Remove Instant Access Dialer (virus) – Removal Guide

From 2-spyware.com

Instant Access Dialer

Instant Access Dialer, otherwise known as Dialer:Win32/InstantAccess, is a malicious program that is designed to change the settings of a dialup connection. By doing so, the virus is able to automatically connect to a website that uses premium dialup costs, consequently resulting in serious financial losses for the victim.

If you are using a dialup connection for your internet, this malware is a dangerous threat for you, and you should take precautionary measures to avoid it in the future. If you are already infected, check the information in this article in order to restore your normal settings and remove the Instant Access Dialer virus for good.

Read more…

Emerging hacking tool ‘EtterSilent’ mimics DocuSign, researchers find

From cyberscoop.com

Hackers are using a new, malleable malicious document builder to run their criminal schemes, according to Intel 471 research published Tuesday.

The document builder, known as EtterSilent, has been advertised in a Russian cybercrime forum and comes in two versions, according to the research. One exploits a vulnerability in Microsoft Office, CVE-2017-8570, and one uses a malicious macro.

One version of EtterSilent imitates the digital signature product DocuSign, though when targets click through to electronically sign documents, they are prompted to enable macros. This allows the attackers to target victims with malware.

Read more…

IT security budgets to increase over the next 12 months

From helpnetsecurity.com

IT security budgets increase

IT security budgets are spiralling out of control as organizations adapt to the everywhere workplace, an Ivanti survey reveals.

92% of CISOs highlighted the need to deploy additional security measures to better enable and secure employees as they work from anywhere as the primary budget growth driver. 80% of CISOs also pinpointed the need to replace passwords with more secure forms of authentication.

Read more…

IBM creates a COBOL compiler – for Linux on x86

From theregister.com

IBM has announced a COBOL compiler for Linux on x86.

News of the offering appeared in an announcement that states: “IBM COBOL for Linux on x86 1.1 brings IBM’s COBOL compilation technologies and capabilities to the Linux on x86 environment,” and describes it as “the latest addition to the IBM COBOL compiler family, which includes Enterprise COBOL for z/OS and COBOL for AIX.”

COBOL – the common business-oriented language – has its roots in the 1950s and is synonymous with the mainframe age and difficulties paying down technical debt accrued since a bygone era of computing.

Read more…

DARPA adds RISC-V to its Toolbox: Defense researchers can get special access to SiFive chip designs

From theregister.com

Engineers and scientists working on American military research programs can now access RISC-V processor core designs and associated blueprints through DARPA’s Toolbox, and use the technology in their prototypes and experiments.

The RISC-V chip designs will be provided by SiFive, which late last week announced a Toolbox licensing agreement with DARPA aka the US government’s Defense Advanced Research Projects Agency.

Toolbox attempts to lower the barriers and costs for entry into the world of chip design and manufacturing, at least for DARPA projects.

Read more…

Cyber Hygiene: 5 Advanced Tactics to Maximize Your Risk Reduction

From tenable.com

Cyber Hygiene: 5 Advanced Tactics to Maximize Your Risk Reduction

All businesses can significantly boost their information security by implementing fundamental elements of cybersecurity – vulnerability scanning, patch application, antivirus and anti-malware tools, firewalls and companywide security policies featuring well-established best practices. These should all be standard procedures for your company, given the risks businesses face today (which are considerable, as we saw in part one of this series). 

That said, those measures shouldn’t be your organization’s be-all, end-all, at least not across the board. In part two of our deep dive into cyber hygiene, we’ll take a look at the more substantial (and, in some cases, more complex) factors you should consider when looking to devise a truly effective infosec strategy for your business. 

Read more…