By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy

A report backed by the Dutch Ministry of Justice and Security is warning government institutions not to use Microsoft's Office Online or mobile applications due to potential security and privacy risks. A report from Privacy Company, which was commissioned by the ministry, found that Office Online and the Office mobile apps should be banned from government work. The report found the apps were not in compliance with a set of privacy measures Redmond has agreed to with the Dutch government. The alert notes that in May of this year Microsoft and the government of the Netherlands agreed to new privacy terms after a 2018 report, also compiled by Privacy Company, found that Office 365 ProPlus was gathering personal information on some 300,000 workers via its telemetry features and storing them in the US. These included such things such as email addresses and translation requests. While other Windows and Office apps have been brought in compliance with those rules and no longer gather the user information, the Privacy Company said that the mobile apps and Office online are still gathering information about user activity, as are some of the features in Windows 10 Enterprise. "Moreover, certain technical improvements that Microsoft has implemented in Office 365 ProPlus are not (yet) available in Office Online," Privacy Company said, "From at least three of the mobile apps on iOS, data about the use of the apps are sent to a US-American marketing company that specializes in predictive profiling." For more visit OUR FORUM.

A new version of the TrickBot banking Trojan continues its evolution of targeting security software in order to prevent its detection and removal. In this new version, TrickBot has set its sights on Windows Defender, which for many people is the only antivirus installed on a Windows 10 machine. TrickBot is a banking Trojan that attempts to steal online banking credentials, cryptocurrency wallets, browser information, and other credentials saved on your PC and browser. When TrickBot is executed it first starts a loader that gets the system ready by disabling Windows services and processes associated with security software and performing elevation to gain higher system privileges. When that is completed, it will load the "core" component by injecting a DLL that then downloads modules used to steal information from the computer, contains the communication layer, and perform other tasks. Prior to this version, the TrickBot loader would perform a basic targeting of Windows Defender, soon to be called Microsoft Defender. Because that wasn't enough, in a new TrickBot sample found by security researchers MalwareHunterTeam and Vitali Kremez, who reverse-engineered it, it is seen that the Trojan has added further attempts to disable Windows Defender. As you can see below, TrickBot has now added 12 additional methods to target and disable Windows Defender and Microsoft Defender APT in Windows as shown below. These methods utilize either Registry settings or the Set-MpPreference PowerShell command to set Windows Defender preferences. When TrickBot detects certain security programs installed, it will configure a debugger for that process using the Image File Execution Options Registry key. This causes the debugger to launch before the program that is executed, and if that debugger does not exist, the expected program will fail to launch. More complete details can be found on OUR FORUM.

Europe’s top court has made a ruling that could affect scores of websites that embed the Facebook  ‘Like’ button and receive visitors from the region. The ruling by the Court of Justice of the EU states such sites are jointly responsible for the initial data processing — and must either obtain informed consent from site visitors prior to data being transferred to Facebook or be able to demonstrate a legitimate interest legal basis for processing this data. The ruling is significant because, as currently seems to be the case, Facebook’s Like buttons transfer personal data automatically, when a webpage loads — without the user even needing to interact with the plug-in — which means if websites are relying on visitors’ ‘consenting’ to their data being shared with Facebook they will likely need to change how the plug-in functions to ensure no data is sent to Facebook prior to visitors being asked if they want their browsing to be tracked by the ad tech giant. The background to the case is a complaint against online clothes retailer, Fashion ID, by a German consumer protection association, Verbraucherzentrale NRW — which took legal action in 2015 seeking an injunction against Fashion ID’s use of the plug-in which it claimed breached European data protection law. Like ’em or loathe ’em, Facebook’s ‘Like’ buttons are an impossible-to-miss component of the mainstream web. Though most Internet users are likely unaware that the social plug-ins are used by Facebook to track what other websites they’re visiting for ad targeting purposes. The Fashion ID case predates the introduction of the EU’s updated privacy framework, GDPR, which further toughens the rules around obtaining consent — meaning it must be purpose-specific, informed and freely given. Today’s CJEU decision also follows another ruling a year ago, in a case related to Facebook fan pages, when the court took a broad view of privacy responsibilities around platforms — saying both fan page administrators and host platforms could be data controllers. Complete details can be found on OUR FORUM.