protocols

AppWizard
April 30, 2025
The Google Play Store's app count has decreased from approximately 3.4 million in early 2024 to around 1.8 million today, a 47% decline. This reduction is attributed to stricter quality control measures implemented by Google in July 2024, which targeted malfunctioning apps and those with limited functionality. Google reported blocking 2.36 million apps for policy violations and banning over 158,000 developer accounts linked to harmful activities. In contrast, the Apple App Store's app count rose from 1.6 million to 1.64 million during the same period. Additionally, a new EU regulation requires developers to disclose their names and addresses in app listings, with non-compliance risking delisting from EU markets. Despite the decline, 10,400 new applications were launched on the Play Store this year, indicating a 7.1% increase compared to last year.
Winsage
April 29, 2025
Microsoft has reintroduced its Recall feature, initially designed for Qualcomm Snapdragon X-powered laptops, which captures snapshots of users' desktops to help locate old documents, images, and web pages. Enhanced security measures have been implemented, including Windows Hello sign-in, data encryption, and isolation protocols, with all data processed locally on users' devices. Recall is an opt-in feature that can be removed. Additionally, Microsoft has introduced an AI-powered Windows search mechanism that allows users to search for files by description. These features are currently exclusive to devices with Qualcomm Snapdragon X processors, with support for AMD Ryzen AI 300 series and Intel Core Ultra 200V series chips expected later this year. Users without compatible hardware must rely on traditional file management methods.
Winsage
April 27, 2025
A recent survey by Canalys revealed that over a third (35%) of channel partners reported their small and medium-sized business (SMB) clients are either unaware of the upcoming end-of-service (EoS) deadline for Windows 10 or lack a plan to transition away from it. Additionally, 14% of respondents admitted they do not know that support for Windows 10 is ending on October 14, 2025. The market for business PCs is growing, with a 9.4% year-on-year increase in shipments, reaching 62.7 million units in Q1 2025. Experts warn that the lack of upgrade plans could lead to significant financial repercussions for SMBs, especially with rising tariffs and potential supply constraints. A structured approach for transitioning to Windows 11 is recommended, including assessing current hardware, evaluating application compatibility, developing a timeline for upgrades, budgeting for investments, training staff, and implementing endpoint security strategies.
AppWizard
April 25, 2025
Recent findings from cybersecurity experts at ESET revealed that several Android applications, disguised as harmless tools, have been secretly recording conversations and stealing sensitive data. These malicious apps infiltrated devices through the Google Play Store and third-party platforms, compromising the privacy of thousands of users. One tactic used by cybercriminals involved romantic deception, where victims were coaxed into downloading a seemingly harmless messaging app containing the VajraSpy Trojan, which activated upon installation to record conversations and harvest personal data. The identified malicious apps fall into three categories: 1. Standard Messaging Apps with Hidden Trojans: These apps, including Hello Chat, MeetMe, and Chit Chat, request access to personal data and operate silently in the background, stealing contacts, SMS messages, call logs, device location, and installed app lists. 2. Apps Exploiting Accessibility Features: Apps like Wave Chat exploit Android’s accessibility features to intercept communications from secure platforms, record phone calls, keystrokes, and ambient sounds. 3. Single Non-Messaging App: Nidus, a news app, requests a phone number for sign-in and collects contacts and files, increasing the risk of data theft. The 12 malicious Android apps identified include: Rafaqat, Privee Talk, MeetMe, Let’s Chat, Quick Chat, Chit Chat, YohooTalk, TikTalk, Hello Chat, Nidus, GlowChat, and Wave Chat. The first six apps were available on the Google Play Store and had over 1,400 downloads before removal. Users are advised to uninstall these apps immediately to protect their personal data.
AppWizard
April 21, 2025
A screening of the "Minecraft Movie" in Melbourne on April 15 at the HOYTS theater in Ringwood was disrupted when a fire extinguisher was accidentally activated, causing a cloud of foam that led to confusion and panic among moviegoers. Eyewitnesses reported choking and crying as they evacuated the theater. Theater management confirmed that safety protocols were followed and emergency services ensured all individuals were unharmed. Reactions on social media varied, with some expressing disbelief and others finding humor in the situation.
AppWizard
April 19, 2025
A vulnerability known as “Dirty Stream” was discovered by Microsoft, allowing malicious applications to hijack trusted apps on high-end Android devices. Although the flaw has been patched, any data accessed before the patch remains vulnerable. The vulnerability exploited the ContentProvider system in Android, enabling harmful apps to send deceptive files that could overwrite critical data in secure storage. Microsoft noted that this could lead to arbitrary code execution, giving attackers full control over applications and access to sensitive user data. Several popular Android apps were found to be vulnerable, with over four billion installations affected. It is crucial to promptly install security updates and maintain app vigilance to protect personal data.
Winsage
April 19, 2025
A vulnerability in Windows, identified as CVE-2025-24054, is being exploited in phishing campaigns targeting government and private organizations. Initially considered low-risk, it was addressed in Microsoft's March 2025 Patch Tuesday updates. Following the release of these patches, Check Point observed a rise in exploitation attempts, particularly linked to the Russian group APT28. Attackers sent phishing emails with Dropbox links containing .library-ms files, which, when accessed, connected to an external SMB server controlled by the attackers, allowing interception of NTLM hashes. A subsequent wave of attacks involved .library-ms files sent as direct attachments, requiring minimal user interaction to exploit the vulnerability. The malicious ZIP archive also contained files exploiting older NTLM vulnerabilities. Check Point identified the attackers' SMB servers with specific IP addresses. Despite being classified as medium-severity, the vulnerability's potential impact is significant, prompting organizations to apply the March 2025 updates and consider disabling NTLM authentication if not essential.
AppWizard
April 18, 2025
New Jersey has filed a lawsuit against Discord, alleging that the platform's safety measures for young users are inadequate and misleading. The lawsuit claims that Discord's safety protocols have exposed children to violent content, harassment, and sexual abuse, despite the company's assertions that it provides a "safe space for teens." Key concerns include the platform's ineffective age-verification process, which allows children under 13 to access the app, and the failure of its "Safe Direct Messaging" feature to effectively scan for explicit content. Discord has expressed surprise at the legal action and maintains its commitment to improving safety on the platform.
Winsage
April 17, 2025
Cybercriminals are exploiting a vulnerability in Windows systems known as CVE-2025-24054, which involves NTLM hash disclosure through spoofing techniques. This flaw allows attackers to leak NTLM hashes, leading to privilege escalation and lateral movement within networks. It is triggered when a user extracts a ZIP archive containing a malicious .library-ms file, causing Windows Explorer to initiate SMB authentication requests that expose NTLMv2-SSP hashes. Exploitation of this vulnerability began shortly after a security patch was released on March 11, 2025, with campaigns targeting government and private institutions in Poland and Romania. These campaigns utilized spear-phishing emails containing malicious ZIP archives, which, when interacted with, leaked NTLM hashes. The malicious files included various types designed to initiate SMB connections to attacker-controlled servers, allowing for pass-the-hash attacks and privilege escalation. The stolen hashes were sent to servers in several countries, indicating potential links to state-sponsored groups. One campaign involved Dropbox links that exploited the vulnerability upon user interaction. Microsoft has recommended immediate patching, enhancing network defenses, user education, network segmentation, and regular security audits to mitigate risks associated with this vulnerability.
Search