms, including Twitter and Instagram, have agreed to pay $5.3m to settle a lawsuit over their use of Apple's Find Friends feature in iOS. The main problem that complainants had with the accused firms was that their apps, which used Apple's Find Friends, didn't tell users that their contact lists would be uploaded to company servers. The lawsuit alleged the privacy incursions occurred between 2009 and 2012, the year the class action suit began. Instagram, Foursquare, Kik, Gowalla, Foodspotting, Yelp, Twitter, and Path have agreed to pay in to the settlement fund, which will be distributed to affected users via Amazon.com, according to Venture Beat. Yelp had previously argued it was necessary to store user contact lists to enable the Find Friends feature, which consumers understood would occur in the context of using a mobile app. However, US District Judge Jon Tigar countered that the key question was whether Apple and app developers "violated community norms of privacy" by exceeding what people reasonably believe they consented to. "A 'reasonable' expectation of privacy is an objective entitlement founded on broadly based and widely accepted community norms," said Tigar. If the judge approves the settlement, Apple and LinkedIn would be the only remaining defendants among 18 firms originally accused of the privacy violation. Given the millions of people who downloaded these apps, it's likely the settlement will result in a very small payment for each individual. However, people who took part in the class action suit could receive up to $15,000 each. Source
  12. Proton VPN 0.9.5 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v0.9.5.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/
  13. Owners of Android and iOS devices should pay special attention to security updates released by Google and Apple on Monday, as they contain fixes for a series of critical bugs affecting their phone's WiFi component. The issues, discovered by Google Project Zero security researcher Gal Beniamini, affect the Broadcom WiFi SoC (Software on Chip), included with many Android and iOS smartphones, and for which both Google and Apple include custom firmware with their OS. Bugs allow remote hacking of Android and iOS devices According to Beniamini, a stack buffer overflow vulnerability in the Broadcom firmware code allows an attacker in the phone's WiFi range to send and execute code on the device. Depending on the attacker's skills, he can deploy code that takes over the user's device and installs applications without the user's knowledge, such as adware, banking trojans, or ransomware. The possible ways in which these bugs can be leveraged range from evil WiFi spots up to wardriving scenarios. Both companies addressed the issue with updates released on Monday, with Apple releasing iOS 10.3.1, and Google delivering updates via its Android Security Bulletin for April 2017. Beniamini described his findings, in the context of attacking a fully-patched Nexus 6P Android device, in a blog post published today. Broadcom needed four months to patch all issues The iOS and Android RCE attacks are two of ten flaws Beniamini discovered in Broadcom's WiFi SoC firmware. None of these flaws affected the Android and iOS operating systems per-se, but the source code of the Broadcom firmware. Both OS makers had to wait for over four months until the chip maker finally managed to fix all flaws. These security bugs were particularly difficult, both in numbers and complexity, as Broadcom asked Beniamini for an extension to Project Zero's 90-day public disclosure policy so they could finish the patching process. Source
  14. Google and Lookout researchers published a report today revealing the activities of a new Android malware family, which they believe to be the Android counterpart of the Pegasus iOS spyware. After surfacing in 2016, the Pegasus spyware made headlines around the world after it was discovered that this wasn't your ordinary malware but a cyber-surveillance toolkit sold by an Israeli company called NSO Group. Similarly to Italian surveillance vendor HackingTeam, the NSO Group developed Pegasus and sold it to governments and law enforcement agencies across the world, even in countries with dictatorial regimes, where it was used to track down dissidents and journalists. At the time, Pegasus was the most advanced iOS malware ever discovered, using several iOS zero-days to infect and collect data from a victim's iPhone. Initial Pegasus investigation moved to Android ecosystem That investigation, spearheaded by security researchers from Lookout and Citizen Lab, continued after the publication of their Pegasus report. During the fall, as Apple was patching the zero-days used by Pegasus, Lookout researchers reached out to Google and sent over a list of suspicious apps, they thought to be connected with Pegasus and the NSO Group. An investigation from Google revealed a new Android malware family named Chrysaor, very similar to Pegasus. Chrysaor features included: Keylogging features Ability to silently answer phone calls and listen in on conversations (Users see a black screen and if they unlock the phone, the phone call is dropped immediately) Ability to take screenshots of the user's screen Ability to spy on users via the front and rear cameras Usage of the ContentObserver framework to gather any updates to apps such as SMS, Calendar, Contacts, Cell info, Email, WhatsApp, Facebook, Twitter, Kakao, Viber, and Skype Ability to collect data such as SMS settings, SMS messages, call logs, browser history, calendars, contacts, and emails Ability to steal messages from apps such as WhatsApp, Twitter, Facebook, Kakoa, Viber, and Skype Usage of alarm functionality to repeat malicious actions at certain intervals Ability to install itself in the /system folder to survive factory resets Ability to sabotage the phone's self-update features Ability to disable WAP push messages to hinder forensics operations Ability to delete itself when instructed or when the C&C server goes dormant Most of these features could be turned on by both an HTTP request from one of the attacker's C&C servers, but also via an SMS message. Chrysaor was by far the most sophisticated threat researchers encountered. In fact, researchers said Chrysaor was far more complex and full of features when compared to Pegasus. Chrysaor used in targeted attacks Just like Pegasus, Chrysaor was used in a small number of attacks, a clear sign this is an advanced tool deployed only by a few groups in targeted attacks, and not something me and you will ever come across. While the victims are unknown, Google said it identified at least three dozen users infected with Chrysaor. All of them got infected because they installed an app via a third-party app store. Using Android's Verify Apps feature, Google intervened and disabled the apps on the victims' phones. From the samples they found, Google and Lookout researchers say these apps appear to have been compiled in 2014, meaning there's likely more victims than the current headcount, most of which they'll never be able to identify. Most of these victims most likely switched or upgraded phones, and their trail was lost. Based on current data, the vast majority of Chrysaor victims were located in Israel, Georgia, Mexico, and Turkey. Security researchers always knew there was an Android version of Pegasus, based on NSO Group brochures, but until now, they were never able to discover a sample and study its behavior. The NSO Group, which is a licensed cyber-arms dealer, has remained quiet to all accusations of selling surveillance tools to oppressive regimes. The full technical report on Chrysaor is available here. Source
  15. Telegram Is Rolling Out Voice Calls: Secure, Crystal-Clear, Constantly Improved By Machine Learning(AI-Powered) Voice Calls: Secure, Crystal-Clear, AI-Powered Over the past few months, we’ve worked hard to make sure Telegram calls are the best in terms of quality, speed, and security. The wait is over: today we’re rolling out Voice Calls in Western Europe. The rest of the world will get them very soon as well. The Voice Call interface is familiar and easy to use, but as always, you get loads of innovation under the hood with Telegram. Click Here to Watch Video Secure Telegram Calls are built upon the time-tested end-to-end encryption of Telegram's Secret Chats. The key verification UI we came up with in 2013 to protect against man-in-the-middle attacks served well for Telegram (and for other apps that adopted it), but for Calls we needed something easier. That‘s why we’ve improved the key exchange mechanism. To make sure your call is 100% secure, you and your recipient just need to compare four emoji over the phone. No lengthy codes or complicated pictures! Key verification Super-Fast Whenever possible, your calls will go over a peer-to-peer connection, using the best audio codecs to save traffic while providing crystal-clear quality. If a peer-to-peer connection can't be established, Telegram will use the closest server to you to connect you with the person you’re calling in the fastest way possible. Unlike other apps, Telegram has a distributed infrastructure all over the world which we’ve already been using to deliver your texts faster than other apps. Now these servers will also be used for calls. In the coming months, we’ll be expanding our content delivery network around the globe, getting the connection up to light-speed even in remote areas. AI-Powered Each time you make a Voice Call on Telegram, a neural network learns from your and your device‘s feedback (naturally, it doesn’t have access to the contents of the conversation, it has only technical information such as network speed, ping times, packet loss percentage, etc.). The machine optimizes dozens of parameters based on this input, improving the quality of future calls on the given device and network. These parameters can also be adjusted during a conversation if there's a change in your connection. Telegram will adapt and provide excellent sound quality on stable WiFi — or use less data when you walk into a refrigerator with bad reception. According to our tests, Telegram Calls are already superior to any of our competitors on comparable connections. But the quality of Telegram Calls will further improve as you and others use them, thanks to the built-in machine learning. Complete Control If you’re like us, you don’t like to be bothered. On Telegram, you can control who can and who can't call you with granular precision. You can even switch voice calls off altogether, blocking anyone and everyone from calling you. Privacy settings for calls By default, Telegram calls are lightweight and automatically adapt to the speed and type of your connection, so as to consume the least data possible. But if you want to reduce your data spending by another 25-30% at the expense of sound quality, you’re welcome to enable the Use Less Data option in Data and Storage Settings. No Added Calories Telegram is the most powerful messaging platform out there, but it is also famous for being the easiest one to use. We want to keep things this way, and that’s why by default we won’t clutter your screen with additional tabs and redundant buttons. Once you start making calls, Telegram for iOS will offer you to add a dedicated tab for calls on the main screen of the app. Alternatively, you can turn the Calls tab on right away from the Recent Calls section in Settings. On Android, the call tab is accessible via the pull-out main menu on the left. It‘s always easy to make a call, even if you’ve never opened the calls tab. As soon as Voice Calls are enabled for your country, a phone icon will appear on every profile page. On Android, you can also call from the ‘…’ menu in a chat and choosing ‘Call’ on iOS. On Android, the Call button is in the ‘…’ menu at the top. New call button One more thing For those of you who don’t do voice calls, v.3.18 brings something different: direct control over the quality of videos you share. Use this brand-new setting to select the degree of compression before sending a video. For the first time in the history of messaging, you can preview how the recipient will see your video before you send it. Click Here to Watch Video The app will remember the compression rate you selected and will use it by default for your future video uploads. And that‘s it for today. Stay tuned, there’s always more coming! Source Downloads: Telegram Applications Mobile apps Telegram for Android Telegram for iPhone and iPad Telegram for WP Telegram for Firefox OS Desktop apps Telegram for Windows/Mac/Linux Telegram for macOS Web apps Telegram Web-version Telegram Chrome app Unofficial apps Telegram CLI for Linux Source Code Downloads - Source Code
  16. Lots of Android ransomware news this week even though Google feels they are pretty rare. Also some updates to tools created by Michael Gillespie (CryptoSearch & ID-Ransomware), a new RaaS, a new PyCL ransomware being distributed via RIG, and ransomware asking for 6 bitcoin ransoms while making fun of USA sanctions on Russia. Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @fwosar, @malwrhunterteam, @BleepinComputer, @struppigel, @demonslay335, @malwareforme, @jorntvdw, @FourOctets, @DanielGallagher, @campuscodi, @JAMESWT_MHT, @Seifreed, @JakubKroustek, @kafeine, @FreeBSDfan, @rommeljoven17, @BroadAnalysis, @nyxbone, @Malwarebytes, @Google, @zscaler, and @Lookout. If you are interested in ransomware or InfoSec, I suggest you follow them on Twitter. March 25th 2017 CryptoSearch Updated to Support Files Encrypted by Spora Michael Gillespie has updated CryptoSearch so that it now supports files encrypted by Spora Ransomware. New Ransomware called WannaCry GData security researcher Karsten Hahn found a new ransomware called WannaCry. Spanish Ransomware Pretends to be a Windows Update Karsten Hahn found a Spanish ransomware that uses Smart Install Maker and bunch of .vbs scripts to encrypt a computer. When run it pretends to be Windows Update. In-Dev MemeLocker Discovered Karsten Hahn keeps pumping out the new ransomware infections with MemeLocker. This ransomware is in development, but based on its name, I hope we wont see pictures of cats everywhere. March 28th 2017 Unskilled Group Behind Many Junk Ransomware Strains A person or group of malware authors calling themselves "Mafia Malware Indonesia" claimed responsibility for writing a collection of ransomware families that includes threats such as KimcilWare, MireWare, MafiaWare, CryPy, and the recent SADStory and the L0CK3R74H4T ransomware. Yesterday's iOS 10.3 Update Bring Safari Ransomware Campaign to an End According to Lookout, the iOS 10.3 update, released yesterday, has thwarted a screen-locking ransomware campaign that used a bug in mobile Safari to lock users' browsers and demand a ransom paid in iTunes pre-paid gift cards. PyCL Ransomware Delivered via RIG EK in Distribution Test This past Saturday security researchers Kafeine, MalwareHunterteam, BroadAnalysis, and David Martínez discovered a new ransomware being distributed through EITest into the RIG exploit kit. As this ransomware was only distributed for one day and does not securely encrypt files, it makes me believe that this may have been a test distribution run. R Ransomware Discovered R is for Ransomware according to the new ransomware discovered by MalwareHunterTeam. Not sure what the big S is for at the bottom of the ransom page. Skulls are Creepy According to the AnDROid Ransomware MalwareHunterTeam discovered another ransomware today called AnDROid. This ransomware appends the .android extension to encrypted files. Even cooler the skull is animated. Such skillz!! Ransom Hunt Underway for pr0tect Ransomware Michael Gillespie initiated a ransomware hunt for that uses the .pr0tect and drops a ransom note called READ ME ABOUT DECRYPTION.txt. March 29th 2017 Explained: Sage ransomware Malwarebytes explains how Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files offline. The malware is actively developed and currently, we are facing an outbreak of version 2.2. of this product. HappyDayzz Sample Found MalwareHunterTeam found a sample of the HappyDayzz Ransomware. What is interesting about this ransomware is that it uses different encryption algorithms depending on the response from the C2 server. DoNotChange Ransomware Discovered MalwareHunterTeam found a sample of the DoNotChange Ransomware. New RaaS called File Frozr Discovered Rommel Joven discovered a new RaaS called File Frozr. March 30th 2017 Decryptor for the DoNotChange Ransomware Released Michael Gillespie released a decryptor for the DoNotChange Ransomware. Instructions can be found here. Google: Ransomware on Android Is Exceedingly Rare Android apps spreading ransomware aren't as common as most users and security experts think, says Jason Woloz, Sr. Program Manager for Android Security at @Google. CryptoSearch Updated to Support Files Encrypted by FadeSoft Michael Gillespie released an updated version of CryptoSearch that supports files encrypted by FadeSoft. ID-Ransomware can now Identify Files Encrypted by FadeSoft Michael Gillespie added support for FadeSoft identification to ID-Ransomware. March 31st 2017 New Android Ransomware Evades All Mobile Antivirus Solutions Zscaler has spotted a new strain of Android ransomware that could evade detection on all mobile antivirus engines at the time of its discovery. Currently targeting Russian-speaking users, this ransomware lacks basic decryption functionality. This means that users infected with this ransomware version cannot unlock their phones and regain access to their data, even if they pay the ransom. Introducing the Ugly LanRan Ransomware Don't ransomware developers have any pride anymore? This is obviously not apparent with the LanRan ransomware discovered by Karsten Hahn. This ransomware appears to be in-dev as it just sets the background and displays an ugly ransom lock screen. The contact email for this crapsomware is [email protected] New Variant of the Fantom Ransomware MalwareHunterTeam discovered a new variant of the Fantom Ransomware. When I took a look, its quite different then its predecessors. This variant will encrypt files and rename them to a base64 encoded filename with an extension that is based on the time the ransomware started. The extension format is .. An example is Ny5wbmc=.11232323. The ransom note is named in a similar manner with a name like RESTORE-FILES..11232323.hta. It logs the status of the infection process by retrieving one of these two images hxxp://iplogger.ru/1qzM6.gif or hxxp://iplogger.ru/1wzM6.gif. If its detects the user is from Russia, it terminates the process and deletes the infection from the computer. New version of CrypVault Found Karsten Hahn found a new version of CrypVault. This variant tells victims to contact [email protected] Ransom Hunt Underway for Cradle Ransomware Michael Gillespie initiated a ransomware hunt for that uses the extension .cradle and drops a ransom note called _HOW_TO_UNLOCK_FILES_.html. Sanctions Ransomware Makes Fun of USA Sanctions Against Russia If you want to know what some ransomware developers think about the USA, you can get a good idea from the ransom note of the Sanctions Ransomware that was released in March. Dubbed Sanctions Ransomware due to the image in the ransom note, the developer makes it fairly obvious how they feel about the USA and their attempts to sanction Russia. Source
  17. Apple's latest iOS 10.3 release patches a flaw that can be used to repeatedly dial a phone number, accidentally exploited last year to redial 911 call centers, protecting emergency operators from potential cyberattacks. As noted by The Wall Street Journal, the vulnerability was first discovered by an 18-year-old in Arizona who took advantage of a JavaScript flaw in a bid to collect a bug bounty last year. Last October, Meetkumar Hiteshbhai Desai, acting on a tip about a potential iOS flaw, wrote and shared code that caused target iPhones to continually dial 911 emergency call centers. After the code went live, the Surprise, Ariz., Police Department received more than 100 hang-up 911 calls within a few minutes, local publication AZ Central reported at the time. The Maricopa County Sheriff's Office traced the calls and discovered they originated from a link Desai posted to Twitter. Users who clicked the link would find their iPhone automatically dial emergency services. Due to the mass dissemination of the link, call volumes had the potential to shut down 911 services across Maricopa County, the Sheriff's Office said. Desai, when taken in for questioning, said the code was crafted to trigger pop-ups, open emails and dial phone numbers. The Twitter distribution was meant to be funny. He was also interested in proving the flaw could be exploited to collect a bug bounty from Apple. In previous versions of iOS, users who clicked on a phone number linked to in apps like Twitter and Messages would automatically trigger a call. With iOS 10.3, Apple has instituted a secondary confirmation to alleviate the potential for erroneous dialing. The new feature also restricts nefarious users from using the exploit to conduct cyberattacks. By Mikey Campbell http://appleinsider.com/articles/17/03/30/apples-ios-103-fixes-flaw-used-in-accidental-ddos-attack-on-911-call-system
  18. Most people don’t give much thought to what happens when you connect to your bank’s website or log in to your email account. For most people, securely connecting to a website seems as simple as checking to make sure the little padlock in the address bar is present. However, in the background there are many different steps that are taken to ensure you are safely and securely connecting to the websites that claim they are who they are. This process includes certificate validation, or making sure that the servers that users are connecting to present “identification” showing they are legitimate. This helps to protect users from fraudulent servers that might otherwise steal sensitive information. Due to the sensitive nature of this process, software vulnerabilities that adversely impact the security of certificate validation could have major consequences. Unfortunately, digital systems are complex and bugs are an inevitable reality in software development. Identifying vulnerabilities and responsibly disclosing them improves the security of the internet by eliminating potential attack vectors. Talos is committed to improving the overall security of the internet and today we are disclosing TALOS-2017-0296 (CVE-2017-2485), a remote code execution vulnerability in the X.509 certificate validation functionality of Apple macOS and iOS. This vulnerability has been responsibly disclosed to Apple and software updates have been released that address this issue for both macOS and iOS. By Talos Group http://blogs.cisco.com/security/talos/1703-apple-x509
  19. Google Play Store Starts Offering a Free Android App Every Week The first free app is Car Wars-Adventure Time Sadly, it’s only available in the US for now, but we expect Google to offer the new section globally soon enough. The first free app is Card Wars – Adventure Time, a game based on Cartoon Network’s Adventure Time show. The app normally costs $2.99, but Google is offering it for free for a limited time. The game is also available on iOS for the price of $3.99. This isn’t the first time that Google offered such a deal. Back in 2015, the tech giant ran a similar weekly promotion, but later decided against it. Google Play Store runs a similar promotion like App Store Google isn’t the only app store to offer free applications each week. Apple has been running a similar promotion in its App Store, providing iOS users with access to a “Free iOS app of the week” without requiring them to pay. This week’s free iOS app is a video camera and editing app called Musemage, which normally costs $3.99, but users don’t have to pay for it if they download the app this week. Apple offers both productivity and game apps for free each week, and we expect Google to adopt a similar move. Truth be told, the Play Store has lots of free applications and alternatives to paid apps that users can check out, but this is mostly applicable for productivity offerings. When it comes to paid games, there weren't any alternatives to those who don’t wish to use their credit cards when downloading apps. Google recently introduced a new feature that allows developers to run sales on their paid apps or make them available for free for a limited time. Moreover, the tech giant introduced playable ads for Android games and Play Store updates. Source
  20. New Vault 7 leaks show CIA can install persistent malware on OS X and iOS devices A new trove of documents belonging to Wikileak’s Vault 7 leaks, dubbed “Dark Matter” reveal that Apple devices including Macs and iPhones have been compromised by the CIA. They are affected by firmware malware meaning that even a re-installation of the operating system will not fix the device. The CIA’s Embedded Development Branch (EDB) have created several tools for exploiting Apple devices, these include: Sonic Screwdriver – allows an attacker to boot its malware from peripheral devices such as a USB stick. DarkSeaSkies – is an “implant” that persists in the EFI firmware of MacBook Air computers. It consists of “DarkMatter”, “SeaPea” and “NightSkies” which affect EFI, kernel-space, and user-space respectively. Triton – macOS malware. Dark Mallet – Triton infector. DerStake – EFI-persistent version of Triton. The documents show that DerStake was at version 1.4 as of 2013, but other documents show that as of 2016, the CIA was working on DerStake 2.0. According to Wikileaks, NightSkies can infect Apple iPhones, the organisation said what’s noteworthy is that NightSkies has been able to infect iPhones since 2008. The CIA documents say NightSkies is a “beacon/loader/implant tool”. It is “expressly designed” to be physically installed onto factory fresh iPhones meaning the CIA has been intercepting the iPhone supply chain of its targets since at least 2008. "Dark Matter" is just the latest release of documents from the wider Vault 7 leaks, more CIA documents are expected in the future. Main Source: Wikileaks Source
  21. Alexa in Amazon app for iOS Amazon’s virtual AI assistant, Alexa is one of the most competitive on the market, as it can be found on Echo speakers and a number of smartphones, including Huawei Mate 9. Now, Amazon decided to make the virtual assistant available to even more users. Amazon app for iOS has just received an update, which includes Alexa. The virtual assistant is now integrated into the app, while the update is expected to rollout in stages, reaching all users in about one week. Alexa can be accessed by tapping on an iPhone’s microphone in the search bar. The virtual assistant answers to questions, helps users with online shopping and plays music upon request. The virtual assistant can be used for accessing books in the user’s Kindle library, as well as songs from Amazon Music Unlimited, Prime Music and purchased songs and albums. Amazon might update its Android app as well Playback controls are featured on the screen when media starts playing and audio will continue to stream, in the background when users dismiss them. Alexa can provide users with updates on the news, weather information and traffic details. Alexa can also help manage smart home devices and seems to give users access to all features that are also found on Amazon’s smart speaker line. At this point, it’s unclear if Alexa will be included in a possible update to Amazon’s shopping app for Android. However, Alexa is making its way to a number of smartphones, including Moto Z, Moto Z Force and Moto Z Play. Last month, Motorola introduced a new Moto Mod modular accessory which offers an enhanced speaker with Alexa integration. The competition in the market of virtual personal assistants is about to become even more heated this month after Samsung launches the Galaxy S8 with its own virtual assistant Bixby. Currently, the market includes such AI assistants like Apple’s Siri and Google Assistant. Source
  22. Smartphone OS sales share The latest Kantar World Panel report reveals market trends in the past period, providing an insight into smartphone OS sales. The study shows that iOS continued to grow in most regions, except for Japan, Spain and Urban China. On the other hand, Android grew in the US, and accounted for 74.3% of smartphone sales, an increase from 72.9% in the three months ending January 2016. iOS recorded a share of 22.7%, while iPhone 7 remained the top-selling smartphone in major European countries. Newly announced Nokia 3, 5 and 6 smartphones are said to leave a mark in European markets, especially since Nokia accounted for 6% of phone sales in EU5 at the start of 2016. It was the fourth largest brand in Great Britain, Germany, France, Italy and Spain. Android dominates the market in Asia with 83.2% of smartphone sold, after increasing 9.3% during the three months period ending January 2017, while Huawei continued to account for over a quarter of smartphone sales at 26.6% for the three months ending January 2017. Apple is the second largest smartphone seller in Asia with 16.6%, but continues to experience year-on-year decline resulted from increased competition from local manufacturers. 70% of the US market is dominated by Apple and Samsung The numbers are quite different in the US, where Android accounts for 56.4% of smartphone sales, down 1.8% from a year earlier. iOS’ share is 42% of sales, up 2.9% year-on-year, while 70% of the US domestic market is dominated by Apple and Samsung, with LG being the third largest manufacturer and accounting for 11.1% of sales. The report mentions that Android and iOS will soon be the only two smartphone ecosystems moving forward, while phone manufacturers will have to adapt in order to remain competitive on the market. In addition, no other mobile OS has the capacity to challenge Android and iOS, and the situation won’t change in the near future. Source
  23. Sticky Password Premium - 1 Year[365 Days] Promo by Comss.ru Overview: Sticky Password Premium is a password Manager that allows you to store your credentials locally or in the cloud, synchronizing them with computers Windows, Mac, Android devices, iPhone and iPad, ensuring that you can create secure passwords and automatically enter them, wherever you are. Sticky Password Premium for Windows can automatically log on to websites and apps, to import data from browsers and other password managers will automatically recognize and store the type of the created web account, create a password and has a dashboard showing all the weak passwords, so the user know where we need to strengthen security. Features: Award-winning password Manager Automatic login and form filling High data security: AES‑256 Support for all platforms Windows, Mac, Android and iOS Cloud sync and backup copy, the local sync via Wi-Fi Annual subscription license with priority support More Info: Product Homepage, Detailed Features, Security, Edition Comparision Supported OS: Windows, Mac OS X, Android 2.3+ and iOS 7.0+. Links: Offer: https://www.stickypassword.com/ru/comss-giveaway Optional Offer: 90% Off on Lifetime Premium License. To avail, visit the offer page and click on the link named "предложение ограничено" below the "Скачайте БЕСПЛАТНО" or "Download now for FREE" button. To change the language, choose from top of the page. Note: Limited Period Offer. Expires by 28 February 2017. Current Status: Open. Terms: The offer is valid for new users Sticky Password and is available until February 28, 2017. You'll receive an annual license for 1 user for home use only. The license can be used for all your devices, including desktops, laptops, smartphones and tablets. You'll receive free updates and technical support during the term of the license. Steps: Visit the above promotional page(Russian) or English(Translated) Click the "Скачайте БЕСПЛАТНО" or "Download now for FREE". Optionally you can use the below link from "Downloads". During installation, login/create an account. Just install the software to activate a yearly subscription. Activation will occur automatically. You will then be able to install the application on the mobile device, using the created account. Downloads: Windows - Giveaway Installer - Size: 29.7 MB: http://download.stickypassword.com/files/campaign/StickyPassword_rev801054_comss1073.exe Mac - Giveaway Installer - Size: 7.6 MB: http://download.stickypassword.com/files/campaign/StickyPassword_rev984_comss1073.dmg Other Downloads: Android App iOS App Note: You need to install either Win / Mac giveaway installer and then use the apps to activate on other devices.
  24. How To Use Facebook Messenger Without A Facebook Account You Can Now Use Facebook Messenger Without A Facebook Account, Know How With over one billion users worldwide, Facebook Messenger is now one of the biggest messaging platforms worldwide. In order to have a Facebook Messenger app on your device, you need to have an active Facebook account. However, there are a lot of reasons that many people may not want to use Facebook but only the Messenger app. For instance, Facebook staples like pyramid schemes, political debates, and pointless status updates can fill some users with rage and using such a social media site is a big no-no for them. Similarly, there are users who are not interested in keeping up with friends online and rather catch up over a cup of coffee or on the phone instead of through liking each other’s perfect social media posts. But, what about those people who want to keep in touch with certain people who are not on any other platform except for Facebook Messenger. In such a scenario, is it possible to use Facebook Messenger app without having an active Facebook account? Yes, it is. You can stay in touch with your friends via Facebook Messenger, by following the steps below: Open Facebook’s deactivate account page. Ignore the photos of the people who will apparently miss you and scroll to the bottom. The last option says you can continue using Facebook Messenger even if you deactivate your account. Make sure this is not checked and just leave it as is. Scroll down and hit Deactivate. Now, your Facebook account will be deactivated. All your Facebook data will be safe until you are ready to log in again. Go ahead and open the Messenger app using your old Facebook credentials on your smartphone or log in via the website on your PC. You will notice that you can continue chatting with all your friends without losing any of your data. Please note that your deactivated Facebook account doesn’t get reactivated, if you are using Messenger. Your friends will only be able to contact you via the chat window in Facebook or the Messenger app. If you want to use Messenger and don’t have a Facebook account, then follow the instructions mentioned below: Download Facebook Messenger on iOS, Android, or Windows Phone. Open the app and enter your phone number. Tap Continue. You will get a code via SMS to confirm your number. Once you have done that you can key in phone numbers of your friends and start messaging them. Source
  25. How to Opt Out of iOS Beta Updates and Reinstall iOS 10.2.1 on Your iPhone/iPad The tutorial also applies to iPod touch devices iOS 10.2.1 is the first point release to the iOS 10.2 series. It received a total of four Beta/Public Beta versions during its entire development cycle since mid-December last year. The last one was seeded only ten days ago. Like many of us running the iOS 10.2.1 Public Beta 4 release, it turns out you'll not receive the final version of iOS 10.2.1, which some will say it's identical with the last Beta, but what if your device is not working properly and you are still experiencing bugs. For example, we found out that, since we've installed the last Public Beta versions of iOS 10.2.1 on our iPhone 6 device, some applications were very slow to load and not so responsive like they used to be. Also, we noticed major battery drains. Removing the iOS Public Beta profile If you're experiencing the same issues on your iPhone, iPad, or iPod touch device, it's time to refresh it by reinstalling the operating system. First off, make sure that you have a recent iCloud backup, or at least a local backup in iTunes. It's time to remove the Public Beta profile (you can always reinstall it at a later time if you still want to use upcoming Beta versions), so open the Settings app, go to General, scroll down to the Profile section and click it. Then, remove the iOS Beta profile by pressing the red "Delete Profile" button. Restoring the device and reinstalling iOS Connect your device to your personal computer, where the latest version of iTunes needs to be installed (make sure you have the latest version installed, 12.5.5 at the moment of writing). With the device connected to your PC, enter DFU mode. Entering DFU Mode is as simple as pressing and holding both the Power and Home buttons on your device until you see the Apple logo on the screen. Release the Power button but keep holding the Home one until the "Connect to iTunes" logo appears. iTunes will soon offer you the option to "Restore and Update" the device. Click the "Restore and Update" button and the application will tell you that iOS 10.2.1 is available. Click OK and let it download the update. Once iTunes completes downloading iOS 10.2.1 from Apple's servers, it will soon begin installing it on your device. You don't have to do anything at this point, just don't touch anything and make sure your computer has enough battery or that it's plugged in. Reset and erase the device to restore it from a backup Just before iOS 10.2.1 finishes installing, iTunes will display a message saying "Congratulations, your iPhone has been unlocked. To set up and sync this iPhone, click Continue." Click the "Continue" button and iTunes will immediately detect your device. At this point, you need to set up your device by pressing the Home button. Choose your preferred language and region. On the next screen, you'll have to connect to your Wi-Fi network. Then, enable the location services, or simply don't. It doesn't matter, because we're going to reset and erase the device anyway, so there's no need to set up Touch ID now. When you reach the home screen, open the Settings app, go to the Reset section and press on "Erase All Content and Settings." Erase your device, which will bring you to the setup screen again. So, this time, make sure that you set up everything correctly, including Touch ID, location services, etc., and, after entering your Apple ID, you can finally choose to restore from a backup. Select the restore method you want (we prefer the iCloud backup) and let your device restore the backup, which can take a few good minutes. Once everything is restored, you can unlock your device and access the home screen. Most of the apps will continue to download and install in the background, so you'll have to wait a little longer for everthing to be exactly like it was before you've started all this. Congratulations, you refreshed your device and have the final iOS 10.2.1 installed, too. Source
×
×
  • Create New...