Archive for the ‘Malware’ Category

Biggest mobile malware threat

Image via CrunchBase Facebook is biggest mobile malware threat, says security firm Researcher claims bad links on Facebook responsible for much higher infection rate that targeted mobile malware By Joan Goodchild -CSO The biggest mobile infection threat isn’t malware that specifically targets mobile devices, according to new research from security firm BitDefender. Malware that targets […]

Leave a Comment

The Basics of Stuxnet Worm and How it infects PLCs

Image by biatch0r via Flickr Considered to be the most intricately designed piece of malware ever, Stuxnet leverages attack vectors onto industrial control systems, a territory rarely ventured into by traditional malware. Stuxnet targets industries, power plants and other facilities that use automation and control equipment from the leading German industrial vendor, Siemens. The term, […]

Comments (1)

New virus threatens phones using Android

Image via Wikipedia Mobile Malware Attacks and Defense WASHINGTON (AFP) – A virus infecting mobile phones using Google’s Android operating system has emerged in China that can allow a hacker to gain access to personal data, US security experts said. A report this week from Lookout Mobile Security said the new Trojan affecting Android devices […]

Leave a Comment

Stuxnet virus could target many industries

Image via Wikipedia By LOLITA C. BALDOR, Associated Press A malicious computer attack that appears to target Iran’s nuclear plants can be modified to wreak havoc on industrial control systems around the world, and represents the most dire cyberthreat known to industry, government officials and experts said Wednesday. They warned that industries are becoming increasingly […]

Comments (1)

‘Here You Have’ worm and who takes the credit

Image via Wikipedia Malicious Mobile Code & How to Protect from Malware If you receive an email with the subject ‘Here You Have.’ or ‘Just For You’ delete the message without clicking the link. Do NOT forward the email to Security or anyone else. One version of the spam e-mail simply says, “Hello: This is […]

Leave a Comment

Symantec: SMBs Change Security Approach with Growing Threats

Image via CrunchBase By: Brian Prince A survey of small to midsize businesses from 28 different countries by Symantec found that companies are focusing more on information protection and backup and recovery. Driving these changes is a fear of losing data. Today’s small to midsize businesses (SMBs) are facing a growing threat from cyber-attacks, and […]

Leave a Comment

A home computer credit card scam and family loses 9k

Image via Wikipedia DesMoinesRegister.com Nearly $9,000 was stolen from a Des Moines family’s credit union account after their home computer was hacked. The theft occurred at the end of March. “My husband was on the computer and he’d just paid a credit card bill,” Nickie Siracusano said. “A pop-up that said PC Shields came up […]

Comments (15)

Google warns off fake Anti-Virus programs popping up online

Image by BitDefenderES via Flickr Security researchers at Google are warning that a particular type of scam is gaining momentum: fake anti-virus programs. In a blog post previewing a 13-month study on the prevalence of fake anti-virus programs on the Web, Google said that more than 11,000 individual domains were involved in the distribution of […]

Comments (3)

Spam, malware proliferate in late 2009

Image by colodio via Flickr Alejandro Martínez-Cabrera Online security firm Websense has released a report on the cyberthreat landscape during the second half of 2009, and some of the findings are jaw dropping: The firm, which scans millions of Web sites and e-mails a day looking for malicious content, found that 95 percent of all […]

Leave a Comment

Protection Suite Small Business Edition

An Easy-to-Use, All-in-One Suite Symantec™ Protection Suite Small Business Edition is an easy-to-use, all-in-one suite that protects critical business assets by securing them against today’s complex malware and spam threats, and rapidly recovering computer systems. By upgrading, you will receive multiple layers of protection through award-winning technologies from the market-leading endpoint security, messaging security, and […]

Leave a Comment

Pop-Up Security Warnings Pose Threats

Image by Travelin’ Librarian via Flickr Malware: Fighting Malicious Code By FBI NPO The FBI warned consumers today about an ongoing threat involving pop-up security messages that appear while they are on the Internet. The messages may contain a virus that could harm your computer, cause costly repairs or, even worse, lead to identity theft. […]

Comments (2)

Viruses That Leave Victims Red in the Facebook

Image by Intersection Consulting via Flickr By BRAD STONE – NYTimes.com It used to be that computer viruses attacked only your hard drive. Now they attack your dignity. Malicious programs are rampaging through Web sites like Facebook and Twitter, spreading themselves by taking over people’s accounts and sending out messages to all of their friends […]

Comments (2)

Growing social networks and widening threats

Image by Matt Hamm via FlickrThe worm targeted a social network Twitter with four attacks and created havoc for couple of days. This worm happens to self replicated itself when clicked on but didn’t steal 6 million users personal information. According to SF chronicle article by Michael Liedtke (Apr. 14 2009, c2) Twitter deleted 10,000 […]

Comments (2)

Conficker C worm and April fool

Image by david ian roberts via Flickr Worm like conficker is a digital time bomb which is hard coded to trigger on April 1 (April fool’s day). Antivirus companies are doing their best to minimize the impact of conficker worm. Conficker first variant was introduced few months back and have already caused significant amount of […]

Comments (9)

Web 2.0 and malware 2.0

A new position paper from ENISA describes the risks associated with web 2.0 and malware 2.0. Web 2.0 includes social networking, photo sharing, wikis and social bookmarking sites and malware 2.0 is defined as a web based infection in which user can be entrap by visiting website. Web 2.0 applications are thriving because of their […]

Comments (2)

Digital frames and malware threat

No doubt, the digital frame is a hot state of the art technology item today. Some digital frames in the market carry a risk of infection through a Trojan horse (malware) which is capable of monitoring keystrokes and sending useful information back to its originator. In Jan 2008 there were multiple reports that digital picture […]

Comments (3)

Harmful Spyware and their stealthier means

Spyware is utilized to gather information about a person with or without their consent and it intercept or record personal/financial information. Some spyware are capable of sending information back to another computer (originator of the spyware). Characteristic of Spyware • Compromise user machine without their knowledge • Use vulnerabilities in the software to push a […]

Comments (8)