Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $25,472
31%  
Woo hoo!! And we're now over 31%!! Thank you all very much!! God bless.

Keyword: trojan

Brevity: Headers | « Text »
  • Trickbot trojan found to now have the ability to modify a computer's UEFI

    12/04/2020 8:35:07 AM PST · by BenLurkin · 48 replies
    Tech Xplore ^ | 12/04/2020 | Bob Yirka
    A combined team of security experts from Advanced Intelligence and Eclypsium has announced that the Trickbot trojan malware now has the ability to modify a computer's Unified Extensible Firmware Interface—the interface between the firmware on a computer motherboard and the computer's operating system—in this case, Microsoft Windows. Trickbot has been in the news of late due to its advanced capabilities. It has a modular design and is notable for its ability to gain administrative capabilities on infected computers. The entities behind the creation of the trojan are believed to be criminals in Russia and North Korea, and they have used...
  • New Mac malware in the wild evades security software, researchers

    07/01/2019 8:16:13 AM PDT · by Swordmaker · 41 replies
    MacDailyNews ^ | July 1, 2019
    New Mac malware in the wild evades security software, researchers Roger Fingas for AppleInsider: Newly uncovered Mac malware is not only in the wild, but trying to avoid detection by security researchers, according to one such firm. Dubbed “CrescentCore,” the malware comes as it usually does —in the form of a DMG file pretending to be an Adobe Flash Player installer, Intego said. If someone launches its contents, the software will check to see if it’s running inside a virtual machine — a way researchers often quarantine their subjects. The malware also checks for several popular antivirus tools, and if...
  • Obama And Former Italian PM Renzi Are Holding Secret Meeting Today – Experts Including Papadop

    06/18/2019 10:00:39 AM PDT · by bitt · 28 replies
    TEAPARTY.ORG ^ | 6/17/2019
    (Gateway Pundit) – Much has happened since our post May 25th – “Rumors Swirling that Fired Italian Spies Were Connected in Plot to Eliminate Trump”. The Gateway Pundit reported on rumors swirling that the recent firings of top Italian spies were related to Obama and a plot to set up candidate and President Trump during the 2016 election. As reported on May 25th==>> Earlier this month Italian Prime Minister Conte asked for the resignations of four top intelligence officials after his call with President Donald Trump. And now another Internet Sleuth has uncovered some shocking news related to the recent...
  • EXCLUSIVE: Rumors Swirling that Fired Italian Spies Were Connected in Plot to Eliminate Trump

    05/26/2019 7:52:14 AM PDT · by bitt · 131 replies
    GATEWAY PUNDIT ^ | 5/25/2019 | Joe Hoft
    Rumors are swirling that the recent firings of top Italian spies were related to Obama and a plot to set up candidate and President Trump in a Hillary email scandal. Earlier this month Italian Prime Minister Conte asked for the resignations of four top intelligence officials after his call with President Donald Trump. And now another Internet Sleuth has uncovered some shocking news related to the recent removal of these top Italian intelligence ministers from their positions as top spies in the government. The story begins in January 2017 when Computer World wrote about alleged crimes committed by Italian Giulio...
  • Common Tech Myths Debunked

    11/04/2017 11:42:08 AM PDT · by fireman15 · 25 replies
    JFG Inc. Technology for Business ^ | 11/02/2017 | JFG Team
    Myth: Apple computers can’t get viruses Truth: Apple computers are susceptible to malware just like Windows PCs. Apple once bragged they were not as susceptible until a Trojan infected thousands of computers in 2012. To learn more about how to protect against malware see Cyber Security: The Onion Approach Myth: It’s harmful to plug your phone in before the battery is drained. Truth: Much like the myth of leaving your phone plugged in to charge for extended periods of time, this is also false. In fact, it could even be beneficial to plug your phone into the charger prior to...
  • CIA Didn’t Trust FBI or NSA – Created Bogus Updates to Steal Data & Spy on Fellow Agencies

    08/25/2017 10:48:09 PM PDT · by Ernest_at_the_Beach · 19 replies
    wccftech.com ^ | 8/25/17 | Rafia Shaikh
    The Central Intelligence Agency apparently didn’t trust its partners in the American intelligence and created a fake software update to steal their data. Part of an internal project called ExpressLane, the bogus update was installed by the CIA Office of Technical Service (OTS) agents purported to be upgrading the biometric collection system.This biometric system was installed at the “liaison services” that included National Security Agency, Department of Homeland Security, and the Federal Bureau of Intelligence. The agency reportedly installed these at partner offices around the world to gain biometric data that was collected by the other agencies. The scathing revelation...
  • Pre-installed Trojan in Cheap Android Devices Steal Data, Intercept Chats

    07/31/2017 3:57:49 AM PDT · by TigerLikesRooster · 16 replies
    Hackread ^ | July 30, 2017
    Pre-installed Trojan in Cheap Android Devices Steal Data, Intercept Chats Android devices are one of the most vulnerable mobile OS (operating systems) due to its open source nature. But what would a user do if their device is delivered to them with a pre-installed malware? Well, Let’s talk about that. IT security researchers at Dr. Web, a Russian cyber security firm has discovered that a number of Android devices including Leagoo M8, Leagoo M5 Plus, Nomu S20 and Nomu S10 have a malicious program built into the firmware. Dubbed Triada by researchers the Trojan is embedded in the Zygote component’s...
  • More on the Truckload of Chocolate Iraqis in Romania

    01/02/2017 8:32:50 PM PST · by MtnClimber · 15 replies
    Gates of Vienna ^ | Baron Bodissey
    Last night we posted a translated article from Romania about 48 Iraqi migrants who were discovered in the back of a tractor trailer that was supposed to be carrying a load of chocolate candies. Below is a video of the truck being emptied at the border control station between Bulgaria and Romania. Watch all the Iraqis exit the truck. When they’re all finally out on the garage floor, you can see there were no chocolates at all in the cargo compartment — nothing but Iraqis. This must have been a fairly sophisticated operation. It presumably included the collusion of the...
  • New Mac Trojan uses the Russian space program as a front

    09/26/2016 11:48:39 PM PDT · by Swordmaker · 5 replies
    MacWorld ^ | September 26, 2016 | By Michael Kan
    The Komplex Trojan can download, execute, and delete files from an infected Mac Security researchers have found a new Mac OS X malware that appears to be targeting the aerospace industry. The Trojan, called Komplex, can download, execute, and delete files from an infected Mac, according to security firm Palo Alto Networks. Interestingly, the Trojan will also save a PDF document to the infected system concerning the Russian space program. The PDF document details planned Russian space projects from 2016 to 2025, but it acts as a decoy, Palo Alto Networks said in Monday blog post. In reality, the Trojan...
  • What You Need to Know About Mac Malware 'Backdoor.MAC.Eleanor'

    07/06/2016 1:42:36 PM PDT · by Swordmaker · 8 replies
    MacRumors ^ | July 6, 2016 | by Joe Rossignol
    What is Backdoor.MAC.Eleanor? Backdoor.MAC.Eleanor is new macOS malware arising from a malicious third-party app called EasyDoc Converter, which poses as a drag-and-drop file converter. What is EasyDoc Converter? "EasyDoc Converter.app" is a third-party Mac app that poses as a drag-and-drop file converter. The app has the following fake description:EasyDoc Converter is a fast and simple file converter for OS X. Instantly convert your FreeOffice (.fof) and SimpleStats (.sst) docs to Microsoft Office (.docx) by dropping your file onto the app. EasyDoc Converter is great for employees and students looking for a simple tool for quickly convert files to the popular...
  • Apple users targeted in first known Mac ransomware campaign

    03/06/2016 7:55:57 PM PST · by Swordmaker · 11 replies
    Yahoo News ^ | March 6, 2016
    By Jim Finkle BOSTON (Reuters) - Apple Inc customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks Inc told Reuters on Sunday. Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines, then typically asks users to pay ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data. Security experts estimate that ransoms total hundreds of millions of dollars a year from such cyber criminals, who typically target users of...
  • Brian Sandoval: Obama’s GOP Trojan Horse for the Supreme Court

    02/25/2016 7:55:27 AM PST · by Nachum · 16 replies
    National Review ^ | 2/15/16 | John fund
    The Wall Street Journal reports that the White House is vetting Nevada’s Republican governor Brian Sandoval for the Supreme Court. On Sunday night, Governor Sandoval sat at the president’s head table at a White House dinner in Washington. The next day, the governor requested and secured a meeting with Harry Reid, the Democratic Senate minority leader from his home state. Reid has put Sandoval on the short list of recommended candidates he has sent to the White House. The fix may be in, and it would be horrific news for conservatives: Sandoval is the most liberal of the country’s 29...
  • Dyreza trojan evolves for Windows 10

    11/26/2015 6:20:04 PM PST · by Utilizer · 29 replies
    itnews.com.au ^ | Nov 23 2015 6:40AM (AUS) | Max Metzger
    ... Notorious banking trojan Dyreza has evolved to target the Windows 10 operating system, according to cyber-security firm Heimdall. The new feature of this pernicious strain of malware includes support for Windows 10, so cyber-criminals can stay up to date with the developments of their prey as well as the ability to latch on to Microsoft Edge, Window's 10's replacement for the much-maligned internet explorer. Heimdall also noted that this new version of Dyreza “kills a series of processes linked to endpoint security software, in order to make its infiltration in the system faster and more effective”. Nearly 100,000 machines...
  • CryptoWall 4.0 the nastiest strain yet

    11/10/2015 6:00:08 AM PST · by Utilizer · 18 replies
    iTnews.com.au ^ | Nov 10 2015 9:16AM (AUS) | Allie Coyne
    The fourth version of the CryptoWall ransomware has landed in the wild, equipped with better evasion techniques and tactics to thwart antivirus protection and detection. Ransomware attacks computers and encrypts user files and folders via infected email attachments, with attackers demanding ransom payments to unlock the scrambled documents. Users are told to make the payment by a specific deadline or risk having the private key to unlock the files deleted. The active CryptoWall ransomware spawned from CryptoLocker, which is thought to have extorted more than $3 million from victims before the botnet used to distribute it - Gameover Zeus -...
  • Malware warning on FreeRepublic

    10/27/2015 7:53:57 PM PDT · by TheBattman · 26 replies
    10-27-2015 | Me
    Updated from the beta program OS 10.11.1 to the recently full release version. Immediately, every link to a discussion on Freerepublic returns this: MacBook Pro OS X 10.11.1 (El Capitan)
  • "Help with computer"

    09/22/2015 3:50:56 PM PDT · by Dick Vomer · 41 replies
    self ^ | 9/22/2015 | me
    I've been unable to even pull up a local bank on my internet browsers ( Firefox and Safari). The website itself will not load. Just spinning until the request times out. What's odd is that my wife us
  • Stealthy Dopant-Level Hardware Trojans [govt funded research to defeat encryption]

    09/13/2013 6:11:57 AM PDT · by markomalley · 16 replies
    Slashdot ^ | 9/13/2013
    "A team of researchers funded in part by the NSF has just published a paper in which they demonstrate a way to introduce hardware Trojans into a chip by altering only the dopant masks of a few of the chip's transistors. From the paper: 'Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against "golden chips."'...
  • COMPUTER VIRUS QUESTION: What Is THREAT "OSX/CLICKAGENT.FLA" Found In "opr0ETEF.tmp" File ?

    08/20/2013 4:33:36 PM PDT · by Yosemitest · 48 replies
    VirusBarrier X6 Scan and Quarantine | Aug 20, 2013 | Yosemitest
    What is THREAT "OSX/CLICKAGENT.FLA" found in "opr0ETEF.tmp" file ? Notice the file name is using a ZERO after the "opr" . It was found just now with a firewall activity alert. Here's what the general information on the file says: Kind: Unix Executable File Size: 66KB on disk (61,836 bytes) Where: /Volumes/Untitled/Documents and Settings/(User Name)/Local Settings/Application Data/Opera/My Opera Web Browser/cache/g_0018 Created: Thursday, August 9, 2012 7:36 AM Modified: Thursday, August 9, 2012 7:36 AM It's under QUARANTINE now, and I'm looking to destroy it by "shreading" or "wiping" ? Any suggestions?
  • Hagel pushes wealth redistribution to Third World & other dangerous stuff

    01/20/2013 8:29:13 PM PST · by EinNYC · 11 replies
    KleinOnline.wnd ^ | January 20, 2013 | Aaron Klein
    Chuck Hagel, President Obama’s nominee for Defense Secretary, sits on the board of numerous globalist groups that promote major increases in U.S. government funding for the third world. Hagel is a board member of the U.S. Global Leadership Coalition , a broad-based influential network of businesses, policy makers, national security and foreign policy experts; and business, faith-based, academic and community leaders pushing for more U.S. funding for diplomacy and third world development...One recent report entitled, Building a Better, Safer World, calls for the elevation of “global poverty” with increased U.S. humanitarian assistance worldwide...The Global Leadership Coalition includes an advisory board...
  • How to remove a computer virus

    12/14/2012 11:35:39 PM PST · by dennisw · 30 replies
    komando ^ | komando
    How to remove a computer virus QUICK SIMPLE VIDEO http://www.tvkim.com/watch/2555/kim-on-komand-how-to-remove-a-computer-virus?utm_medium=nl&utm_source=tvkim&utm_content=2012-12-14-article-screen-shot-b Computer viruses are the most dreaded inhabitants of the digital world! Here's how to kill them dead. Visit my security center for more detailed tips:      http://www.komando.com/securitycenter