malware

Proposal seeks to lock copyright infringing computers, force owners to contact police

Proposal seeks to lock copyright infringing computers, force owners to contact police

The Internet-using public is no stranger to off-the-wall plans and ideas to stop the so-called blight of copyrighted content sharing, but a new proposal recently submitted to the government is perhaps unlike any before it in terms of craziness. In a report, the Commission on the Theft of American Intellectual Property proposed many ways piracy can be combated, including infecting alleged violators' computers with malware that can wreck havoc, including and up to destroying the user's computer.

Continue Reading

Fake Firefox spreads spyware as makers Mozilla retort

Fake Firefox spreads spyware as makers Mozilla retort

Mozilla has sent out a cease-and-desist letter to Gamma International, who has been disguising commercial malware as Mozilla's Firefox web browser. Gamma's software uses Mozilla's trademarks and brand to mislead consumers into thinking its product is affiliated with the company. In the properties of the fake Firefox browser, all of the information, including version number, copyright, trademark claims, and more are exactly the same as the genuine Firefox browser.

Continue Reading

NQ: Malware on mobile devices grew 163% last year

NQ: Malware on mobile devices grew 163% last year

According to a security report from NQ Mobile Security, mobile malware is on the high rise. In 2012, malware infections grew by 163% year-over-year. There were 65,227 newly discovered mobile malware floating around, compared to the 24,794 that were discovered back in 2011. The malware is beginning to spread to various markets, including China, India, Russia, the United States, and Saudi Arabia.

Continue Reading

Skype trojan turns your computer into a Bitcoin miner

Skype trojan turns your computer into a Bitcoin miner

There is a Skype trojan going around that is turning PCs into Bitcoin miners. So far, victims are mostly located in countries like Italy, Russia, Poland, Costa Rica, Spain, Germany, and a few others. Bitcoin Mining is a another way for users to acquire Bitcoin's currency by "making computer hardware do mathematical calculations for the Bitcoin network to confirm transactions and increase security."

Continue Reading

Apple’s Phil Schiller tells Android users to “be safe out there”

Apple’s Phil Schiller tells Android users to “be safe out there”

Android is no stranger to malware. We've seen several instances of fake apps making their way into the Google Play store that are infested with malicious code, and while it just takes common sense to weed out the fake apps, some users can be unlucky enough to miss a couple and end up installing malware on their Android devices. Apple's senior vice president of worldwide marketing, Phil Schiller, wants to remind you all to "be safe out there."

Continue Reading

MiniDuke virus attacks government institutions all around the world

MiniDuke virus attacks government institutions all around the world

It looks like this just isn’t Adobe’s week. A new virus, called MiniDuke, has been attacking government institutions all around Europe and the United States using a security exploit in the Adobe Reader program. The virus is sent around as a very credible looking PDF file. The file carries information about a human rights seminar (ASEM), Ukraine’s foreign policy, and NATO membership plans. But while the information might seem credible on the surface, it secretly uploads malware onto the computer and disguises itself from various anti-malware, anti-virus, and other cyber-security programs.

Continue Reading

Stuxnet virus existed 2 years prior to attacks

Stuxnet virus existed 2 years prior to attacks

Researchers from Symantec have uncovered more information about Stuxnet, the virus that was used to damage Iran’s main nuclear enrichment facilities back in 2007. The Stuxnet virus was speculated to be created solely to damage the nuclear plants in Iran. In an 18-page report by Symantec, it turns out that the existence of Stuxnet dates back to 2005. The virus was called Stuxnet 0.5 at the time, but there isn't any word yet on whether or not this version of the virus was used to do any damage.

Continue Reading

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15