malware

PC users should uninstall QuickTime for Windows ASAP

PC users should uninstall QuickTime for Windows ASAP

Most Windows users probably gave up on QuickTime as their media player of choice some time ago, but if for some reason you, or, shall we say, those who are less tech-savvy, still have it installed, you need to get rid of it right away. Two critical security flaws have been found in the aging Apple software that put PC users at great risk, so much so that even the Department of Homeland Security is advising people to uninstall the Windows version.

Continue Reading

Petya ransomware finally has a fix, no need to pay ransom

Petya ransomware finally has a fix, no need to pay ransom

Late last month, a new kind of ransomware burst into the scene and threatened not just files but entire hard drives. Unabashedly calling itself "Petya", the ransomware targeted and encrypted entire hard drives instead of single files. Not to belittle the threat, it only took a week or two for the security community to come up with a solution. Although the process is rather involved, the good news is that you won't have to pay a single cent. At least not to the malware authors or its users.

Continue Reading

Petya ransomware targets entire drives, not just files

Petya ransomware targets entire drives, not just files

Ransomware is quickly becoming the new darling among hackers looking to make a quick buck. Although it doesn't exactly jump from one infected computer to another, given how it works, it is actually more destructive and possibly more profitable than a common trojan or virus. We've seen recently what is probably the worst ransomware out in the wild. Now we're being told there's a potentially more destructive one as well. Called Petya, the ransomware tries to encrypt your entire hard drive for maximum damage and maximum profit.

Continue Reading

TeslaCrypt 3 might be the most dangerous ransomware in the wild

TeslaCrypt 3 might be the most dangerous ransomware in the wild

Software developers usually, or at least should, quickly work to patch up security holes that could be exploited to the detriment of their users. It seems almost ironic but also expected that the very same mentality and process would be used by those who write malware in order to plug up the holes in their own software. The end result is, of course, a more robust malware that is even harder to crack and fight. That does seem to be the case with TeslaCrypt 3, the latest version of a ransomware that is now proving to be impossible to crack.

Continue Reading

First Mac ransomware: Am I infected?

First Mac ransomware: Am I infected?

If you want to see your files again, cough up one Bitcoin. That's the message some unwitting Mac owners faced after accidentally installing malware on their computers, with the so-called ransomware encrypting their personal data and then charging them the equivalent of around $400 to retrieve it. Dubbed KeRanger, the malware - identified this weekend - is believed to be the first of its kind spotted in the wild.

Continue Reading

First full OS X ransomware seen in Transmission BitTorrent app

First full OS X ransomware seen in Transmission BitTorrent app

When speaking of malware, Windows is usually the poster boy for an OS that gets infected a lot almost by nature. In truth, however, no operating system is totally bulletproof. Even Apple's OS X and iOS, usually considered to be tightly guarded silos, have their fair share of intrusions. This latest incident is one such example but this time the affected platform is Apple's much larger Mac OS X. Named by security firm Palo Alto Networks as KeRanger, the ransomware's damage is worsened by the fact that it infected even legitimate installers of the Transmission BitTorrent client.

Continue Reading

How to avoid the new Netflix viruses and malware

How to avoid the new Netflix viruses and malware

Netflix scams are on the rise, so say the security crews at Tripwire and Symantec. How do you avoid such malware? How does your grandmother avoid downloading a virus? The answers are relatively simple, and they begin with sticking to the course. That is, not clicking on any advertisements that promise lower costs and coupons for Netflix-based deals on subscriptions. That's where this newest wave of internet evil is coming from - let your uncle know what's up.

Continue Reading

Malware Museum shows how past viruses were creative, artful

Malware Museum shows how past viruses were creative, artful

Today's viruses make your heart ache with sorrow and stress. Yesteryear's viruses sometimes made your heart ache from laughter. While still relatively destructive during their time period, the malware of previous decades showed one thing that is lost upon today's cybercriminals: a sense of humor. Thanks to the Internet Archive, however, those can now be relived, or reviled if you were a victim, showcasing the viruses prevalent during the 80s and 90s, in all their animated pixel art glory. Without the damaging virus itself, of course.

Continue Reading

The Malware Museum offers a look at the viruses of yesteryear

The Malware Museum offers a look at the viruses of yesteryear

Most people have a pretty good idea of what computer malware and viruses look like in the current era: pop-up windows, spam sites set as the homepage, and bogus apps installed if they're lucky, with spyware and software that allows remote hacking being some of the worst. But about in the MS-DOS era? What did computer users of yore dread when getting infected? Well, the Malware Museum offers a historic, and safe, look back at what was conjured up in the 80s and 90s.

Continue Reading

eBay aware of vulnerability allowing malware distribution, no plans to fix it

eBay aware of vulnerability allowing malware distribution, no plans to fix it

A security vulnerability was recently discovered on auction website eBay that allows hackers to embed code on their listings that in turn tricks users into downloading malware. Security researchers from Check Point Software found the loophole back in December, and even contacted eBay to make them aware of the exploit, which takes advantage of the site's rules on hosting JavaScript within listings. Unfortunately the company has said it has no plans to address the vulnerability, as they estimate the use of the exploit to be incredibly rare.

Continue Reading

Google can now scan your firmware for viruses and malware

Google can now scan your firmware for viruses and malware

When your computer gets a virus or some malware, you'll generally run some sort of antivirus scan to get rid of it. And that's all well and good, as long as the malicious code is contained somewhere on the hard drive of your machine. But what happens when the infection is somewhere deeper?

Continue Reading

Hyatt names dates and locations of credit card breach

Hyatt names dates and locations of credit card breach

Last month we brought you the news that Hyatt had discovered malware in its credit card processing systems. Obviously, that's the last place you'd want to find malware in a hotel chain. While the company said that it was investigating the issues, we didn't get much information pertaining to how long the malware was on the system, and how many locations were affected. Hyatt has come forward today to answer those questions.

Continue Reading

Prev 1 2 3 4 5 6 Next