Personal data of 80,000 netizens hostage hacker

Ransomware become one of the threats to watch out for in 2016, because this attack is very beneficial for hackers. Since April 2016, Kaspersky Lab has detected CryptXXX ransomware attacks against at least 80,000 netizens worldwide.

More than half are located in six countries: the United States, Russia, Germany, Japan, India, and Canada. However, these statistics are based on the users who have been protected by Kaspersky Lab detection technologies.

The worrying thing is the actual number of total users attacked by ransomware the perpetrator is certainly much higher.

The real figure is unknown, but experts Kaspersky Lab estimates that there may be a few hundred thousand users were infected.

Ransomware CryptXXX has the ability to infect thousands of PCs around the world and previously was not possible to fully decrypt files that are victims of this malicious program. However, now it is not an impossible thing.

To avoid attacks ransomware, Kaspersky Lab’s security experts suggest, if there is currently no decryption tools are available for versions of malware that encrypts files, never pay ransom to the hacker.

Keep the corrupt file and be patient. Probability decryption tools that appear in the near future is quite high. Kaspersky CryptXXX v.3 consider the case as proof of this suggestion. Some security specialists around the world are working hard to help victims of ransomware. Sooner or later the solution to most of ransomware victims would be found.

Suggestions from other Kaspersky Lab is proactively protect themselves from the outset. You do this by backing up data regularly on portable data storage media that is not constantly connected to the computer all the time.

Then install a good security solution. According to recent independent study showed that Kaspersky Internet Security is very good at detecting ransomware.

To note, after releasing the tool descriptions for the two variants of ransomware CryptXXX in April and May 2016, Kaspersky Lab again released a new decryptor for the encrypted files by the latest version of the malware’s various hostage-takers.

Facebook has just Acquisition Startup Face Recognition

Video and pictures to Facebook almost certainly still be the main focus, considering the consumption of two such content continues to increase. One of the strategic steps Facebook is acquiring several startups or startups.

The latest, Facebook announced it has acquired a startup with an unspecified value. Startup named FacioMatrics developed an algorithm based on machine learning that allows smartphones to recognize faces in real-time, through the camera.

FacioMetrics team is expected to bring more fun effects to your photos and videos on Facebook. Not only that, Facebook user experience will certainly be better in the future.

Thus, after this agreement, all applications created FacioMetrics has been removed from the App Store and Google Play Store. For information, FacioMetrics founded in 2015 and is made to respond to the increased demand analysis system faces. Actually, this is not the first time Facebook acquires startup in similar fields. In March 2016, the company has acquired the live application filters and face swap ‘modifiers face’, Masqurade (MSQRD).

In addition through the acquisition, Facebook also continues to present the latest features for video and image sharing service hers.

Although the feature rolled out is still limited, Facebook now allows users to broadcast live Live with artistic filters belonging to Prisma application.

Acquisitions and the presence of brand-new features, according to analysts, is Facebook’s strategy to continue to compete with Snapchat, especially, after Zuckerberg failed to buy the company. Unlimited Facebook, currently some services of its subsidiaries, such as Instagram, also often equated with Snapchat.

Twitter continues to add features to send messages in Direct Message

Direct Message (DM) on Twitter again got new capabilities. The presence of these features makes the experience of texting on the microblogging site was becoming rich.

This time, Twitter launched a feature that lets users know who sent the message has arrived at the destination. There is a blue check mark next to the message that indicates a read.

This feature is only available to users of mobile apps on Android and iOS. However, this feature will also be present on the Twitter website.

Users can also set if do not want a message sent to her own views.

To turn it off, users can through Twitter security page. But keep in mind this feature is two-way. So when a user to turn it off, he also could not tell if someone else has read the message or not.

In addition to these features, Twitter also presents another feature that makes texting via Direct Message increasingly similar chat application in general.

Through DM, users can now find out if someone is typing a message, similar to the existing capabilities in WhatsApp.

Not only that, the link sent via DM can also be displayed preview. This view is similar to the link that is usually given through a regular tweet. Later these features will be rolled out gradually to users of Twitter worldwide.

For information, Twitter is being intensively reforming the Direct Message feature. Since last year, a growing presence of brand-new features to enrich the experience of using the messaging service.

Previously, the company is now led by Jack Dorsey that adds to the character limit of 140 characters prior messages to 10 thousand characters. Users also possible to send emoji, GIF, and videos directly from the Direct Message.

Google Duo version of Android Downloaded 5 Million Times in a week

Google Duo recently reported impressive scoring record. Video call application has now been downloaded 5 million times on Android devices in just a week.

Good news is delivered directly by the CEO of Google, Sundar Pichai via his Twitter account @sundarpichai.

Until this news was revealed, cuitannya been retweeted 611 times and bagging as many as 1,558 heart, this means that users of the Google duo’s enthusiasm is quite high.

Google Duo claimed as video call application with a simple concept, through this application Android and iOS users can make video calls smoothly, though with a less stable connection.

Google said, Duo is designed to provide convenience. Simply register the phone number, users can directly contact people on your contact list without having to create a separate account.

Do not stop there, Duo comes with a design that is “friendly” and so efficiently. Users can take advantage of features ‘Knock Knock’ which made him see callers before you can answer the call.

Additionally, Google designed a duo with an emphasis on privacy and security, so that all calls are encrypted Duo application from beginning to end (end-to-end encrypted).

Android Nougat Ready to Launch on 22 August

The timely launch of Android 7.0 is almost certain Nougat. Based on the latest information from mobile operators from Canada, Telus, the latest Android operating system will be launched on 22 August.

Information from Telus is expected to participate include accurate enough because Android security update information for multiple devices at once.

Huawei and LG Nexus Nexus 6P 5X into two series of the first phone that will receive the update to Android 7.0 Nougat. However, there might no changes were made regarding the schedule for the launch of the new operating system.

This information was also confirmed by LG websites also briefly displays a special page of the test LH G5 OS that will be conducted on September 22, 2016.

Given Nexus 5X made by the South Korean company, it is also possible LG got the Android Open Source Project code first.

Besides LG, several other vendors such as Sony also said to have received the most new AOSP code. That way, vendors are expected to have more time to prepare and adjust to their device needs an update.

Unfortunately, other Nexus series is uncertain when it will obtain the update. However, based on previous information, other than 6P and Nexus5X Nexus, Nexus 5 is another series phones will receive an update to Android 7.0 Nougat.

News of the latest version of Android’s presence is quite fast, only about 5 months. After the developer version slide in March 2016 and then, the final version for developers has been released in July.

Deciding on the Best Way to Store Photos and Videos

There is a famous comedian who has a joke about how in the past individuals had photo albums that were from specific events or vacations. Nowadays, he says that individuals have computers that store all the photos and videos from certain events. So he says that he has a computer from when he was single, he has a computer for when his kids were born, and he has a computer for his wedding. Each of these computer stores photos and videos from that time period.

In addition to being funny, this idea really shows that people have a lot of information they want to store. This is true no matter if you are talking about an individual or if you are talking about a business. Individuals have important documents, photos, videos, music, movies, and much more that they store on to their computer and storage devices. Businesses have a lot of information that needs to be stored, including past business records, tax papers, inventory lists, and more. This underscores the importance of creative storage systems.

When it comes to finding the right kind of storage system for photos, videos, and any kind of paperwork, security is of utmost importance. First, you do not want to physically lose the storage system. For this reason, some individuals have decided to store USBs and other external storage devices that they have in a fireproof safe in their home. If their home experiences a fire or there is some other disaster, their information will be protected. Second, security is important when it comes to protecting your identity and not having your information stolen digitally. For this reason, if you are looking to store your information online, you want to be sure to work with a reputable company.

You also want to find something that is appropriate for the amount of storage you need. This is especially true if you are going to make a decent size investment in the storage system that you are using. If you are going to be storing photos, videos, and important personal documents, you may need to not need to spend a fortune on storage. However, when it comes to important business documents, you may be willing to spend a little bit more in order to to protect the interests of your business. As you are looking for appropriate storage, you want to consider your current and future needs.

5 Steps to Secure Data from Ransomware Attack

Business segments becoming increasingly attractive target for developers cipher-malware. According to Kaspersky Lab’s report, based on data from Kaspersky Security Network (KSN), the number of attacks on the corporate sector in the period 2015-2016, compared with 2014-2015 grew six-fold (from 27,000 to 158,000).

This fact shows that the ransomware try to encrypt the data of each one in ten users B2B.

Cyber criminals who use ransomware attack often start businesses, especially small and medium enterprises (SMEs).

This trend is confirmed by IT Security Risks 2016 report from Kaspersky Lab and B2B International, where 42% of respondents from small and medium enterprises (SMEs) agreed that crypto-malware is one of the most serious threats they face last year.

For small companies, even though in the short period can lead to significant losses or even bringing all their operations stopped completely.

If a company has not taken appropriate steps to ensure the security of important data, then buy the decryption key from cyber criminals is the only way to recover the data.

However, this does not guarantee complete data recovery. The best way to protect enterprises from malware is to prevent attacks early on.

Kaspersky Lab experts recommend to companies of small and medium enterprises (SMEs) to follow the 5 steps following these simple safety rules.

1. Make a backup copy of all important files on a regular basis. Companies must have two backups. One in the cloud (eg Dropbox, Google Drive, etc.), and another in an additional server or on a removable medium if the data volume is not too large.

2. Use well-known and trusted service providers who invest for security. Usually you can find the security recommendations on the company’s website. They also published an audit of the security in the cloud infrastructure from third parties.

Do not assume that the cloud provider has absolutely no security issues, availability or data leakage. This raises the question, what would you do if you delete the data security provider.

There should be a data backup and restore process transparent data in conjunction with data protection and access control.

3. Avoid the use of security services and anti-malware software for free. Usually small businesses expect basic security features in free solution offered is sufficient.

Free security solution does provide basic protection, but often they fail to provide layered security support.

Instead, look at a special solution, which does not require a large investment, but is able to provide a higher level of protection.

4. Regularly update the OS, browser, anti-virus, and other applications. Cyber criminals use the vulnerabilities in the most popular software to infect users of the device.

5. Prevent the precarious situation of the TI – invite experts to configure enterprise security solutions. Small businesses typically do not have an IT department or a dedicated full-time administrator.

Companies rely only on employees who best understand IT issues to deal with computer problems, in addition to regular duty.

Do not wait until an incident occurs, use of IT support IT service providers to review the software and security configuration from the outset.

“Crypto-malware threat that is increasingly serious, not only the company suffered a loss of money for the ransom, but the business could be paralyzed during the recovery process file. Vector of attack is quite extensive including website, email, exploitation software, USB devices, and others,” said Konstantin Voronkov, Head of Product Management Endpoint Kaspersky Lab via email.

To avoid infection, he added, IT personnel must explain where the attack originated and these employees should not open email attachments, visit the web from untrusted sources or connect a USB device to a computer that does not have protection.

Voronkov said anti-malware solutions become important measure to avoid security incidents occur frequently.

If there are files of companies that are ciphered, it does no harm and is worth a try. If at all possible, to restore the file using the free facilities or key decryptor