Main Logo
  • Services
  • Academy
  • Shop
  • Blog
  • Contact Us
Main Logo
  • Services
  • Academy
  • Shop
  • Blog
  • Contact Us
News
  • July 8, 2021
  • by Writing Department
Retirement Of Onion Service Protocol Version 2

On July 2nd, 2020, Tor Project Inc. announced that the Internet has around 16 months to migrate from onion service protocol v2 to v3. The planned deprecation timeline was outlined as follows:

1. The first step to this transition started on the 15th day of September 2020. On that date the Tor browser version 0.4.4.x started to warn onion service operators and clients that v2 is deprecated and will be obsolete in Tor version 0.4.6.

2. The next step to this transition is yet to happen on the 15th day of this month (July 2021). That is the actual date that Tor version 0.4.6.x will no longer support onion service protocol v2 and support will be removed from the codebase.

3. The end of this transition will happen on October 15th, 2021. On that date, new stable versions of the Tor browser series will be released that will disable onion service protocol v2. (Source: Tor Project Inc.)

Android Crypto Mining Scam

Security researchers at the Lookout Threat Lab have identified over 170 Android apps, including 25 on Google Play, scamming people interested in cryptocurrencies. Based on the analysis, attackers have been able to scam more than 93,000 people and stole at least $350,000 between users paying for apps and buying additional fake upgrades and services. Even though Google promptly removed these apps from Google Play, Android users should be careful about these attacks. (Source: Lookout Threat Lab)

Avast Decode Crackonosh Malware

A malware named Crackonosh which is making some antivirus programs such as Avast diminish from computers has been detected and decoded by Avast software company. Czech is suspected to be the author of the malware. Crackonosh has been circulating since at least June 2018 and has yielded over $2,000,000 USD for its authors in Monero from over 222,000 infected systems worldwide. Crackonosh is distributed along with illegal, cracked copies of popular software and searches for and disables many popular antivirus programs as part of its anti-detection and anti-forensics tactics. It uses Windows safe mode to disable Antivirus programs found in the AV folder on the victim’s computer. These Antiviruses include Adaware, Bitdefender, Escan, F-secure, Kaspersky, Mcafee (scanner only), Norton, Panda, etc.

It is advisable to always update your anti-malware programs and be careful when downloading cracked and open source software over the internet.

(Source: Avast)

You might also be interested in our blog posts such as “HOW TO PROTECT YOURSELF AGAINST CYBER-ATTACKS” and “HOW TO DOWNLOAD AND INSTALL MICROSOFT WINDOWS 11 BETA“.

Previous Post
Next Post

Post comment

Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • WhatsApp Hacking : Protecting Yourself Against WhatsApp Attacks
  • CYBER ATTACKS & DATA BREACHES REVIEW- SEPTEMBER 2021
  • CYBER ATTACKS & DATA BREACHES REVIEW- AUGUST 2021
  • CYBER ATTACKS & DATA BREACHES REVIEW- JULY 2021
  • CYBER NEWS-WEEKLY SUMMARY

Categories

  • Blog
  • Monthly Cyber Security Review
  • News
  • News – Weekly Summary
  • Uncategorized

Category

  • Blog
  • Monthly Cyber Security Review
  • News
  • News – Weekly Summary
  • Uncategorized

Subscribe

Error: Contact form not found.

© Copyright 2024 Cyber Master Business Centre.

  • Terms
  • Privacy
  • Contact
Complete To Download