malware

Hackers stole data from five European nations at September G20 Summit

Hackers stole data from five European nations at September G20 Summit

Network security company FireEye has reported a coordinated malware attack on five European foreign ministries. The attack took place last August just prior to the G20 Summit in September. It was achieved by sending the ministries email attachments bearing file names pertaining to the primary topic of the summit: military options in Syria. Once downloaded, the files allowed the hackers to monitor communications and steal data from the host machines. FireEye believes the hackers are from China, but it stopped short of alleging collusion with the Chinese government.

Continue Reading

FBI hunts terror suspect through malware, Yahoo, Google

FBI hunts terror suspect through malware, Yahoo, Google

The FBI has been using malware as a means to hunt down certain suspects, as exemplified in the case of a man who has been making bomb threats since June 2012, reports the Washington Post. Some of the malware was a surveillance program planted onto the suspect's computer when he signed into his Yahoo account, but the malware didn't work. The suspect, Mohammed Arian Far -- "Mo" for short -- has not yet been apprehended, though the FBI continues its high-tech search tactics of Mo and others.

Continue Reading

Two million social media account credentials stolen and published

Two million social media account credentials stolen and published

The credentials for two million compromised accounts for social media sites and other websites have been posted online. They include credentials for Facebook, Yahoo, Google, Twitter, LinkedIn, a payroll service, and many others. The security breaches are believed to have been made possible through malware installed on user computers, not weaknesses in the websites themselves.

Continue Reading

Bitcoin mined from computers via toolbar without users’ knowledge

Bitcoin mined from computers via toolbar without users’ knowledge

Bitcoin miners are good folk, by and large. That's why it's always disheartening when we hear about a case of Bitcoin thieving and scheming. An investigation by Malwarebytes last week found that a company named Mutual Public a.k.a. We Build Toolbars a.k.a. Your Free Proxy has been installing Bitcoin mining software on unwitting users' computers through unrelated downloadable toolbars and a proxy service (and possibly other products.) The software operates in the background, bogging down the computer's CPU and mining Bitcoin for the sole profit of Mutual Public. It legitimizes the practice by explaining its activities in the nobody-ever-reads-them EULA for the installed toolbars. And the software is difficult to permanently delete.

Continue Reading

Linux-based Internet-connected devices widely vulnerable to new worm

Linux-based Internet-connected devices widely vulnerable to new worm

Symantec researcher Kaoru Hayashi has posted a report to the effect that a sizable portion of the "Internet of Things" is now vulnerable to a worm called Linux.Darlloz. The worm attacks CPUs running on devices like routers, set-top boxes, security cameras and industrial control systems, as well as PCs. The worm relies on a pre-May 2012 vulnerability still present in many devices running Linux.

Continue Reading

NSA hackers compromised at least 50,000 networks in 14 years

NSA hackers compromised at least 50,000 networks in 14 years

A large team of NSA hackers known collectively as the Tailored Access Operations (TAO) department successfully hacked 50,000 computer networks between the years 1998 and 2012, according to a new examination of the Snowden documents. A PowerPoint presentation seen this week by Dutch newspaper NRC Handelsblad revealed the statistic along with other information about the agency's Computer Network Exploitation (CNE) activities.

Continue Reading

GTA V PC Torrent strikes unlucky thieves in the wild

GTA V PC Torrent strikes unlucky thieves in the wild

The PC version of Grand Theft Auto 5 is currently in production. There is no final version out in the wild, nor is there a way for you to download this game for the PC in any way at all - it simply does not exist. That fact hasn't stopped a seemingly large amount of unknowledgeable thieves in the wild, though, as several GTA:V torrents have appeared with big downloads: one in particular bringing on some real dangerous heat.

Continue Reading

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16