malware

FBI hunts terror suspect through malware, Yahoo, Google

FBI hunts terror suspect through malware, Yahoo, Google

The FBI has been using malware as a means to hunt down certain suspects, as exemplified in the case of a man who has been making bomb threats since June 2012, reports the Washington Post. Some of the malware was a surveillance program planted onto the suspect's computer when he signed into his Yahoo account, but the malware didn't work. The suspect, Mohammed Arian Far -- "Mo" for short -- has not yet been apprehended, though the FBI continues its high-tech search tactics of Mo and others.

Continue Reading

Two million social media account credentials stolen and published

Two million social media account credentials stolen and published

The credentials for two million compromised accounts for social media sites and other websites have been posted online. They include credentials for Facebook, Yahoo, Google, Twitter, LinkedIn, a payroll service, and many others. The security breaches are believed to have been made possible through malware installed on user computers, not weaknesses in the websites themselves.

Continue Reading

Bitcoin mined from computers via toolbar without users’ knowledge

Bitcoin mined from computers via toolbar without users’ knowledge

Bitcoin miners are good folk, by and large. That's why it's always disheartening when we hear about a case of Bitcoin thieving and scheming. An investigation by Malwarebytes last week found that a company named Mutual Public a.k.a. We Build Toolbars a.k.a. Your Free Proxy has been installing Bitcoin mining software on unwitting users' computers through unrelated downloadable toolbars and a proxy service (and possibly other products.) The software operates in the background, bogging down the computer's CPU and mining Bitcoin for the sole profit of Mutual Public. It legitimizes the practice by explaining its activities in the nobody-ever-reads-them EULA for the installed toolbars. And the software is difficult to permanently delete.

Continue Reading

Linux-based Internet-connected devices widely vulnerable to new worm

Linux-based Internet-connected devices widely vulnerable to new worm

Symantec researcher Kaoru Hayashi has posted a report to the effect that a sizable portion of the "Internet of Things" is now vulnerable to a worm called Linux.Darlloz. The worm attacks CPUs running on devices like routers, set-top boxes, security cameras and industrial control systems, as well as PCs. The worm relies on a pre-May 2012 vulnerability still present in many devices running Linux.

Continue Reading

NSA hackers compromised at least 50,000 networks in 14 years

NSA hackers compromised at least 50,000 networks in 14 years

A large team of NSA hackers known collectively as the Tailored Access Operations (TAO) department successfully hacked 50,000 computer networks between the years 1998 and 2012, according to a new examination of the Snowden documents. A PowerPoint presentation seen this week by Dutch newspaper NRC Handelsblad revealed the statistic along with other information about the agency's Computer Network Exploitation (CNE) activities.

Continue Reading

GTA V PC Torrent strikes unlucky thieves in the wild

GTA V PC Torrent strikes unlucky thieves in the wild

The PC version of Grand Theft Auto 5 is currently in production. There is no final version out in the wild, nor is there a way for you to download this game for the PC in any way at all - it simply does not exist. That fact hasn't stopped a seemingly large amount of unknowledgeable thieves in the wild, though, as several GTA:V torrents have appeared with big downloads: one in particular bringing on some real dangerous heat.

Continue Reading

NSA-themed ransomware exploits recent government leaks to scam PC users

NSA-themed ransomware exploits recent government leaks to scam PC users

FBI-themed ransomware has been around for a long time, scaring non-tech savvy computer users into believing the government agency had identified them as violating various laws, threatening jail time if a "fine" isn't paid immediately. While many have fallen prey to the scam, never before have users been so vulnerable towards believing the nature of these attacks as now, in light of a myriad of leaks showing government spying on domestic data. Scammers have taken advantage of this public fear, generating NSA-theme ransomware telling users they've been pegged for various crimes under the PRISM program.

Continue Reading

Public Intelligence releases Android threat warning from Homeland Security and the FBI

Public Intelligence releases Android threat warning from Homeland Security and the FBI

There's a report out there today appearing with the public dissemination of nearly-secret information site Public Intelligence that has the USA-centered Homeland Security organization and FBI showing Android as a threat for Malware nationwide. This report shows that because Android 2.3 Gingerbread it still a widespread operating system, Google's own mobile system is a threat to citizens on a level that deserves attention. That's Android 2.3.3 through 2.3.7, released in 2011, and the government suggests that a change needs to be made.

Continue Reading

Security firm reveals unauthorized advertisement injections on YouTube

Security firm reveals unauthorized advertisement injections on YouTube

The security firm Spider.io revealed that a California-based company called Sambreel was using its software to inject advertisements on YouTube, according to a report on the company's website. Sambreel's subsidiary Yontoo was responsible for two programs designed to make downloading videos off of YouTube simple, both of which have been pulled after Spider.io revealed its findings.

Continue Reading

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15