Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $73,832
Woo hoo!! And now less than $15k to go!! Thank you all very much!! God bless.

Keyword: malware

Brevity: Headers | « Text »
  • Attackers Using Google Image Search to Distribute Malware (quit browser with Ctrl-Alt-Delete)

    05/06/2011 4:51:58 PM PDT · by decimon · 26 replies
    PC World ^ | May 6, 2011 | Ed Oswald
    Attackers are now using Google's image search to distributed malware, security experts say. Thousands of sites have reportedly been compromised by code injection--the malicious code redirects users to fake antivirus applications. Internet Storm Center researcher Bojan Zdrnja writes that the attackers are mostly targeting Wordpress sites, and are injecting PHP code that generates pages with images based on highly-searched content. Google then indexes these pages, and the images show up on Google's image search. > What can you do in the meantime to protect yourself if you feel that you have visited a malicious site via Google Images? Security experts...
  • Feds to remotely delete Coreflood from infected PCs

    04/27/2011 2:45:41 PM PDT · by decimon · 12 replies
    Digital Trends ^ | April 27, 2011 | Geoff Duncan
    In an unusual move, federal authorities will be contacting computer users with systems infected by the Coreflood botnet Trojan and asking them to agree to allow them to send commands to the malware so it will delete itself. The move comes in the in the wake of a coordinated takedown earlier this month by the FBI and other authorities, in which the U.S. government essentially substituted its own command-and-control servers in place of those used by Coreflood and issued commands telling the program to shut down on infected PCs. The move reduced activity from the Coreflood botnet by about 90...
  • Attack hijacks sensitive data using newer Windows features

    04/05/2011 11:00:04 AM PDT · by ShadowAce · 18 replies
    The Register ^ | 4 April 2011 | Dan Goodin
    Security researchers have outlined a way to hijack huge amounts of confidential network traffic by exploiting default behavior in Microsoft's Windows operating system. The MITM, or man-in-the-middle, attacks described on Monday take advantage of features added to recent versions of Windows that make it easy for computers to connect to networks using the next generation IPv6 protocol. The attack will also work against Apple's OS X for Macs, although the proof-of-concept has not been tested on that platform, said Jack Koziol, a program manager at InfoSec Institute, an information security services company. The attack exploits an industry standard known as...
  • Thousands of Web Sites Hit With New Twist on Old SQL Injection Hack

    04/01/2011 1:52:38 PM PDT · by Red Badger · 31 replies ^ | Posted on April 1, 2011 at 1:10 PM PT | by Arik Hesseldahl
    A relatively simple hack has been used to compromise at least 500,000 Web sites, and perhaps as many as 1.5 million, in such a way that visitors are tricked into downloading fake PC security software. Dubbed Lizamoon, after the Web site where some users are in some cases redirected, the attack was first documented by the security research firm Websense The hack seeks to trick Web users into believing that their computer has been compromised by viruses and prompts them to download fake security software that itself causes further problems. Among the sites serving up the links to the fake...
  • My virus, trojan, malware experience..and resolution

    03/29/2011 11:26:05 AM PDT · by Professional · 114 replies
    03/29/2011 | Professional
    Last week I got hit with a nasty set of viruses, malware, and trojans. One of the first things I did, was to check out Freerepublic to get some free advice. Unfortunately, it didn't help much, so I've decided to try and add some value here for folks that have something similar happen to them. My problems began, by using Google searches for information pertaining to the Japan Earthquake. Now, I suspect that part of these internet virus scams, is to embed the trouble in searches that are very popular at any given time. I took the advice of this...
  • Columbus firm raided as Microsoft targets malware, scams (& Spam)

    03/18/2011 9:42:10 PM PDT · by Slump Tester · 53 replies
    The Columbus Dispatch ^ | March 18, 2011 | Marla Matzer Rose
    A Columbus company was one of nine Web hosting firms around the country raided by U.S. Marshals this week as part of a Microsoft lawsuit aimed at eliminating sources of malware and email scams. Law enforcement agents, accompanied by members of Microsoft's year-old digital crimes unit, on Wednesday seized computer equipment that they said was used to command about a million infected personal computers. Ecommerce Inc. of the Far West Side, named in Microsoft's suit that was unsealed late Thursday, was among the companies raided. Other cities involved included Chicago, Kansas City and Dallas. In a post on Microsoft's law...
  • Microsoft shuts down spam behemoth Rustock, reduces worldwide spam by 39%

    03/18/2011 1:25:49 PM PDT · by LibWhacker · 21 replies · 4+ views
    Switched ^ | 3/18/11 | Sebastian Anthony
    Microsoft's Digital Crimes Unit, working with federal law enforcement agents, has brought down the world's largest spam network, Rustock. Rustock, at its peak, was a botnet of around 2 million spam-sending zombies capable of sending out 30 billion spam email per day. Microsoft's wholesale slaughter of Rustock could reduce worldwide spam output by up to 39%. Rustock was taken down, piece by piece, in a similar way to the Mega-D botnet. First the master controllers, the machines that send out commands to enslaved zombies, were identified. Microsoft quickly seized some of these machines located in the U.S. for further analysis,...
  • Ericsson envisions a ‘networked society’

    02/14/2011 12:30:06 PM PST · by Ernest_at_the_Beach · 8 replies
    MarketWatch ^ | Aude Lagorce, MarketWatch
    Network specialist also highlights the potential of the cloudBARCELONA (MarketWatch) — Telecom-networks giant Ericsson AB on Monday presented its vision for a ‘networked society’ that will make much broader use of cloud services and said it expects sales of fourth-generation Long Term Evolution equipment to account for a significant part of business in 2012. Speaking at Mobile World Congress in Barcelona Monday, Ericsson Chief Executive Hans Vestberg said that over the next 10 to 20 years many more devices that are part of our daily lives such as televisions, appliances and cars, would get on the network and be able...
  • Google Hijack Malware - Windows 7

    01/15/2011 7:52:33 AM PST · by Lando Lincoln · 41 replies
    My computer is infected with malware that hijacks Google. I have swept with Webroot and Avast! No luck. Help? I prefer not to get into the registry - I lack the skills. I will be out for awhile, so thanks to all in advance.
  • Android Trojan Let Loose in China, Creating Botnet

    12/30/2010 10:19:49 AM PST · by decimon · 13 replies · 9+ views
    Daily Tech ^ | December 30, 2010 | Jason Mick
    Google can do little to stop it as malware is spreading in third-party app marketsAndroid is starting to pick up steam in the world's biggest nation – China -- in terms of both population and cell phone use. With its rise in popularity, a number of third-party app stores have popped up alongside the official Android Marketplace. While these third parties distribute paid software, they are also popular as they take more of a lax stance to potentially pirated or cloned apps. The dark side of the under regulation of these third-party app distributors has reared its ugly head, with...
  • Desparately need some help (Vanity)

    12/31/2010 4:19:24 PM PST · by Celtic Cross · 27 replies
    12/31/10 | Celtic Cross
    I need some help! Lately, I've been getting a vile pop up. Its far beyond any other ad I've encountered on the web. Appearing randomly, in the sidebars and ad spaces of completely innocuous websites, is an ad which says 'sl*ts of facebook', or some other offensive message, but always referring to facebook. In every ad is an uncensored image of a completely naked woman. I don't know is there's some virus on my computer; I've tried running spybot several times, with no result. If any other FReeper has faced such a problem, and/or knows how to stop it from...
  • MS warns over zero-day IE bug

    12/23/2010 10:13:08 AM PST · by Gomez · 16 replies
    Microsoft warned on Wednesday of a new zero-day vulnerability in Internet Explorer. The flaw creates a means for hackers to inject malware onto vulnerable systems, providing surfers are first tricked into visiting booby-trapped websites. As such the flaw poses a severe drive-by download risk. All established version of IE (from 6 to 8) are affected. It's unclear whether or not the IE 9 beta is similarly vulnerable. The flaw reportedly involves the handling of Cascading Style Sheets by Microsoft's browser software. The bug first came to light on the full disclosure mailing list earlier this month. A module exploiting...
  • Anybody having computer problems - Browser hijacking

    12/09/2010 12:00:17 PM PST · by ncfool · 48 replies · 1+ views
    self | 12/9/2010 | self
    Has anybody had a recent problem with Browser hijacking on their computer. Since Saturday when I got infected with a program called Think Point which makes itself look like Microsoft Defender my computer has had all kinds of problems. No matter which Malware program you try and clean it with it still shows back up. We have tried all the major fixes. I am not sure how I got it but it can't be cleaned. There are many sites talking about it. Now every time I try and do a search using Google, Yahoo, Chrome. You can see where its...
  • Tech help needed: Best system virus protection for Windows

    12/08/2010 9:31:13 AM PST · by Maceman · 112 replies · 3+ views
    I had a fatal crash a couple of daya ago -- seems a virus corrupted my Windows XP, do had to do a reinstall. I lost a lot of data, but fortunately not everything. In any event, I have reinstalled XP, and want the absolute best virus/spam/spyware, etc. protection I can get. I think I have heard of free software that's available for this purpose as well. I'll appreciate your recommendations, as long as they don't include buying a Mac, which is just not an option for me. Thanks, as always. So is it Norton, McAfee, something else? I
  • Help with New Pron-Ad Virus or Bot (vanity)

    12/06/2010 9:34:59 AM PST · by piytar · 27 replies
    vanity ^ | Dec. 6, 2010 | piytar
    Running Windows XP with Microsoft Security Essentials and Ad-Aware for protection. Getting random nasty (and I mean nasty) pron ads and links popping up. Sec Essentials and Ad-Aware scans show zilch. About to go through the misery of the Major Geek/Hijack This cleaning process, which takes hours (but does work). Thought I'd ask here first if anyone knew of a specific new pron virus/bot that's making the rounds. If so, it might help me clean it out quicker. Thanks! PS I do searches for manufacturing for certain clients, so I end up on Chinese mfg sites a bit. (Trying to...
  • Help/suggestions for curing a painfully slow and jerky computer ??

    11/30/2010 9:42:02 AM PST · by CIBvet · 84 replies · 2+ views
    Can one of you techy-types tell me how to get rid of all the crap that's collected on my computer to make it run sooooo slow and jerky? Defragging used to help, but no longer does the trick. A friend once delicately got into the 'Registry' and cleaned it up, but warned that is very tricky biz ... not for rookies. I've got a feeling it's just dragged down with blood-sucking parasites.
  • Death in Teheran: Stuxnet Continued (Who assassinated the scientist tasked with fixing malware?)

    11/30/2010 7:59:34 AM PST · by SeekAndFind · 9 replies · 2+ views
    Pajamas Media ^ | 11/30/2010 | Roger L. Simon
    While the media blabs on about (relatively) inconsequential WikiLeaks, real drama plays out on the streets of Teheran where two Iranian nuclear scientists were the targets of assassination attempts – one of them successful. According to (the often-unreliable-but-frequently-fascinating) Debka file, the scientist assassinated — Majid Shahriari — was in charge of their program to deal with the Stuxnet malware that has infected Iranian computers. At that same time, Ahmadinejad publicly admitted setbacks. This isn’t a great time to be an Iranian nuclear scientist. From Debka: The attacks occurred at 7.45 a.m. Iranian time, less than 12 hours after the WikiLeaks...
  • Koobface Can Infect Linux Systems Too – But That is An Accident

    11/02/2010 4:56:45 AM PDT · by ShadowAce · 15 replies
    Digitizer ^ | 1 November 2010 | Ricky
    Koobface is a trojan that has been going around in social networking sites like – Facebook, Twitter, MySpace etc. It originally started as a Windows only trojan. But a few days ago, a new variant emerged which can infect both Mac OS X and Linux.Infecting a Mac or a Linux system with Koobface is quite tedious. Unlike in Windows, users need to manually download a java applet and give it the permission to run – that should stop the trojan right there for most users. In Linux, it gets even better – even if the applet has been allowed to...
  • Stuxnet Intrigue Deepens With Hidden Clues in Code

    10/01/2010 11:38:57 AM PDT · by Pride_of_the_Bluegrass · 64 replies
    AOL News Surge Desk ^ | Dana Chivvis
    (Sept. 30) -- The intrigue surrounding the mysterious, highly sophisticated computer worm Stuxnet got a little more Dan Brownish today with the revelation that there may be hidden messages embedded in the malware's code. The New York Times reported this morning that one of the files in the worm was called "Myrtus," which may be a reference to the Old Testament Book of Esther, in which Jews thwart a Persian plot against them. Along with mysterious Myrtus were two numbers that might be additional clues to who is behind the worm. Or, as the Times points out, they could mean...
  • In a Computer Worm, a Possible Biblical Clue

    09/30/2010 11:59:40 AM PDT · by JoeProBono · 26 replies
    nytimes ^ | 9/29 | By JOHN MARKOFF and DAVID E. SANGER
    Deep inside the computer worm that some specialists suspect is aimed at slowing Iran’s race for a nuclear weapon lies what could be a fleeting reference to the Book of Esther, the Old Testament tale in which the Jews pre-empt a Persian plot to destroy them. That use of the word “Myrtus” — which can be read as an allusion to Esther — to name a file inside the code is one of several murky clues that have emerged as computer experts try to trace the origin and purpose of the rogue Stuxnet program, which seeks out a specific kind...
  • Stuxnet 'cyber superweapon' moves to China

    09/30/2010 6:44:06 AM PDT · by Sawdring · 21 replies
    Breitbart ^ | Sep 30, 2010
    A computer virus dubbed the world's "first cyber superweapon" by experts and which may have been designed to attack Iran's nuclear facilities has found a new target -- China. The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.
  • Dozens charged in NY in global computer virus scam

    09/30/2010 12:01:07 PM PDT · by Ernest_at_the_Beach · 2 replies
    Ap ^ | (AP) – 1 hour ago
    NEW YORK — Computer hackers in eastern Europe who used computer viruses to steal usernames and passwords teamed up with associates who opened bank accounts in the U.S. to snatch at least $3 million from American bank accounts, authorities said Thursday in announcing charges against more than 60 people.Some of the defendants were charged in court papers unsealed in U.S. District Court in Manhattan with conspiracy to commit bank fraud for the invasion of dozens of victims' accounts, according to federal and state prosecutors in New York.In a series of criminal complaints filed in the case, the FBI said the...
  • An alarmed Iran asks for outside help to stop rampaging Stuxnet malworm

    09/29/2010 5:52:44 AM PDT · by Errant · 104 replies · 1+ views
    DEBKA File ^ | 29 September, 2010 | NA
    Tehran this week secretly appealed to a number of computer security experts in West and East Europe with offers of handsome fees for consultations on ways to exorcize the Stuxnet worm spreading havoc through the computer networks and administrative software of its most important industrial complexes and military command centers. debkafile's intelligence and Iranian sources report Iran turned for outside help after local computer experts failed to remove the destructive virus. None of the foreign experts has so far come forward because Tehran refuses to provide precise information on the sensitive centers and systems under attack and give the visiting...
  • President Stuxnet (Team Obama has governed as malware, intentionally self-destructing the republic.)

    09/28/2010 8:09:35 AM PDT · by Kaslin · 8 replies
    Pajamas Media ^ | September 28 | David Solway
    In 356 B.C., a Greek psychopath by the name of Herostratus set fire to the Temple of Artemis at Ephesus in order to immortalize his name. Hence the phrase: to pursue a Herostratic honor. In 2008 A.D., a rather inscrutable individual was elected president of the United States and proceeded without delay to covet and acquire a more or less identical distinction, intent on destroying the temple of constitutional liberty under the rubric of a “fundamental transformation.” Of course, there is more to it than simply desiring a historic reputation by whatever means at his disposal. It has become obvious...
  • Computer super-virus 'targeted Iranian nuclear power station' but who made it?

    09/24/2010 10:51:26 AM PDT · by COUNTrecount · 25 replies · 1+ views
    Daily Mail ^ | Sept. 24, 2010 | Niall Firth
    The world’s first cyber ‘super weapon’ may have been designed to attack a nuclear power station in Iran, experts believe. A computer virus called Stuxnet has been described as the most sophisticated 'worm' ever created and has already infected more than 45,000 networks worldwide. A 'worm' is a type of computer virus that can reproduce by sending copies of itself to any PC that is connected to the infected machine. Now internet security experts fear that Stuxnet, which was first detected in June, is the first 'worm' specifically created to target real-world infrastructure such as power stations and water plants....
  • The War Against Iran Has Already Started

    09/22/2010 8:09:57 AM PDT · by nuconvert · 8 replies
    Forbes ^ | Sept. 21, 2010
    There is little doubt that the fine gradations of history will give cyber war an earlier start. But just as television news was transformed by technology before the Iranian Revolution in 1979, and politics was transformed by social networking before it appeared that Twitter would bring about a second Iranian Revolution, process and progress need crystallizing events, where the political and cultural significance of technological innovation becomes indisputable. Such a moment came in July with the discovery of a worm known as Stuxnet, which sought out a particular version of the Siemens’ SCADA (supervisory control and data acquisition) systems that...
  • Malware Blamed For Disastrous Plane Crash

    08/22/2010 12:52:55 PM PDT · by James C. Bennett · 82 replies
    Gizmodo ^ | 20 August, 2010 | Gizmodo
      154 lives were lost when Spanair Flight 5022 crashed moments after taking off from Madrid-Barajas International Airport in 2008. Now documents from an investigation into the incident are showing that a malware infection may have been to blame.According to the investigation, the computer system used to monitor technical problems on the plane was infected with a trojan. As a result, there were no alerts or warnings for three technical issues which "if detected, may have prevented the plane from taking off."The investigation is still not complete and authorities are trying to determine just how the malware got onto the...
  • Computer QUESTION: About "!A2"

    08/11/2010 2:55:05 AM PDT · by Yosemitest · 28 replies · 1+ views
    My Firewall/Antivirus detected an infection of the "!A2" and says it's: A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment. I tried to block it and delete the infected files, but that just set off an attack against my computer, which caused me to reload from backup several times. How do I get rid of this nightmare, and prevent it from coming back?
  • Unpatched kernel-level vuln affects all Windows versions

    08/07/2010 9:16:32 AM PDT · by dayglored · 20 replies · 2+ views
    The Register (Brit Tech) | Aug 6, 2010 | Dan Goodlin
    Researchers have identified a kernel-level vulnerability in Windows that allows attackers to gain escalated privileges and may also allow them to remotely execute malicious code. All versions of the Microsoft OS are affected, including the heavily fortified Windows 7. The buffer overflow, which was originally reported here, can be exploited to escalate privileges or crash vulnerable machines, IT research company Vupen said. The flaw may also allow attackers to execute arbitrary code with kernel privileges. The bug resides in the “CreateDIBPalette()” function of a device driver known as “Win32k.sys.” It is exploited by pasting a large number of color values...
  • Why Linux Is More Secure Than Windows

    08/04/2010 10:58:19 PM PDT · by Ernest_at_the_Beach · 67 replies
    PC World ^ | Tue Aug 3, 2:49 pm ET | Katherine Noyes Katherine Noyes
    "Security through obscurity" may be a catchy phrase, but it's not the only thing that's catching among Windows users. The expression is intended to suggest that proprietary software is more secure by virtue of its closed nature. If hackers can't see the code, then it's harder for them to create exploits for it--or so the thinking goes. Unfortunately for Windows users, that's just not true--as evidenced by the never-ending parade of patches coming out of Redmond. In fact, one of Linux's many advantages over Windows is that it is more secure--much more. For small businesses and other organizations without a...
  • Security experts release software to attack Android phones

    07/31/2010 5:46:09 AM PDT · by Gomez · 20 replies · 1+ views
    The root-kit tool was released to "to persuade manufacturers to fix a bug that lets hackers read a victim's email and text messages," according to report by Reuters. "It wasn't difficult to build," said Nicholas Percoco, who leads Spider Labs. Working with a colleague, Percoco said it took about two weeks to develop the tool, which allows nefarious users to take control of the device and steal email and text messages. Percoco distributed the root kit on DVDs at the Defcon conference, which is a meeting of around 10,000 security experts who can attend anonymously. Reuters noted that "law enforcement...
  • Android wallpaper app that steals your data was downloaded by millions

    07/28/2010 8:16:44 PM PDT · by Gomez · 15 replies · 2+ views
    A questionable Android mobile wallpaper app, which collects your personal data and sends it to a mysterious site in China, has been downloaded millions of times, according to data unearthed by mobile security firm Lookout.That means that apps that seem good but are really stealing your personal information are a big risk at a time when mobile apps are exploding on smartphones said John Hering, chief executive, and Kevin MaHaffey, chief technology officer at Lookout, said in their talk at the Black Hat security conference in Las Vegas.“Even good apps can be modified to turn bad after a lot of...
  • Unpatched shortcut vuln exploited by mainstream malware

    07/23/2010 4:04:04 AM PDT · by Gomez · 15 replies
    Virus writers have begun using the unpatched shortcut flaw in Windows first exploited by the Stuxnet worm, which targets power plant control systems, to create malware that infects the general population of vulnerable Windows machines. Slovakian security firm Eset reports the appearance of two malware strains that exploit security vulnerabilities in the way Windows handles .lnk (shortcut) files, first used by Stuxnet to swipe information from Windows-based SCADA systems from Siemens. The Chymine-A Trojan uses the same security hole to install a keystroke logger while the Autorun-VB-RP worm has been updated to use the shortcut vulnerability as an infection method....
  • Ubuntu 'more secure' than Windows, says Dell

    06/14/2010 8:03:57 AM PDT · by Gomez · 43 replies · 890+ views
    Dell reckons Ubuntu offers more protection than Windows online as it convinces consumer PC shoppers they shouldn't be scared of Linux. In a statement flagged here by, Dell picked on security as one of ten reasons why people should buy PCs running Canonical's Linux rather than Microsoft's operating system. According to Dell's site (here, and a PDF here (pdf) in case the page is moved): 6) Ubuntu is safer than Microsoft Windows: The vast majority of viruses and spyware written by hackers are not designed to target and attack Linux. Dell does not provide further details, but continues to...
  • Bug gives attackers complete control of Windows PCs

    06/09/2010 8:03:48 PM PDT · by Gomez · 29 replies · 145+ views
    A security researcher has warned of a vulnerability in older versions of the Windows operating system that allows attackers to take full control of a PC by luring its user to a booby-trapped website. The flaw resides in the Windows Help and Support Center, a feature that provides users with online technical support. Malicious hackers can exploit the weakness of Windows by embedding commands in web addresses that activate the feature's remote assistance tool, which allows administrators to execute commands over the internet. The exploit works in XP and Server 2003 versions of Windows and possibly others. “Upon successful exploitation,...
  • Report: Google to Dump Windows Internally Due to Security Concerns - hackers came thru the windows

    06/01/2010 9:02:23 AM PDT · by Ernest_at_the_Beach · 26 replies · 471+ views
    Daily Tech ^ | June 1, 2010 9:22 AM | Jason Mick (Blog)
    New hires are being given the choice of using Macs or LinuxGoogle is one of the most creative and powerful tech companies in the world, thus its actions are scrutinized at times.  However, it's hard not to see a bit of significance in this one -- Google is reportedly phasing out Windows due to security concerns. News of the plan broke as Google remains reeling from a major intrusion by Chinese hackers which occurred using an unprotected flaw in Internet Explorer 6.  Back in early February, Google announced that it would be dropping dedicated support for Internet Explorer 6, leaving a fifth of...
  • Google to employees: 'Mac or Linux, but no more Windows'

    05/31/2010 7:32:31 PM PDT · by Gomez · 92 replies · 1,628+ views
    We first heard rumors of this policy change a couple of months ago, but now it's made the papers: the Financial Times is reporting that Google is phasing out the use of Windows internally, as employees are migrated to either Linux or Mac OS X on machine turnovers or new hires. The policy change was precipitated in large part by the security breach attributed to Chinese hackers; Google's IT leaders apparently feel that Microsoft's OS represents too great a risk across the enterprise to leave it in place. The story says that in January, subsequent to the security breaches, Windows...
  • Google Ditches Microsoft's Windows Over Security Issues, Report Claims

    06/01/2010 7:28:23 AM PDT · by markomalley · 20 replies · 422+ views
    PC World ^ | 6/1/2010 | Tom Spring
    Google employees are slamming Microsoft's Windows operating system, claiming security vulnerabilities in the OS left the company open to Chinese hackers in January 2010, a new report says. According to the Financial Times, Google will ditch the internal use of Windows in exchange for alternative operating systems including the Mac OS, Linux, and Google's own forthcoming Chrome OS operating system.The May 31 Financial Times article quotes only anonymous Google sources, identifying them as several of Google's 10,000 employees. FT reporters David Gelles and Richard Waters write: "Employees wanting to stay on Windows required clearance from 'quite senior levels', one...
  • Devious ‘Tabnapping’ Attack Hijacks Browser Tabs

    05/25/2010 12:19:17 PM PDT · by Gomez · 25 replies · 898+ views
    Traditional phishing attacks are reasonably easy to avoid, just don’t click links in suspicious e-mails (or, for the really paranoid, any e-mail). But Firefox Creative Lead Aza Raskin has found a far more devious way to launch an attack — by hijacking your unattended browser tabs. The attack works by first detecting that the tab the page is in does not have focus. Then the attacking script can change the tab favicon and title before loading a new site, say a fake version of Gmail, in the background. Even scarier, the attack can parse through your history to find sites...
  • Is FR Under Cyber Attack?

    05/14/2010 11:47:57 AM PDT · by Kenny Bunk · 29 replies · 772+ views
    Vanity Post Freerepublic ^ | May 13, 2010 | Kenny Bunk
    I access the web via Firefox and Google. Last week, I linked, or attempted to, to Monica Crowley's website and was hit by the VIME Trojan. Quite a pain to track and destroy! Since that time, when on FR, and only FR, I am experiencing frequent crashes, and much trouble linking to other sites from this one. This could be a tracking tactic, and indeed, I have discovered several tracking cookies hovering and running in the background. I believe the best suspect here is Google, monitoring political speech, especially any emanating from what they migght consider the right side of...
  • Single group did 66% of world's phishing

    05/13/2010 9:58:18 PM PDT · by Ernest_at_the_Beach · 8 replies · 639+ views
    The Register ^ | 13th May 2010 22:02 GMT | Dan Goodin in San Francisco
    Avalanche of attacks A single criminal operation was responsible for two-thirds of all phishing attacks in the second half of 2009 and is responsible for a two-fold increase in the crime, a report published this week said. The Avalanche gang is believed to have risen out of the ashes of the Rock Phish outfit, which by some estimates was responsible for half the world's phishing attacks before fizzling out in late 2008. Driving the success of both groups is their use of state-of-the-art technology for mass-producing imposter websites and distributing huge amounts of crimeware for automating identity theft. "Avalanche uses...
  • U.S. Treasury Site Compromise Linked to the NetworkSolutions Mass WordPress Blogs Compromise

    05/11/2010 12:15:07 AM PDT · by Cindy · 5 replies · 354+ views
    DANCHO DANCHEV - Blog ^ | May 4, 2010; Updated May 8, 2010 | Posted by Dancho Danchev
    TUESDAY, MAY 04, 2010 "U.S. Treasury Site Compromise Linked to the NetworkSolutions Mass WordPress Blogs Compromise" SNIPPET: "UPDATED: Saturday, May 08, 2010: 5 new domains have been introduced by the same gang, once again parked at, AS49981, WorldStream."
  • McAfee's Shutdown Apology May Be Too Little, Too Late

    04/23/2010 12:52:38 PM PDT · by Gomez · 23 replies · 802+ views
    Late Thursday night, McAfee apologized for an antivirus update that shut down Windows XP computers around the globe. McAfee said the problem affected only a small percentage of its customers -- less than .005 percent -- but the news sent shock waves through the tech industry. Here's what happened: Earlier this week, McAfee identified a new threat that impacts Windows PCs. McAfee researchers worked to address the threat that it said attacks critical Windows system executables and buries itself deep into a computer's memory. As McAfee normally would, its research team created a detection and removal signature update file to...
  • Firefox add-on disrupts Google data collection

    04/19/2010 1:16:59 PM PDT · by ShadowAce · 20 replies · 833+ views
    ComputerWorld UK ^ | 19 April 2010 | Jeremy Kirk
    A computer security researcher has launched a project designed to provide people greater privacy when using Google, as the company expands the scope of data its collects about its users. Advert Advert The project, called GoogleSharing, is a Firefox add-on that uses an anonymous proxy service that gives Google false information when someone uses services that don't require an account, such as its search, news, and images services, said Moxie Marlinspike , a security consultant and penetration tester with the Institute of Disruptive Studies. Google collects a vast amount of information about its users, said Marlinspike, who gave a presentation...
  • Trojan poses as Google Chrome extension

    04/19/2010 11:53:16 AM PDT · by Gomez · 9 replies · 378+ views
    Miscreants have created a Trojan that poses as a Google Chrome extension. Spammed messages attempt to dupe prospective marks into trying an add-on that "helps you better organise your documents received in your email". Interested parties are pointed towards a counterfeit Google Chrome Extensions page, which offers a malware executable. More observant punters will notice that the download is offered in an .exe file and not a .crx Google Chrome extension. Such markers are easily missed, however. The Trojan horse malware on offer (identified by Romanian security firm BitDefender as the Agent-20577) blocks access to Google and Yahoo webpages. Attempts...
  • Something weird is happening with my computer

    04/16/2010 10:14:36 AM PDT · by big black dog · 61 replies · 2,092+ views
    From somewhere, this horrible rogue "antivirus" software called XP Smart Security is managing to install itself. It completely takes over my system and won't let me do anything while constantly displaying messages that I should purchase their scam product to clean up my computer. The only way I can get rid of it is to completely wipe out my hard drive and then reinstall the operating system. However, even after I do this, I can't access the "add or remove programs" section in the control panel. And a few days later, this scam software shows up again and I have...
  • Java Zero-Day Flaw Under Active Attack ( song lyrics publishing sites being used)

    04/15/2010 10:52:02 AM PDT · by Ernest_at_the_Beach · 10 replies · 454+ views
    zdnet ^ | April 14th, 2010 | Ryan Naraine
    Just days after Google researcher Tavis Ormandy released details on a dangerous new Java vulnerability, malicious hackers have pounced and are exploiting the flaw in the wild to launch drive-by download attacks. Virus hunters have spotted the attacks on a popular song lyrics Web site.  Any visitor to that Web site with the Java Plugin for Browsers installed (Internet Explorer or Firefox) will get infected with malware.According to AVG’s Roger Thompson, the attacks are likely to spread because of the simplicity in launching a successful exploit:The code involved is really simple, and that makes it easy to copy, so it’s not...
  • COMPUTER " TROJAN:Win32/Alureon.A"; or, The ROOTKIT MALWARE You Don't Even Know You Have.

    04/07/2010 1:22:51 AM PDT · by Yosemitest · 134 replies · 3,665+ views ^ | Updated: Dec 16, 2009 | Microsoft
    Summary Trojan:Win32/Alureon.A is a data-stealing trojan. This trojan allows an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. Trojan:Win32/Alureon.A may also allow an attacker to transmit malicious data to the infected computer. The trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after Trojan:Win32/Alureon.A is removed from the computer. Microsoft MalWare Protection Center has more info.
  • Groundbreaking cyber espionage report to be released

    04/06/2010 4:12:47 AM PDT · by decimon · 5 replies · 288+ views
    University of Toronto ^ | Apr 6, 2010 | Unknown
    TORONTO, ON – The Information Warfare Monitor (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0. The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in India, the Offices of the Dalai Lama, the United Nations, and several other countries. Members of the research team are holding a news conference at 11 a.m. on Tuesday, April 6, to discuss their latest findings and to answer questions from the media....
  • How FBI, police busted massive botnet

    03/03/2010 12:55:20 PM PST · by Ernest_at_the_Beach · 12 replies · 702+ views
    The Register ^ | 3rd March 2010 15:56 GMT | John Leyden
    Analysis More details have emerged about a cybercrime investigation that led to the takedown of a botnet containing 12m zombie PCs and the arrest of three alleged kingpins who built and ran it. As previously reported, the Mariposa botnet was principally geared towards stealing online login credentials for banks, email services and the like from compromised Windows PCs. The malware infected an estimated 12.7 million computers in more than 190 countries. The botnet was shut down on 23 December 2009 following months of collaboration between security firms Panda Security and Defence Intelligence in co-operation with the FBI and Spain's Guardia...