protective measures

Tech Optimizer
May 21, 2025
A newly developed security program called Defendnot can deceive and disable Windows Defender, even without legitimate antivirus software installed. It alters the system to appear as a genuine antivirus program, allowing hackers to neutralize Windows Defender's protective measures. Defendnot operates through an undocumented API that antivirus software uses to register with the Windows Security Center, causing Microsoft Defender to deactivate. Developed by security researcher es3n1n, Defendnot injects a DLL file into the Taskmgr.exe process, misleading Windows into believing an antivirus is present. Although created for research purposes, it can be misused by cybercriminals. Microsoft Defender recognizes Defendnot as a Trojan and quarantines it upon detection.
Tech Optimizer
May 19, 2025
A researcher using the pseudonym es3n1n has created a tool called Defendnot that manipulates Windows operating systems to disable Microsoft Defender, making devices vulnerable to malware. Defendnot simulates the presence of a legitimate antivirus by using an undocumented API in the Windows Security Center, convincing Windows that a valid antivirus is installed. This development raises concerns about cybersecurity, as it undermines the effectiveness of built-in antivirus protections like Windows Defender.
Winsage
May 17, 2025
In August 2024, a security update aimed at improving Secure Boot disrupted dual-booting of Windows and Linux due to a vulnerability in the GRUB bootloader. This allowed malicious actors to bypass Secure Boot protections. Microsoft released a patch, KB5058385, on May 13, 2025, to resolve the issue by enhancing the Secure Boot Advanced Targeting (SBAT) system's ability to recognize legitimate Linux bootloaders, preventing them from being blocked. The patch is applicable to various versions of Windows, including Windows 11 (multiple versions) and Windows Server (multiple versions). The update will be automatically applied through Windows Update for affected installations.
AppWizard
May 14, 2025
Google is implementing new features to enhance security for Android users against phone call scams. Users will be restricted from sideloading applications or granting sensitive permissions while on a call with an unknown contact, receiving a notification that states, “This setting is blocked to protect your device.” Google has also prevented users from disabling its Play Protect security service during calls. These measures are available for devices running Android 16. Additionally, Google is piloting a feature for banking apps in the UK that alerts users of a “likely scam” when accessing these apps while sharing their screen with an unknown caller. Users can choose to end the call or face a 30-second delay before accessing their banking app’s screen. This feature will roll out for devices running Android 11 and newer. These updates build on existing scam protection tools, including AI that identifies potential scam callers and integrates scam detection into Google Messages.
Winsage
May 2, 2025
Microsoft has decided not to address a significant security vulnerability in its Windows Remote Desktop Protocol (RDP) that allows users to log into machines using outdated cached passwords, even after those passwords have been updated or changed. This situation creates a potential backdoor for unauthorized access, raising security concerns. Microsoft defends this functionality as a design choice to prevent users from being locked out of their machines, prioritizing accessibility over security.
Tech Optimizer
April 27, 2025
In recent years, the belief that iOS devices are "immune" to viruses has been challenged as cybercriminals increasingly target these platforms. Apple’s security measures, including sandboxing, help isolate apps to prevent the spread of malware. The App Store is strictly controlled, with Apple reviewing apps for security compliance, resulting in few harmful applications being reported. Antivirus software available in the App Store, from companies like McAfee and Norton, operates under the same constraints as other apps and cannot directly access the operating system kernel. Users are advised to avoid jailbreaking their devices, enable automatic updates, and take precautions such as avoiding public charging stations and regularly reviewing app permissions. Utilizing a password manager or VPN can enhance security, and those who have experienced data breaches may consider identity theft protection.
AppWizard
April 19, 2025
A vulnerability known as “Dirty Stream” was discovered by Microsoft, allowing malicious applications to hijack trusted apps on high-end Android devices. Although the flaw has been patched, any data accessed before the patch remains vulnerable. The vulnerability exploited the ContentProvider system in Android, enabling harmful apps to send deceptive files that could overwrite critical data in secure storage. Microsoft noted that this could lead to arbitrary code execution, giving attackers full control over applications and access to sensitive user data. Several popular Android apps were found to be vulnerable, with over four billion installations affected. It is crucial to promptly install security updates and maintain app vigilance to protect personal data.
Search