Category: News

Samsung Messages Glitch Sending Photos to Contacts Randomly

According to reports gathered online, an unusual glitch is affecting Samsung users causing the default Samsung Messages app to send random photos to their list of contacts. Since the messages were sent without consent (and apparently with no evidence), users were only made aware of the bug once they get a reply from someone who received their photos.

The issue appears to be limited though only to the newer Samsung Galaxy devices – the S9, S9 Plus, and Note 8.  The images sent seem to be just random picks from the user’s photo gallery.

Samsung Galaxy S9 glitch

 

Samsung, on their part, has already acknowledged the said reports. “We are aware of the reports regarding this matter and our technical teams are looking into it. Concerned customers are encouraged to contact us directly at 1-800-SAMSUNG.”

 

For the time being, concerned Samsung owners can resort to other messaging applications or simply disable sending photos entirely via their phone settings. This can be done by going to Settings > Apps > Samsung Messages > Permissions > Storage. By doing so, it should prevent the pre-installed Samsung Messages app to access the photo gallery by disabling its storage permissions.

 

It is also recommended that users may hold off installing the latest Samsung Messages update until the company will be able to fix the issue.

SamSam Ransomware New Variant Requires User Interaction Prior to Infection

A new variant of the SamSam ransomware has recently been detected. It is equally robust as its popular version which caused widespread damage with its high profile attack to state agencies, hospitals, city councils, and more.

remove SamSam ransomware

 

This newly discovered, more targeted Samsam variant utilizes new techniques and alterations making it unique and more difficult to spot – it requires user interaction to start its attack. It will not execute unless the attacker running the payload manually enters a special password (via the command line) before infecting any system. This means that only the person/s who know the author’s passcode can run the ransomware. Moreover, even if the ransomware is already inside one’s system, it will not infect unless the password has already been entered. This gives researchers a hard time executing the ransomware binary or run on their test machine unless they knew the password.

 

SamSam ransomware has remained a nasty yet elusive malware. It gained its worldwide notoriety when it infected Atlanta City’s IT systems, the Colorado Department of Transportation, and several health care organisations compromising data security and leaving millions of dollars in losses.

To get protected against this notorious ransomware, basic security practices like secured passwords, performing regular backups, and employing a centralized patch management system is crucial. These will not only keep potential hackers out of your system but you will also be able to limit any damage caused and easily recover from a ransomware attack.

74 Scammers from Nigeria, US, and Others Arrested by FBI

Last July 11, 2018, the United States Department of Justice announced that they have arrested 74 individuals (42 in the US, 29 in Nigeria, and 1 each from Poland, Canada and Mauritius) because of their involvement in BEC (business email compromise) scams swindling millions of dollars from people across the globe. US law enforcement seized about $2.4 million and recovered nearly $14 million in fraudulent transfers.

BEC scam

 

BEC, also known as cyber-enabled financial fraud, is a sophisticated scam. The scam involves BEC fraudsters posing as trusted vendors or corporate executives of legit corporations. They will establish communication by sending phishing emails to firm employees with access to the company’s finances and then instruct the victims to transfer funds to accounts they control.

They also target real estate buyers and those who are not tech-savvy especially elderly users. Using social engineering techniques, they will trick them to wire money or reveal personal data.

Dubbed as “Operation Wire Wire” and coordinated by the FBI, US authorities and international law enforcements have been working with the following institutions:

  • Homeland Security Investigations
  • U.S. Attorneys’ Offices
  • Secret Service
  • Postal Inspection Services
  • Treasury Department

It took them six months to finally get hold of these criminals.

Facebook Confirms Your Data Shared With Chinese Firms

Yesterday, June 5, Facebook has confirmed that it has data-sharing partnerships with at least four Chinese companies which include:

  • Lenovo
  • Huawei (previously under scrutiny from U.S. intelligence agencies regarding security threat)
  • TCL (the present manufacturer of BlackBerry phones)
  • Oppo (OnePlus’ parent company)

facebook data sharing

 

The said agreements, dating to as far as 2010, gave the listed Chinese firms access to some of the users’ data so they could build Facebook interfaces on their own platforms. Facebook said that the data collected were stored and stayed on the users’ phones, and not on the phone manufacturers’ servers. Huawei, on their part, maintained that the company has worked with Facebook to make the latter’s services more convenient to users. It has never collected or stored any user data.

 

According to an interview with Facebook officials, the majority of these company partnerships have already wound down. However, the agreements with the four Chinese companies listed above remain in effect but they will be ending Huawei’s partnership later this week, to be followed by the other three companies as well.

 

If you’re concerned with your data being affected by this issue, don’t panic. If you’re using an iPhone, make sure to update to the latest iOS and for Android users, no need to worry. All the information you’ve shared or posted are stored on your device. Facebook simply manages the flow of information on their servers.

 

As an added precaution, consider following these tips:

  • Minimize the amount of data you are sharing
  • Change your privacy settings
  • Turn off/limit access for third-party applications
  • Avoid posting your every location
  • Turn on extra security settings
  • Only add people you know

 

Better safe than sorry, as they say!

Beware of the Black Dot “Text Bomb” Bug

There’s a new bug that is recently rendering iPhones to freeze, slow down, and crash. It is a harmless-looking message with a black dot emoji a.k.a. “the black dot of death”. This bug affects all iPhones running the most recent version of iOS, iOS 11.3 and the iOS 11.4 betas. There’s no verification yet though whether it also affects older iOS.

black dot bug

 

What Actually Happens

When a message is received containing the said emoji and eventually opened by the user, the messaging app will crash and the device locked into a white screen. This is because these messages containing the black dot emoji are followed by hundreds of thousands of invisible characters which causes the Messages app to freeze. It will then flood the iPhones’ CPU where it will overheat and a possibility of a device crash.

 

What You Can Do

The black dot “text bomb” bug can easily be transmitted. Someone will just simply send a string of texts, wait for their target to open such message and that’s it!

When your iPhone suddenly freezes because of this so-called text bomb, try force-quitting ‘Messages’ and re-open it. After which, delete the conversation with the black dot immediately.

Make sure also to update to the latest iOS when it is released. Apple will surely fix this issue and create a patch for this annoying bug.

 

 

 

How to Remove Win Speedup 2018

Win Speedup 2018 is a PUP or potentially unwanted program. It is advertised as a system optimizer and downloaded or bundled along with free programs without the users knowledge. They do not fully disclose that other software will also be installed.

Once Win Speedup 2018 is installed, it claims that several performance and security issues are detected on your computer. When you try to fix these detections, you will be obliged to buy its full version before proceeding. Any attempt to repair the said “issues” it claims opens up to a payment processing site.

How to Remove Tweakerbit Registry Optimizer (Virus Removal Guide)

Tweakerbit Registry Optimizer is a potentially unwanted program which is advertised as a system optimizer and once installed, it claims that several issues were detected on your computer. However, if you try to fix these issues, Tweakerbit Registry Optimizer will state that you need to buy its full version before being able to do so.

Tweakerbit Registry Optimizer is bundled with other free software that you download off the Internet. Unfortunately, some free downloads do not adequately disclose that other software will also be installed and you may find that you have installed an adware without your knowledge.

The Windows registry is a database that Windows and its applications store their settings in. It contains hundreds of thousands of entries. Some of the entries may be slightly outdated — maybe you’ve uninstalled a program and it left a key or two behind, or maybe a there’s a file extension with no associated application.