Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $72,136
Woo hoo!! And now less than $15.9k to go!! Let's git 'er done. Thank you all very much!! God bless.

Keyword: malware

Brevity: Headers | « Text »
  • Attackers Using Google Image Search to Distribute Malware (quit browser with Ctrl-Alt-Delete)

    05/06/2011 4:51:58 PM PDT · by decimon · 26 replies
    PC World ^ | May 6, 2011 | Ed Oswald
    Attackers are now using Google's image search to distributed malware, security experts say. Thousands of sites have reportedly been compromised by code injection--the malicious code redirects users to fake antivirus applications. Internet Storm Center researcher Bojan Zdrnja writes that the attackers are mostly targeting Wordpress sites, and are injecting PHP code that generates pages with images based on highly-searched content. Google then indexes these pages, and the images show up on Google's image search. > What can you do in the meantime to protect yourself if you feel that you have visited a malicious site via Google Images? Security experts...
  • Feds to remotely delete Coreflood from infected PCs

    04/27/2011 2:45:41 PM PDT · by decimon · 12 replies
    Digital Trends ^ | April 27, 2011 | Geoff Duncan
    In an unusual move, federal authorities will be contacting computer users with systems infected by the Coreflood botnet Trojan and asking them to agree to allow them to send commands to the malware so it will delete itself. The move comes in the in the wake of a coordinated takedown earlier this month by the FBI and other authorities, in which the U.S. government essentially substituted its own command-and-control servers in place of those used by Coreflood and issued commands telling the program to shut down on infected PCs. The move reduced activity from the Coreflood botnet by about 90...
  • Attack hijacks sensitive data using newer Windows features

    04/05/2011 11:00:04 AM PDT · by ShadowAce · 18 replies
    The Register ^ | 4 April 2011 | Dan Goodin
    Security researchers have outlined a way to hijack huge amounts of confidential network traffic by exploiting default behavior in Microsoft's Windows operating system. The MITM, or man-in-the-middle, attacks described on Monday take advantage of features added to recent versions of Windows that make it easy for computers to connect to networks using the next generation IPv6 protocol. The attack will also work against Apple's OS X for Macs, although the proof-of-concept has not been tested on that platform, said Jack Koziol, a program manager at InfoSec Institute, an information security services company. The attack exploits an industry standard known as...
  • Thousands of Web Sites Hit With New Twist on Old SQL Injection Hack

    04/01/2011 1:52:38 PM PDT · by Red Badger · 31 replies ^ | Posted on April 1, 2011 at 1:10 PM PT | by Arik Hesseldahl
    A relatively simple hack has been used to compromise at least 500,000 Web sites, and perhaps as many as 1.5 million, in such a way that visitors are tricked into downloading fake PC security software. Dubbed Lizamoon, after the Web site where some users are in some cases redirected, the attack was first documented by the security research firm Websense The hack seeks to trick Web users into believing that their computer has been compromised by viruses and prompts them to download fake security software that itself causes further problems. Among the sites serving up the links to the fake...
  • My virus, trojan, malware experience..and resolution

    03/29/2011 11:26:05 AM PDT · by Professional · 114 replies
    03/29/2011 | Professional
    Last week I got hit with a nasty set of viruses, malware, and trojans. One of the first things I did, was to check out Freerepublic to get some free advice. Unfortunately, it didn't help much, so I've decided to try and add some value here for folks that have something similar happen to them. My problems began, by using Google searches for information pertaining to the Japan Earthquake. Now, I suspect that part of these internet virus scams, is to embed the trouble in searches that are very popular at any given time. I took the advice of this...
  • Columbus firm raided as Microsoft targets malware, scams (& Spam)

    03/18/2011 9:42:10 PM PDT · by Slump Tester · 53 replies
    The Columbus Dispatch ^ | March 18, 2011 | Marla Matzer Rose
    A Columbus company was one of nine Web hosting firms around the country raided by U.S. Marshals this week as part of a Microsoft lawsuit aimed at eliminating sources of malware and email scams. Law enforcement agents, accompanied by members of Microsoft's year-old digital crimes unit, on Wednesday seized computer equipment that they said was used to command about a million infected personal computers. Ecommerce Inc. of the Far West Side, named in Microsoft's suit that was unsealed late Thursday, was among the companies raided. Other cities involved included Chicago, Kansas City and Dallas. In a post on Microsoft's law...
  • Microsoft shuts down spam behemoth Rustock, reduces worldwide spam by 39%

    03/18/2011 1:25:49 PM PDT · by LibWhacker · 21 replies · 4+ views
    Switched ^ | 3/18/11 | Sebastian Anthony
    Microsoft's Digital Crimes Unit, working with federal law enforcement agents, has brought down the world's largest spam network, Rustock. Rustock, at its peak, was a botnet of around 2 million spam-sending zombies capable of sending out 30 billion spam email per day. Microsoft's wholesale slaughter of Rustock could reduce worldwide spam output by up to 39%. Rustock was taken down, piece by piece, in a similar way to the Mega-D botnet. First the master controllers, the machines that send out commands to enslaved zombies, were identified. Microsoft quickly seized some of these machines located in the U.S. for further analysis,...
  • Ericsson envisions a ‘networked society’

    02/14/2011 12:30:06 PM PST · by Ernest_at_the_Beach · 8 replies
    MarketWatch ^ | Aude Lagorce, MarketWatch
    Network specialist also highlights the potential of the cloudBARCELONA (MarketWatch) — Telecom-networks giant Ericsson AB on Monday presented its vision for a ‘networked society’ that will make much broader use of cloud services and said it expects sales of fourth-generation Long Term Evolution equipment to account for a significant part of business in 2012. Speaking at Mobile World Congress in Barcelona Monday, Ericsson Chief Executive Hans Vestberg said that over the next 10 to 20 years many more devices that are part of our daily lives such as televisions, appliances and cars, would get on the network and be able...
  • Google Hijack Malware - Windows 7

    01/15/2011 7:52:33 AM PST · by Lando Lincoln · 41 replies
    My computer is infected with malware that hijacks Google. I have swept with Webroot and Avast! No luck. Help? I prefer not to get into the registry - I lack the skills. I will be out for awhile, so thanks to all in advance.
  • Android Trojan Let Loose in China, Creating Botnet

    12/30/2010 10:19:49 AM PST · by decimon · 13 replies · 9+ views
    Daily Tech ^ | December 30, 2010 | Jason Mick
    Google can do little to stop it as malware is spreading in third-party app marketsAndroid is starting to pick up steam in the world's biggest nation – China -- in terms of both population and cell phone use. With its rise in popularity, a number of third-party app stores have popped up alongside the official Android Marketplace. While these third parties distribute paid software, they are also popular as they take more of a lax stance to potentially pirated or cloned apps. The dark side of the under regulation of these third-party app distributors has reared its ugly head, with...
  • Desparately need some help (Vanity)

    12/31/2010 4:19:24 PM PST · by Celtic Cross · 27 replies
    12/31/10 | Celtic Cross
    I need some help! Lately, I've been getting a vile pop up. Its far beyond any other ad I've encountered on the web. Appearing randomly, in the sidebars and ad spaces of completely innocuous websites, is an ad which says 'sl*ts of facebook', or some other offensive message, but always referring to facebook. In every ad is an uncensored image of a completely naked woman. I don't know is there's some virus on my computer; I've tried running spybot several times, with no result. If any other FReeper has faced such a problem, and/or knows how to stop it from...
  • MS warns over zero-day IE bug

    12/23/2010 10:13:08 AM PST · by Gomez · 16 replies
    Microsoft warned on Wednesday of a new zero-day vulnerability in Internet Explorer. The flaw creates a means for hackers to inject malware onto vulnerable systems, providing surfers are first tricked into visiting booby-trapped websites. As such the flaw poses a severe drive-by download risk. All established version of IE (from 6 to 8) are affected. It's unclear whether or not the IE 9 beta is similarly vulnerable. The flaw reportedly involves the handling of Cascading Style Sheets by Microsoft's browser software. The bug first came to light on the full disclosure mailing list earlier this month. A module exploiting...
  • Anybody having computer problems - Browser hijacking

    12/09/2010 12:00:17 PM PST · by ncfool · 48 replies · 1+ views
    self | 12/9/2010 | self
    Has anybody had a recent problem with Browser hijacking on their computer. Since Saturday when I got infected with a program called Think Point which makes itself look like Microsoft Defender my computer has had all kinds of problems. No matter which Malware program you try and clean it with it still shows back up. We have tried all the major fixes. I am not sure how I got it but it can't be cleaned. There are many sites talking about it. Now every time I try and do a search using Google, Yahoo, Chrome. You can see where its...
  • Tech help needed: Best system virus protection for Windows

    12/08/2010 9:31:13 AM PST · by Maceman · 112 replies · 3+ views
    I had a fatal crash a couple of daya ago -- seems a virus corrupted my Windows XP, do had to do a reinstall. I lost a lot of data, but fortunately not everything. In any event, I have reinstalled XP, and want the absolute best virus/spam/spyware, etc. protection I can get. I think I have heard of free software that's available for this purpose as well. I'll appreciate your recommendations, as long as they don't include buying a Mac, which is just not an option for me. Thanks, as always. So is it Norton, McAfee, something else? I
  • Help with New Pron-Ad Virus or Bot (vanity)

    12/06/2010 9:34:59 AM PST · by piytar · 27 replies
    vanity ^ | Dec. 6, 2010 | piytar
    Running Windows XP with Microsoft Security Essentials and Ad-Aware for protection. Getting random nasty (and I mean nasty) pron ads and links popping up. Sec Essentials and Ad-Aware scans show zilch. About to go through the misery of the Major Geek/Hijack This cleaning process, which takes hours (but does work). Thought I'd ask here first if anyone knew of a specific new pron virus/bot that's making the rounds. If so, it might help me clean it out quicker. Thanks! PS I do searches for manufacturing for certain clients, so I end up on Chinese mfg sites a bit. (Trying to...
  • Help/suggestions for curing a painfully slow and jerky computer ??

    11/30/2010 9:42:02 AM PST · by CIBvet · 84 replies · 2+ views
    Can one of you techy-types tell me how to get rid of all the crap that's collected on my computer to make it run sooooo slow and jerky? Defragging used to help, but no longer does the trick. A friend once delicately got into the 'Registry' and cleaned it up, but warned that is very tricky biz ... not for rookies. I've got a feeling it's just dragged down with blood-sucking parasites.
  • Death in Teheran: Stuxnet Continued (Who assassinated the scientist tasked with fixing malware?)

    11/30/2010 7:59:34 AM PST · by SeekAndFind · 9 replies · 2+ views
    Pajamas Media ^ | 11/30/2010 | Roger L. Simon
    While the media blabs on about (relatively) inconsequential WikiLeaks, real drama plays out on the streets of Teheran where two Iranian nuclear scientists were the targets of assassination attempts – one of them successful. According to (the often-unreliable-but-frequently-fascinating) Debka file, the scientist assassinated — Majid Shahriari — was in charge of their program to deal with the Stuxnet malware that has infected Iranian computers. At that same time, Ahmadinejad publicly admitted setbacks. This isn’t a great time to be an Iranian nuclear scientist. From Debka: The attacks occurred at 7.45 a.m. Iranian time, less than 12 hours after the WikiLeaks...
  • Koobface Can Infect Linux Systems Too – But That is An Accident

    11/02/2010 4:56:45 AM PDT · by ShadowAce · 15 replies
    Digitizer ^ | 1 November 2010 | Ricky
    Koobface is a trojan that has been going around in social networking sites like – Facebook, Twitter, MySpace etc. It originally started as a Windows only trojan. But a few days ago, a new variant emerged which can infect both Mac OS X and Linux.Infecting a Mac or a Linux system with Koobface is quite tedious. Unlike in Windows, users need to manually download a java applet and give it the permission to run – that should stop the trojan right there for most users. In Linux, it gets even better – even if the applet has been allowed to...
  • Stuxnet Intrigue Deepens With Hidden Clues in Code

    10/01/2010 11:38:57 AM PDT · by Pride_of_the_Bluegrass · 64 replies
    AOL News Surge Desk ^ | Dana Chivvis
    (Sept. 30) -- The intrigue surrounding the mysterious, highly sophisticated computer worm Stuxnet got a little more Dan Brownish today with the revelation that there may be hidden messages embedded in the malware's code. The New York Times reported this morning that one of the files in the worm was called "Myrtus," which may be a reference to the Old Testament Book of Esther, in which Jews thwart a Persian plot against them. Along with mysterious Myrtus were two numbers that might be additional clues to who is behind the worm. Or, as the Times points out, they could mean...
  • In a Computer Worm, a Possible Biblical Clue

    09/30/2010 11:59:40 AM PDT · by JoeProBono · 26 replies
    nytimes ^ | 9/29 | By JOHN MARKOFF and DAVID E. SANGER
    Deep inside the computer worm that some specialists suspect is aimed at slowing Iran’s race for a nuclear weapon lies what could be a fleeting reference to the Book of Esther, the Old Testament tale in which the Jews pre-empt a Persian plot to destroy them. That use of the word “Myrtus” — which can be read as an allusion to Esther — to name a file inside the code is one of several murky clues that have emerged as computer experts try to trace the origin and purpose of the rogue Stuxnet program, which seeks out a specific kind...