passwords

Tech Optimizer
August 21, 2025
Cisco Talos researchers have identified a new malware framework called PS1Bot, active since early 2025, which spreads primarily through malvertising. PS1Bot is crafted using PowerShell and can steal sensitive information, log keystrokes, take screenshots, and gain unauthorized control over systems. It is capable of extracting passwords, browser cookies, and cryptocurrency wallet seed phrases. The malware operates stealthily using in-memory execution to avoid detection by antivirus software and checks for antivirus presence before launching attacks. It spreads through malicious online advertising, where users may download a compressed file containing the malware. Cisco Talos has noted ongoing enhancements to PS1Bot, with similarities to other malware families suggesting a connection among cybercriminals.
Winsage
August 21, 2025
LibreOffice 25.8 has been released by The Document Foundation, supporting GNU/Linux, Android, macOS, and Windows. Key enhancements include up to 30% faster file opening times in Writer and Calc, support for exporting to PDF 2.0, optimized memory management, and improved scrolling for large documents. New features include a Viewer mode for read-only access, background images as bitmap thumbnails, SHA384 with AES_192 encryption, streamlined PDF signature timestamping, enhanced import capabilities for encrypted PDFs, and support for Bitcoin currency. Writer introduces a new Move Line hyphenation rule, improved text selection control, and collaborative features like per-window track changes. Calc adds new functions and customizable conditional formatting, while Impress improves font management for PowerPoint compatibility. The user interface features various enhancements, including a diacritic matching option and hyperlink insertion via the context menu. LibreOffice 25.8 is available for download, with support through seven maintenance updates until June 12, 2026.
AppWizard
August 21, 2025
Android's Identity Check feature will be enhanced in the Android 16 QPR2 update, requiring biometric-only authentication for apps using the biometric prompt, eliminating screen lock credentials as a fallback. This aims to improve security for sensitive applications by preventing unauthorized access, particularly in untrusted environments. The update expands Identity Check to more applications, ensuring that access necessitates biometric verification. Users can activate this feature through Settings on their Pixel devices. Future updates may allow the use of a smartwatch as a trusted unlock mechanism, bypassing biometric authentication when connected.
AppWizard
August 19, 2025
Recent research from Arizona State University and Citizen Lab has identified connections among three families of Android VPN applications with over 700 million downloads, raising concerns about user privacy and security. The analysis revealed three groups of VPN providers: 1. Group A: Eight apps from three providers sharing identical Java code and libraries, exhibiting vulnerabilities such as: - Collecting location data against privacy policies. - Using weak encryption methods. - Hard-coded Shadowsocks passwords that could allow traffic decryption. 2. Group B: Eight apps from five providers supporting only the Shadowsocks protocol, sharing libraries and hard-coded passwords, with all servers hosted by GlobalTeleHost Corp. 3. Group C: Two providers with one app each, using a custom tunneling protocol and sharing similar code, vulnerable to connection inference attacks. The research highlighted significant privacy breaches, including undisclosed location data collection and vulnerabilities that could allow eavesdroppers to decrypt communications. Alarmingly, these VPN providers are linked to Qihoo 360, a Chinese company that has concealed this connection, raising concerns about potential data sharing with the government due to China's strict laws. Additionally, the Tech Transparency Project found that many free VPN apps on the Apple App Store are also linked to companies in mainland China or Hong Kong without disclosing these ties.
AppWizard
August 14, 2025
A new spyware campaign targeting Android users, identified as LunaSpy, has been reported by cybersecurity firm Kaspersky and is believed to have been operational since at least February 2025. This malware disguises itself as antivirus software delivered through messenger applications. It can record audio and video, access texts, call logs, and contacts, execute shell commands, steal passwords, track locations, and record the device screen. LunaSpy spreads primarily through messenger platforms like Telegram, where users receive messages urging them to install the app. Users are advised to download applications only from official sources like the Google Play Store and to be cautious with third-party sources. They should also block installations from unknown sources, review app permissions, and uninstall any suspicious applications immediately. A factory reset can remove malware if necessary, provided important data is backed up.
Tech Optimizer
August 14, 2025
LunaSpy is a deceptive antivirus application that spreads primarily through Telegram and is not available on the official Google Play Store. It masquerades as a legitimate antivirus program, claiming to protect online banking activities. Upon installation, it conducts a superficial scan and displays false warnings to instill fear, prompting users to grant extensive permissions. Once installed, it can invade personal data, access banking information, record audio and video, steal passwords, read SMS messages, track locations, and has been found to include a command for photo theft. Users are advised to avoid downloading LunaSpy and to exercise caution with applications from social networks or unofficial sources, relying instead on verified antivirus solutions from official app stores.
Search