malware

Apple’s Phil Schiller tells Android users to “be safe out there”

Apple’s Phil Schiller tells Android users to “be safe out there”

Android is no stranger to malware. We've seen several instances of fake apps making their way into the Google Play store that are infested with malicious code, and while it just takes common sense to weed out the fake apps, some users can be unlucky enough to miss a couple and end up installing malware on their Android devices. Apple's senior vice president of worldwide marketing, Phil Schiller, wants to remind you all to "be safe out there."

Continue Reading

MiniDuke virus attacks government institutions all around the world

MiniDuke virus attacks government institutions all around the world

It looks like this just isn’t Adobe’s week. A new virus, called MiniDuke, has been attacking government institutions all around Europe and the United States using a security exploit in the Adobe Reader program. The virus is sent around as a very credible looking PDF file. The file carries information about a human rights seminar (ASEM), Ukraine’s foreign policy, and NATO membership plans. But while the information might seem credible on the surface, it secretly uploads malware onto the computer and disguises itself from various anti-malware, anti-virus, and other cyber-security programs.

Continue Reading

Stuxnet virus existed 2 years prior to attacks

Stuxnet virus existed 2 years prior to attacks

Researchers from Symantec have uncovered more information about Stuxnet, the virus that was used to damage Iran’s main nuclear enrichment facilities back in 2007. The Stuxnet virus was speculated to be created solely to damage the nuclear plants in Iran. In an 18-page report by Symantec, it turns out that the existence of Stuxnet dates back to 2005. The virus was called Stuxnet 0.5 at the time, but there isn't any word yet on whether or not this version of the virus was used to do any damage.

Continue Reading

Offshore oil rigs suffer from malware attacks

Offshore oil rigs suffer from malware attacks

Several offshore oil rigs have been infected with malware accidentally downloaded from its workers’ personal computers. The malware seems to be originating from pirated videos and music that has been downloaded through the satellite connections used by the rigs, as well as pirated material that were already existing on the workers' computers. These malware attacks shed light on several security gaps that could lead to serious dangers, from well blowouts to fatalities.

Continue Reading

Bamital Botnet destroyed: Microsoft, Symantec victorious

Bamital Botnet destroyed: Microsoft, Symantec victorious

This week the Botnet known as Bamital has been reported dead by the two warriors that claim to have killed it: Symantec and Microsoft. This report shows that the death of said botnet will take down its abilities in full: hijacking search results galore being the main evil this Bamital creature was working with. Each time a user in the line of fire searched for something using search engines from whens they'd be sent to a malicious 3rd party site, having malware installed from that point.

Continue Reading

Three charged over “Gozi” computer virus

Three charged over “Gozi” computer virus

Three men involved in creating and distributing the "Gozi" virus that infected over one million computers worldwide have been officially charged today. The group's hack allowed them to steal millions of dollars from users over a five-year period, stealing passwords and various banking information, like credit card numbers and bank account information.

Continue Reading

Multiple power plant workstations slammed by malware

Multiple power plant workstations slammed by malware

According to the Homeland Security Department, multiple power plants in the United States were affected by malware during the beginning of October 2012. While details are relatively scarce, it was revealed that one of the power plants had been infected via a USB flash drive. The infection happened during a software update.

Continue Reading

Java tipped in Red October – may be Homeland Security’s hang-up

Java tipped in Red October – may be Homeland Security’s hang-up

Over the past several days, the US Department of Homeland Security has issued warnings against using Java due to newly discovered security weaknesses - today it's been tipped that the Red October cyberespionage attacks may have had their own Java iterations. The two have not been put together by the Israeli IT security firm Seculert, the group that today suggests Red October was implemented not just via email downloads and USB sticks, but through web-based Java exploits as well. Could that and Homeland Security's warning be timed both right here at this point in time together without any relation to one another?

Continue Reading

Operation Red October cyberattack detailed by Kaspersky Lab

Operation Red October cyberattack detailed by Kaspersky Lab

This week the Moscow-based antivirus company Kaspersky Lab has revealed details of a five year long campaign that apparently targeted diplomatic, governmental and scientific-research organizations across the former Soviet Union. This attack used software known as Operation Red October, aka Rocra, a piece of malware designed to locate and make copies of both encrypted and non-encrypted documents in a target's computer. This attack appears to have been spread across hundreds of victims since 2007 with an intent on gathering classified information as well as geopolitical intelligence.

Continue Reading

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15