Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $15,231
18%  
Woo hoo!! And we're now over 18%!! Thank you all very much!! God bless.

Keyword: malware

Brevity: Headers | « Text »
  • computer hijack/locked help

    08/16/2013 8:32:52 PM PDT · by TurboZamboni · 57 replies
    me ^ | 8-16-13 | turbozamboni
    never had this one. an ebay spoof? locked me up and says I need to pay to unlock due to some US code violation claim(BS) in the past I could do a system restore to an earlier date but it won't let me do that either. it bypassed AVG and I cannot get to my malwarebytes program via safe mode either. windows vista home premier is what I have
  • Shodan: The scariest search engine on the Internet

    08/02/2013 8:07:06 PM PDT · by 2ndDivisionVet · 50 replies
    CNN Money ^ | April 8, 2013 | David Goldman
    "When people don't see stuff on Google, they think no one can find it. That's not true." That's according to John Matherly, creator of Shodan, the scariest search engine on the Internet. Unlike Google, which crawls the Web looking for websites, Shodan navigates the Internet's back channels. It's a kind of "dark" Google, looking for the servers, webcams, printers, routers and all the other stuff that is connected to and makes up the Internet. (Shodan's site was slow to load Monday following the publication of this story.) Shodan runs 24/7 and collects information on about 500 million connected devices and...
  • The world’s Most Dangerous Search Engine

    02/08/2013 7:39:37 PM PST · by nickcarraway · 6 replies
    San Diego CityBeat ^ | Wednesday, Feb 06, 2013 | Dave Maass
    Aren’t you glad Shodan is in the hands of good guys like John Matherly?Ask John Matherly if he’s a hacker, and he’ll struggle for a moment with the term. On one hand, he’s a hacker, in the sense that he’s an innovative programmer, arms deep in the information-security industry. On the other, he’s hypersensitive to how his baby—a project called Shodan—is portrayed in the press. In the past year, it’s surged in notoriety and not just in technology publications, such as Ars Technica and Wired. Shodan’s been the subject of multiple Washington Post investigative features, profiled on Dutch television and...
  • OSX Users hit with ransomware websites posing as FBI Notices

    07/16/2013 10:53:47 PM PDT · by Swordmaker · 36 replies
    Macrumors ^ | 7/16/2013
    Malwarebytes takes a look at a method cyber-criminals have begun using to target Mac users with "ransomware", hijacking the user's browser with a notice demanding payment of $300 in order to release control of the application. While similar malware has affected Windows systems for a number of years, Mac users have only rarely seen such efforts targeted at themselves. The ransomware page is being pushed onto unsuspecting users browsing regular sites but in particular when searching for popular keywords. Warnings appearing to be from the FBI tell the victim: “you have been viewing or distributing prohibited Pornographic content.. To unlock...
  • Is Adobe Flash at risk from Malware and rootkits-Firefox

    07/06/2013 2:17:35 PM PDT · by Steven Tyler · 24 replies
    Questions to Freepers using Firefox browser. I understood Adobe was open to hacking, malware and rootkits I use a Firefox browser. I have not been updating my Flash plug-in. Now, I cannot view embedded videos without updating Adobe Flash. Are substitutes available? Are the newer versions of Adobe Flash now secure??
  • Provably Secure DNS: A Case Study in Reliable Software

    07/02/2013 7:14:11 AM PDT · by OneWingedShark · 16 replies
    http://ironsides.martincarlisle.com ^ | Unknown | Barry Fagin and Martin Carlisle
    Abstract. We describe the use of formal methods in the development of IRONSIDES, an implementation of DNS with superior performance to both BIND and Windows, the two most common DNS servers on the Internet. More importantly, unlike BIND and Windows, IRONSIDES is impervious to all single-packet denial of service attacks and all forms of remote code execution. Introduction DNS is a protocol essential to the proper functioning of the Internet. The two most common implementations of DNS are the free software version BIND and the implementations that come bundled with various versions of Windows. Unfortunately, despite their ubiquity and...
  • Critical Java SE Update Due Tuesday (June 18, 2013) Fixes 40 Flaws

    06/15/2013 9:03:29 AM PDT · by Ernest_at_the_Beach · 11 replies
    HardOCP ^ | 7:37 AM (DST) June 15, 2013 | Posted by Al
    It’s a clear case of Patch Tuesday envy that drives Oracle to release so many security patches. There’s no way Java could need that many critical updates. This one will get your attention with critical patches addressing 40 vulnerabilities. Oracle ordinarily releases Critical Patch Updates four times a year on a set schedule, but this will already be the fourth such update issued in 2013.
  • Free Beacon Targeted In Hack Attack Malware inflicted in coordinated attack on conservative sites

    06/11/2013 5:57:26 PM PDT · by Nachum · 18 replies
    Free Beacon ^ | 6/11/13 | Adam Kredo
    The Washington Free Beacon yesterday became the latest victim in a wave of cyber attacks targeting conservative news outlets. The Beacon, in what appears to be a coordinated assault, joined National Journal and radio station WTOP as a target after certain articles were featured on the Drudge Report, one of the most heavily trafficked and influential sites in the world. The Drudge Report itself has not been infiltrated. “There seems to be this concerted effort by this cyber criminal to take over news sites,” said Steve Ward, vice president of Invincea, the Internet security company that first identified the Free...
  • Cybercrime Morphs Into Cyberwar

    05/01/2013 9:00:46 AM PDT · by Kaslin · 1 replies
    Townhall.com ^ | May 1, 2013 | Austin Bay
    On April 25, Spanish police, at the request of Holland's national prosecutor's office, arrested Dutch citizen Sven Olaf Kamphuis. Kamphuis will likely face charges in Holland related to what Dutch officials describe as the most extensive criminal cyberattacks in the history of the Internet. The attacks, which occurred in mid-March, overwhelmed the website of Spamhaus, a European nonprofit organization that tracks computer viruses (malware) and spam (unwanted email). Spamhaus had blacklisted Kamphuis' Internet company, CyberBunker. Spamhaus alleged that CyberBunker provided hosting services for spammers. The attacks (distributed denial of service, DDOS attacks) not only denied Internet users access to the...
  • Apache servers ambushed by sophisticated backdoor attacks

    05/01/2013 6:54:11 AM PDT · by ShadowAce · 11 replies
    Network World ^ | 30 April 2013 | John P. Mello, Jr
    CSO - Apache servers are being ambushed by a particularly pernicious malware program called Linux/Cdorked.A that's infecting visitors to the sick machines with the Blackhole malware kit. Discovered by security researchers at Sucuri and Eset, they describe the malware a a sophisticated and stealthy backdoor meant to drive traffic to malicious websites. Eset explained in a blog post that the malware is one of the most sophisticated Apache backdoors it has seen so far. So far, hundreds of servers have been compromised, it said. The backdoor leaves no traces of compromised hosts on the hard drive other than a modified...
  • Oracle -- Patches 42 security holes -- in Java

    04/17/2013 8:21:22 AM PDT · by Ernest_at_the_Beach · 26 replies
    Fudzilla ^ | Wednesday, 17 April 2013 09:33 | Nick Farrell
    Patches 42 security holes Oracle has released a major security update for the version of Java programming language that runs inside Web browsers. The patch fixes 42 vulnerabilities within Java, including "the vast majority" of those that have been rated as the most critical. Oracle Executive Vice President Hasan Rizvisaid that a series of big security flaws in the Java plug-in for browsers have been uncovered in the past year by researchers and hackers, and some have been used by criminal groups. One hacking campaign infected computers using Microsoft Windows and Apple software inside hundreds of companies.Earlier this year the US Department...
  • China hacker's angst opens a window onto cyber-espionage

    04/02/2013 2:41:53 PM PDT · by Ernest_at_the_Beach · 2 replies
    LATimes ^ | March 12, 2013 | By Barbara Demick, Los Angeles Times
    Young man's blog provides a rare glimpse of the secretive hacking establishment of the Chinese military, whose efforts have become a growing concern to the U.S. BEIJING — For a 25-year-old computer whiz enlisted in a People's Liberation Army hacking unit, life was all about low pay, drudgery and social isolation.Nothing at all like the unkempt hackers of popular imagination, the young man wore a military uniform at work in Shanghai. He lived in a dorm where meals often consisted of instant ramen noodles. The workday ran from 8 a.m. to 5:30 p.m., although hackers were often required to work...
  • US Is Victim of Massive Cyber Espionage Campaign

    02/11/2013 7:09:17 PM PST · by BenLurkin · 24 replies
    mashable ^ | 2 hours ago | Lorenzo Franceschi-Bicchierai/
    The U.S. is a victim of a massive and sustained campaign of cyber espionage, according to a classified intelligence assessment revealed by the Washington Post on Monday. These periodic assessments, officially called National Intelligence Estimates (NIE), are issued by the Director of National Intelligence to express the general consensus of the intelligence community and to inform policymakers. That the United States is the target of a large cyber espionage campaign seems like a foregone conclusion, given recent developments. In the last few weeks, there have been reports of complex cyber attacks against papers like the New York Times or The...
  • South Korean Banks, Media Companies Targeted by Destructive Malware

    03/21/2013 1:52:08 PM PDT · by Ernest_at_the_Beach · 16 replies
    Mcafee Labs ^ | Wednesday, March 20, 2013 at 5:18pm | by Jorge Arias and Guilherme Venere
    A massive computer shutdown of two South Korean banks and media companies occurred Wednesday via an Internet malware attack. The malware wiped out the master boot records on the hard drives of the infected computers, overwriting the MBR with either one of these strings: PRINCPESPR!NCPESHASTATI. Figure 1: Snapshot of MBR after infection.The attack also overwrote random parts of the file system with the same strings, rendering several files unrecoverable. So even if the MBR is recovered, the files on disk will be compromised too.After that, the system is forced to reboot via the following command: shutdown -r -t 0 That...
  • Weapons in Cyber Attack on South Korea Killed Targeted PCs

    03/21/2013 1:41:14 PM PDT · by Ernest_at_the_Beach · 9 replies
    allthingsd.com ^ | March 21, 2013 at 12:52 pm PT | Arik Hesseldahl
    The cyber attack that rocked South Korean TV stations and banks yesterday apparently wiped out the hard drives of the affected computers, according to an analysis of the incident by McAfee. The involved malware infections destroyed the master boot record of the hard drives of the machines attacked. The MBR on a hard drive contains crucial information on how file systems on the drive are organized. The malware involved overwrote data in the MBR with the following string of characters: “PRINCPES, PR!NCPES, HASTATI.” It also overwrote random parts of the file system with the same characters.After that the system was...
  • Mac-specific Trojan discovered, injects ads into webpages

    03/21/2013 1:18:06 PM PDT · by Ernest_at_the_Beach · 36 replies
    Tweaktown ^ | Posted: 3 hours, 39 mins ago | Charles Gantt
    A new virus specific to Mac has been discovered by Russian security firm Doctor Web. Named Trojan.Yontoo.1, the virus injects ads into webpages on the infected machine.    The malware works by installing an adware plugin into any of the popular browsers then overlays an advertisement in key locations on webpages. Doctor Web says that this trojan is just another piece of a large adware puzzle that has been infecting OS X for some time now.    The virus can be caught in several different ways, with the most popular method being the use of movie trailer pages in which...
  • Fed Up with Aggressive Pop-Ups at Townhall, CanadaFreePress, etc.

    02/24/2013 10:30:20 AM PST · by Arthur McGowan · 49 replies
    130224 | Arthur McGowan
    I am fed up with, and don't even go to, a number of websites that make it impossible to close their pop-ups--I mean there isn't even a button to do so--or else, when you close the pop-up, an entirely new, screen-filling WINDOW opens. Townhall, CanadaFreePress, NRO, NewsMax, and many others are guilty of this kind of aggression. I'm sick of it. I never even look at what they are hawking, and now, I won't click any links on FR to these sites until I hear that they've cleaned up their act.
  • Vanity - Is JAVA now Safe?

    02/25/2013 5:02:44 PM PST · by pfflier · 23 replies
    A few weeks ago we were advised to disable or uninstall JAVA because of some malware. Is that problem now fixed? Do any Freepers have a suggestion for a trusted download site to reinstall JAVA?
  • www.nbc[.]com Contains a Malicious iframe

    02/22/2013 8:55:11 AM PST · by MeganC · 12 replies
    Microsoft email ^ | 21 Feb 2013 | Microsoft ISAC
    MS-ISAC CYBER ALERT DATE ISSUED: February 21, 2013 SUBJECT: www.nbc[.]com Contains a Malicious iframe MS-ISAC received reports and independently confirmed that the website www.nbc[.]com contains a malicious iframe which includes links to the following URLs: • flying-gators-mac[.]com/mtnk.htm • finesseindia[.]com/mtnk.htm • toplineops[.]com/mtnk.html • nikweinstein[.]com/cl/google.php • moi-npovye-sploett[.]com/qqqq/1.php • walterjeffers[.]com • symptomshighbloodpressure[.]org • store.thermosolutionsinternational[.]com/ctuk.html Please note that there may be additional domains included in the rotation. Once any of the above domains are visited, the Redkit exploit kit is leveraged to exploit number of vulnerabilities to install a Citadel malware on to the victim system. You may recall that the Redkit exploit kit...
  • Nearly one-quarter of all smartphone malware comes from porn sites

    02/16/2013 4:50:16 AM PST · by IbJensen · 12 replies
    Life Site News ^ | Feb 15, 2013 | John Jalsevac
    February 15, 2013, (LifeSiteNews.com) – Mobile users tempted to visit pornographic websites on their smartphones have another reason to think twice before clicking on the link: they could find their phones infected with malware. According to a new study from Blue Coat Systems, the risk of finding malicious content is three times higher when visiting x-rated websites than any other type of mobile activity. Nearly one-quarter of all malware on smartphones is found after visiting a pornographic site, even though porn use makes up a small percentage of user activity on mobile devices. The Blue Coat report described porn as...