malware

Petya ransomware targets entire drives, not just files

Petya ransomware targets entire drives, not just files

Ransomware is quickly becoming the new darling among hackers looking to make a quick buck. Although it doesn't exactly jump from one infected computer to another, given how it works, it is actually more destructive and possibly more profitable than a common trojan or virus. We've seen recently what is probably the worst ransomware out in the wild. Now we're being told there's a potentially more destructive one as well. Called Petya, the ransomware tries to encrypt your entire hard drive for maximum damage and maximum profit.

Continue Reading

TeslaCrypt 3 might be the most dangerous ransomware in the wild

TeslaCrypt 3 might be the most dangerous ransomware in the wild

Software developers usually, or at least should, quickly work to patch up security holes that could be exploited to the detriment of their users. It seems almost ironic but also expected that the very same mentality and process would be used by those who write malware in order to plug up the holes in their own software. The end result is, of course, a more robust malware that is even harder to crack and fight. That does seem to be the case with TeslaCrypt 3, the latest version of a ransomware that is now proving to be impossible to crack.

Continue Reading

First Mac ransomware: Am I infected?

First Mac ransomware: Am I infected?

If you want to see your files again, cough up one Bitcoin. That's the message some unwitting Mac owners faced after accidentally installing malware on their computers, with the so-called ransomware encrypting their personal data and then charging them the equivalent of around $400 to retrieve it. Dubbed KeRanger, the malware - identified this weekend - is believed to be the first of its kind spotted in the wild.

Continue Reading

First full OS X ransomware seen in Transmission BitTorrent app

First full OS X ransomware seen in Transmission BitTorrent app

When speaking of malware, Windows is usually the poster boy for an OS that gets infected a lot almost by nature. In truth, however, no operating system is totally bulletproof. Even Apple's OS X and iOS, usually considered to be tightly guarded silos, have their fair share of intrusions. This latest incident is one such example but this time the affected platform is Apple's much larger Mac OS X. Named by security firm Palo Alto Networks as KeRanger, the ransomware's damage is worsened by the fact that it infected even legitimate installers of the Transmission BitTorrent client.

Continue Reading

How to avoid the new Netflix viruses and malware

How to avoid the new Netflix viruses and malware

Netflix scams are on the rise, so say the security crews at Tripwire and Symantec. How do you avoid such malware? How does your grandmother avoid downloading a virus? The answers are relatively simple, and they begin with sticking to the course. That is, not clicking on any advertisements that promise lower costs and coupons for Netflix-based deals on subscriptions. That's where this newest wave of internet evil is coming from - let your uncle know what's up.

Continue Reading

Malware Museum shows how past viruses were creative, artful

Malware Museum shows how past viruses were creative, artful

Today's viruses make your heart ache with sorrow and stress. Yesteryear's viruses sometimes made your heart ache from laughter. While still relatively destructive during their time period, the malware of previous decades showed one thing that is lost upon today's cybercriminals: a sense of humor. Thanks to the Internet Archive, however, those can now be relived, or reviled if you were a victim, showcasing the viruses prevalent during the 80s and 90s, in all their animated pixel art glory. Without the damaging virus itself, of course.

Continue Reading

The Malware Museum offers a look at the viruses of yesteryear

The Malware Museum offers a look at the viruses of yesteryear

Most people have a pretty good idea of what computer malware and viruses look like in the current era: pop-up windows, spam sites set as the homepage, and bogus apps installed if they're lucky, with spyware and software that allows remote hacking being some of the worst. But about in the MS-DOS era? What did computer users of yore dread when getting infected? Well, the Malware Museum offers a historic, and safe, look back at what was conjured up in the 80s and 90s.

Continue Reading

eBay aware of vulnerability allowing malware distribution, no plans to fix it

eBay aware of vulnerability allowing malware distribution, no plans to fix it

A security vulnerability was recently discovered on auction website eBay that allows hackers to embed code on their listings that in turn tricks users into downloading malware. Security researchers from Check Point Software found the loophole back in December, and even contacted eBay to make them aware of the exploit, which takes advantage of the site's rules on hosting JavaScript within listings. Unfortunately the company has said it has no plans to address the vulnerability, as they estimate the use of the exploit to be incredibly rare.

Continue Reading

Google can now scan your firmware for viruses and malware

Google can now scan your firmware for viruses and malware

When your computer gets a virus or some malware, you'll generally run some sort of antivirus scan to get rid of it. And that's all well and good, as long as the malicious code is contained somewhere on the hard drive of your machine. But what happens when the infection is somewhere deeper?

Continue Reading

Hyatt names dates and locations of credit card breach

Hyatt names dates and locations of credit card breach

Last month we brought you the news that Hyatt had discovered malware in its credit card processing systems. Obviously, that's the last place you'd want to find malware in a hotel chain. While the company said that it was investigating the issues, we didn't get much information pertaining to how long the malware was on the system, and how many locations were affected. Hyatt has come forward today to answer those questions.

Continue Reading

Hyatt hotels reveal malware discovered in payment systems

Hyatt hotels reveal malware discovered in payment systems

Following a series of hotel chains that have recently disclosed the presence of malware in their payment processing systems, Hyatt has come forward as the latest to fall victim. The chain says it made the discovery on November 30th, and is advising any guests who stayed at a Hyatt in recent months to double-check their bank statements for signs of fraud.

Continue Reading

In response to Superfish, Microsoft will block adware at OS level

In response to Superfish, Microsoft will block adware at OS level

Early this year, Lenovo was placed on the hot seat after word of the Superfish adware pre-installed on many of its devices became public. Since then, there has been an increased scrutiny of similar traps that lurk within OEM computers, especially those baked inside the OS or even the firmware. In response to these kind of attacks, Microsoft announced that it will enforce a new security model starting next year that will disallow that kind of software on Windows and instead force advertisers to abide by browser features and rules.

Continue Reading

Prev 1 2 3 4 5 6 7 Next