{"id":24136,"date":"2022-08-31T10:48:01","date_gmt":"2022-08-31T14:48:01","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=24136"},"modified":"2022-08-31T10:48:01","modified_gmt":"2022-08-31T14:48:01","slug":"wednesday-newsbytes-sneaky-malware-hides-on-your-pc-you-need-a-secret-phone-number-duckduckgos-burner-email-malware-in-telescope-images-and-more","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-sneaky-malware-hides-on-your-pc-you-need-a-secret-phone-number-duckduckgos-burner-email-malware-in-telescope-images-and-more\/","title":{"rendered":"Wednesday Newsbytes: Sneaky Malware Hides on your PC, You Need a Secret Phone Number, DuckDuckGo&#8217;s Burner Email, Malware in Telescope Images\u00a0 &#8230;and more!"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Wednesday Newsbytes: Sneaky Malware Hides on your PC, You Need a Secret Phone Number, DuckDuckGo&#8217;s Burner Email, Malware in Telescope Images\u00a0 &#8230;and more!<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day we scan the tech world for interesting news in the world of technology and sometimes from outside the world of technology. Every Wednesday, we feature some news articles that grabbed our attention over the past week. We hope you find this week&#8217;s\u00a0 &#8216;Wednesday Newsbytes&#8217; informative and interesting!<\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-cryptocurrency-mining-malware-hides-on-windows-pc-for-a-month-before-launching\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">This sneaky malware hides on your PC for a month before going to work<\/span><\/strong><\/a><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif; color: #999999;\">Cybersecurity researchers warn about a campaign that infects PCs via bogus software downloads.<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Crypto-mining malware is being hidden in fake versions of popular software distributed via free download sites and is avoiding detection by waiting for a month before it runs in a campaign that has infected Windows PCs around the world.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Dubbed Nitrokod, the malware campaign has been active since at least 2019 and has been detailed by cybersecurity researchers at Check Point.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Crypto miners \u2013 also known as cryptojackers \u2013 are a form of malware that secretly exploit the computing power of infected devices to mine for cryptocurrency.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The process often goes undetected and the victim of the attack doesn&#8217;t receive the cryptocurrency, which is sent to the malware operator, who is likely using a large network of infected devices to generate as much cryptocurrency as possible, without the cost of using their own computing power or electricity&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-cryptocurrency-mining-malware-hides-on-windows-pc-for-a-month-before-launching\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline; font-size: 18pt;\">Read more at ZDNet<\/span><\/strong><\/span><\/a><\/p>\n<blockquote>\n<hr \/>\n<p><a href=\"https:\/\/www.ibtimes.com\/reasons-you-need-secret-phone-number-how-get-one-3605716\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Reasons You Need A Secret Phone Number And How To Get One<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A phone number is a personal identifier that people use to contact someone. While it may seem okay to hand out your number to everyone you meet, it&#8217;s not always the best idea.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">If you&#8217;re not careful, you could inadvertently give out your number to a scammer or someone with malicious intent. And that&#8217;s where a secret phone number comes in handy.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">These numbers can be used for a variety of purposes, such as temporary business numbers, disposable numbers for online dating, or one-time use when signing up for new services. It&#8217;s not always easy to get a secret phone number but isn&#8217;t impossible either.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Why do you need a secret phone number?<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">There are a few reasons why you should never hand out your phone number to people you&#8217;ve just met. First, you don&#8217;t know them personally. They could be someone harmless just looking for a new friend, or possibly a dangerous criminal.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Second, giving out your phone number can lead to unwanted calls or texts from that person. Even if their intentions are good, they might not respect your boundaries and could become a nuisance.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Finally, your phone number is a personal piece of information that should be kept private.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">You can also consider using a secret phone number if you&#8217;re dating online or meeting people in person through a dating app. You may not want to share your contact details with someone you&#8217;ve just met, and an alternate phone number allows you to keep your personal information private until you get to know someone better.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Additionally, it can be a good way to manage your time and schedule. If you&#8217;re only giving out your phone number to people you&#8217;re interested in, you can avoid wasting time on unwanted calls and messages. This can also be a great way to protect yourself from harassment or stalking.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">How to get one?<\/span><\/strong><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 14pt;\">Burner<\/span><\/strong><\/span><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Burner is a mobile app that generates temporary, disposable secret phone numbers. This number can be used for anonymous calling and texting and is often used by people who want to avoid being tracked&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.ibtimes.com\/reasons-you-need-secret-phone-number-how-get-one-3605716\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 18pt;\">Read more at International Business Times<\/span><\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/lifehacker.com\/duckduckgo-can-now-block-your-emails-from-being-tracked-1849461485\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">DuckDuckGo Can Now Block Your Emails From Being Tracked<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">DuckDuckGo&#8217;s feature creates burner email addresses whenever a company asks you for yours.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">When you open an email, there\u2019s no obvious indication the sender will know. It\u2019s not like Facebook Messenger, which sends an overt read receipt any time you open a message. However, the sender can include a small, pixel-sized image in the email, which identifies when we open it. In turn, it tells the sender (narc). It\u2019s known as a pixel tracker, and it\u2019s one example of how email is not a privacy-friendly service.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Tech companies have begun to fight back, however. Last year, Apple implemented \u201cHide My Email\u201d for its suite of products, which generates a unique \u201cburner\u201d address each time you need to share your email with a company. That burner address forwards your messages to your real address, so you never need to share it with shady services.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">DuckDuckGo started testing a similar feature in July of last year, opening the beta to a limited pool of users. If you wanted to give it a try, though, you had to be placed on a waitlist. Now, the feature is available for anyone to try.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">DuckDuckGo hides your email and protects your privacy<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">DuckDuckGo offers you two types of email addresses. The first is a personal Duck Address. You pick the name, and it never changes (for example, j&#x61;k&#101;&#x70;e&#x74;e&#64;&#x64;u&#x63;&#x6b;.&#x63;o&#109;). The second is a private, uniquely generated Duck Address. Any time you need to share your email with a service, DuckDuckGo will generate a new address for you to use. That way, you don\u2019t need to share your email with each and every company looking to abuse your personal data. Instead, they only get the burner account.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Both the personal and private Duck Addresses forward their emails to your primary address (your Gmail, for example). That lets you hand away your Duck Addresses to any service that wants it, without needing to give away your personal email address&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/lifehacker.com\/duckduckgo-can-now-block-your-emails-from-being-tracked-1849461485\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Read more at<\/span><span style=\"text-decoration-line: underline; font-family: helvetica, arial, sans-serif; font-size: 18pt;\"> Lifehacker<\/span><\/strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\"><strong>.<\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-hide-malware-in-james-webb-telescope-images\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Hackers hide malware in James Webb telescope images<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Threat analysts have spotted a new malware campaign dubbed \u2018GO#WEBBFUSCATOR\u2019 that relies on phishing emails, malicious documents, and space images from the James Webb telescope to spread malware.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The malware is written in Golang, a programming language that is gaining popularity among cybercriminals because it is cross-platform (Windows, Linux, Mac) and offers increased resistance to reverse engineering and analysis.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In the recent campaign discovered by researchers at Securonix, the threat actor drops payloads that are currently not marked as malicious by antivirus engines on the VirusTotal scanning platform.<\/span><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Infection chain<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The infection starts with a phishing email with an attached malicious document, \u201cGeos-Rates.docx\u201d, which downloads a template file.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">That file contains an obfuscated VBS macro that auto-executes if macros are enabled in the Office suite. The code then downloads a JPG image (\u201cOxB36F8GEEC634.jpg\u201d) from a remote resource (\u201cxmlschemeformat[.]com\u201d), decodes it into an executable (\u201cmsdllupdate.exe\u201d) using certutil.exe, and launches it.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">n an image viewer, the .JPG shows the galaxy cluster SMACS 0723, published by NASA in July 2022.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">However, if opened with a text editor, the image reveals additional content disguised as an included certificate, which is a Base64-encoded payload that turns into the malicious 64-bit executable.<\/span><\/p><\/blockquote>\n<p><span style=\"text-decoration: underline; font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-hide-malware-in-james-webb-telescope-images\/\" target=\"_blank\" rel=\"noopener\">Read more at Bleeping Computer<\/a>.<\/strong><\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/betanews.com\/2022\/08\/29\/facial-recognition-the-good-the-bad-and-the-getting-older\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Facial recognition &#8212; the good, the bad and the getting older<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Your friends may not be willing to tell you that you&#8217;re looking older, but facial recognition systems have no such reservations.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Face-recognition algorithms might struggle to identify you as the same person after just five years, according to the New Scientist.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">As we increasingly turn to biometrics to secure our systems, the team at Ping Identity has been looking in more detail at the pros and cons of facial recognition systems.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Accuracy is increasingly high with Google FaceNet being 99.63 percent accurate when matching 13,000 pictures of faces from across the web, and Facebook&#8217;s DeepFace technology having a true positive rate of 97.25 percent.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">However, it isn&#8217;t infallible, in 2019, hackers cracked Apple&#8217;s iPhone FaceID user authentication in around two minutes. Data stored in biometric recognition systems also needs to be properly secured to prevent it falling into the wrong hands. And there are privacy concerns, firms may share or even sell facial data to third parties, allowing them to recognize and follow you.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Because the technology relies on algorithms there&#8217;s also a risk that it can develop unconscious racial and sexual biases depending on the data used to train it and the numbers in the database. Also, as noted above, additional images may be needed regularly to cope with ageing and changes in appearance&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/betanews.com\/2022\/08\/29\/facial-recognition-the-good-the-bad-and-the-getting-older\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at BetaNews.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.usatoday.com\/story\/tech\/2022\/08\/28\/when-was-internet-created-who-invented-it\/10268999002\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">When was the internet invented? What to know about the creators of it and more.<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day, you click and tap on devices, most likely using the internet to answer questions you have, stay up to date with current events and stay connected with people in the world around you.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The internet and its modern form, however, has changed over the years and is relatively new. While young people today grew up with the internet, many people did not. So when was the internet created? And who invented it? We have the answers for you.<\/span><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">When was the internet invented?<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The birth date of the internet is widely considered to be Jan. 1, 1983, but the road to creating it started long before the technology required for the internet even existed.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The creation of the internet involved the work of many scientists and engineers, with many of the people who worked to create it having a vision of the internet long before the technology to create it was invented, according to History.com. As far back as the early 1900s inventor Nikola Tesla had thought of a \u201cworld wireless system.\u201d (Yes, the electric car company Tesla is named for him).<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">According to History.com, &#8216;the first practical schematics for the internet would not arrive until the early 1960s,&#8217; when Joseph Carl Robnett Licklider came up with a vision of using computer networks to communicate&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.usatoday.com\/story\/tech\/2022\/08\/28\/when-was-internet-created-who-invented-it\/10268999002\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at USA Today.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<p><span style=\"color: #d333ff; font-family: helvetica, arial, sans-serif;\"><strong><em><span style=\"font-size: 18pt;\">Thanks for reading this week&#8217;s Wednesday Newbytes. We hope you found these articles informative, interesting, fun, and\/or helpful. Darcy &amp; TC<\/span><\/em><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Wednesday Newsbytes: Sneaky Malware Hides on your PC, You Need a Secret Phone Number, DuckDuckGo&#8217;s Burner Email, Malware in Telescope Images\u00a0 &#8230;and more! Every day we scan the tech world for interesting news in the world of technology and sometimes from outside the world of technology. Every Wednesday, we feature some news articles that grabbed our\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-sneaky-malware-hides-on-your-pc-you-need-a-secret-phone-number-duckduckgos-burner-email-malware-in-telescope-images-and-more\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":23363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4179,1461,3428,1433,1678,1669,1674,4372],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24136"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=24136"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24136\/revisions"}],"predecessor-version":[{"id":24137,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24136\/revisions\/24137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/23363"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=24136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=24136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=24136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}