Friday, 10 February 2017

Brandedlogodesigns reviews:Iranian malware attacks Windows and Mac PCs

With a simple trick, the MacDownloader accesses passwords. The malware is intended to have employees of US armaments companies and human rights activists.
Disguised as an Adobe Flash installer and BitDefender adware removal tool, the MacDownloader malware attempts to forward passwords to its creators. This is what the two security researchers Claudio Guarnieri and Collin Anderson write in a report.
With a simple trick, the MacDownloader accesses passwords. The malware is intended to have employees of US armaments companies and human rights activists.
Disguised as an Adobe Flash installer and BitDefender adware removal tool, the MacDownloader malware attempts to forward passwords to its creators. This is what the two security researchers Claudio Guarnieri and Collin Anderson write in a report.
The two researchers describe the malware as the "first attempt of an amateur developer". Because the MacDownloader was sloppily programmed and the system dialogs full of writing errors. The malicious software is nevertheless dangerous: according to computerworld.com the virus database VirusTotal did not recognize the MacDownloader.
Armaments companies and human rights activists
Guarnieri and Anderson explain that the malware on a fake website of the American aviation company United Technologies emerged. The site was used in a spear-phishing attack via email to spread Windows malware.Meanwhile, the pest also attacks Mac computers.
The main goal was to be the first staff of US armaments companies like Lockheed Martin or Boeing, who were on the fake websiteFree courses and programs were lured into the trap. Later, the malware, according to security researchers, had also targeted human rights activists. For security and stability reasons, these would increasingly rely on Apple products, especially in Iran, and may therefore be better protected against malware.

Wednesday, 8 February 2017

BrandedLogoDesigns Reviews: Google returns original URLs in AMP

Google changes the URL ad to Accelerated Mobile Pages (AMP) after criticism from publishers. These had complained that Google taps their traffic.
With Google's Accelerated Mobile Pages (AMP) project, Internet browsing on mobile devices is to be accelerated by providing optimized versions of publisher websites that do not include third-party scripts or other extensions. So far, so good - but when forwarding AMP content, so far the AMP URL was visible in the address field, which could lead to confusion when sharing the article.
This is where Google is now following the critics of publishers, adding a new header under the URL line, which tells users which website the article comes from.
The feature allows users to share the displayed permalink over a long fingerprint on the new header.
The feature is already activated in the iOS Google app and is to be introduced in the coming weeks also for Android, according to Google in the developer blog.


In January 2017, Google had already screwed to AMP to make images and data load even faster.