Free Republic 2nd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $23,578
26%  
Woo hoo!! And the first 26% is IN!! Thank you all very much!! God bless.

Keyword: malware

Brevity: Headers | « Text »
  • This anime malware holds your files ransom until you beat a game's ludicrous score

    04/14/2017 8:17:14 PM PDT · by TigerLikesRooster · 6 replies
    PC Gamer ^ | Apr. 10, 2017 | Mat Paget
    This anime malware holds your files ransom until you beat a game's ludicrous score By Mat Paget 5 days ago If you download Rensenware, you better be ready to get really dang good at playing Touhou Seirensen There's a lot of nonsense on the internet about whether anime is "good" or "a mistake," but this story definitely makes me lean a little towards the latter. A new malware called Rensenware is somewhat of a joke on Ransomeware, a type of malware that holds your files ransom until you pay the hacker a certain amount of money. Rensenware, however, hold your...
  • Star Trek Themed Kirk Ransomware and a Spock Decryptor!

    03/17/2017 5:13:53 PM PDT · by LouieFisk · 9 replies
    Bleeping Computer ^ | March 16, 2017 | Lawrence Abrams
    Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more? Discovered today by Avast malware researcher Jakub Kroustek, the Kirk Ransomware is written in Python and may be the first ransomware to utilize Monero as the ransom payment of choice.
  • Preinstalled Malware Targeting Mobile Users (Android)

    03/14/2017 9:59:05 AM PDT · by Swordmaker · 7 replies
    CheckPoint ^ | March 14, 2017 | by Oren Koriat, Check Point Mobile Research Team
    The Check Point Mobile Threat Prevention has recently detected a severe infection in 36 Android devices, belonging to a large telecommunications company and a multinational technology company. While this is not unusual, one detail of the attacks stands out. In all instances, the malware was not downloaded to the device as a result of the users’ use, it arrived with it.According to the findings, the malware were already present on the devices even before the users received them. The malicious apps were not part of the official ROM supplied by the vendor, and were added somewhere along the supply...
  • Coincidence or were the Clintons in on Communications Monitoring of Trump & His Advisers

    03/07/2017 5:41:07 AM PST · by ReformedMedia · 6 replies
    The Washington Standard ^ | 03-07-2017 | Tim Brown
    Either this is an incredible coincidence or, more likely, Bill and Hillary Clinton were in on monitoring President Donald Trump and some of his advisers. Bill Clinton met secretly with then Attorney General Loretta Lynch at the Phoenix Sky Harbor International Airport on June 27, 2016.  This occurred around the same time the Obama administration filed a request with the Foreign Intelligence Surveillance Court (FISA) to monitor communications involving Donald Trump and several advisers. DC Whispers reported on Sunday: Today (Sunday) Obama operatives were out in full force, as predicted, spinning deflection to a compliant Mainstream Media. The gist of this deflection...
  • Vault 7: CIA Hacking Tools Revealed

    03/07/2017 5:39:22 AM PST · by MNDude · 51 replies
    Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking...
  • New macOS ransomware spotted in the wild

    02/22/2017 5:15:34 PM PST · by Swordmaker · 10 replies
    Macworld ^ | February 22, 2017 | By Lucian Constantin
    The program’s creator asks for payments but doesn’t have the encryption key to unlock victims’ files A new file-encrypting ransomware program for macOS is being distributed through BitTorrent websites, and users who fall victim to it won’t be able to recover their files, even if they pay. Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and it’s a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it. OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere...
  • Adobe Issues Critical Security Update for Flash Player on Mac

    02/17/2017 11:48:41 AM PST · by Swordmaker · 12 replies
    MacRumors ^ | Friday February 17, 2017 5:51 AM PST | by Joe Rossignol
    Adobe this week released Flash Player version 24.0.0.221 to "address critical vulnerabilities that could potentially allow an attacker to take control of the affected system," including Mac, Windows, Linux, and Chrome OS. Mac users with Flash Player version 24.0.0.194 or earlier installed should immediately update to the latest version using the built-in update mechanism. The update is also available from the Adobe Flash Player Download Center. Flash Player users who had enabled the option to "allow Adobe to install updates" will receive the update automatically. Likewise, Google Chrome will automatically update Flash Player to version 24.0.0.221. Select "About Google Chrome"...
  • Russian cyberspies blamed for U.S. election hacks are now targeting Macs

    02/14/2017 6:28:55 PM PST · by Swordmaker · 13 replies
    Macworld ^ | FEB 14, 2017 10:45 AM PT | By Lucian Constantin
    Security researchers found a macOS version of the X-Agent malware used by the APT28 cyberespionage Security researchers have discovered a macOS malware program that’s likely part of the arsenal used by the Russian cyberespionage group blamed for hacking into the U.S. Democratic National Committee last year. The group, which is known in the security industry under different names, including Fancy Bear, Pawn Storm, and APT28, has been operating for almost a decade. It is believed to be the sole user and likely developer of a Trojan program called Sofacy or X-Agent. X-Agent variants for Windows, Linux, Android, and iOS have...
  • Mac malware, possibly made in Iran, targets US defense industry (Doesn't work)

    02/07/2017 10:57:59 PM PST · by Swordmaker · 16 replies
    MacDailyNews ^ | Tuesday, February 7, 2017 · 4:50 pm
    “Just because you’re using a Mac doesn’t mean you’re safe from hackers,” Michael Kan reports for IDG News Service. “That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian hackers to target the U.S. defense industry.” “The malware, called MacDownloader, was found on a website impersonating the U.S. aerospace firm United Technologies, according to a report from Claudio Guarnieri and Collin Anderson, who are researching Iranian cyberespionage threats,” Kan reports. “The fake site was previously used in a spear phishing email attack to spread Windows malware and is believed to be...
  • Hamas sets 'honey traps' to hack Israeli soldiers' phones: army

    01/12/2017 7:05:56 PM PST · by markomalley · 6 replies
    Reuters ^ | 1/11/16 | Maayan Lubell
    Using photos of young women and Hebrew slang, the Palestinian militant group Hamas chatted up dozens of Israeli soldiers online, gaining control of their phone cameras and microphones, the military said on Wednesday. An officer, who briefed reporters on the alleged scam, said the Islamist group that runs the Gaza Strip uncovered no major military secrets in the intelligence-gathering operation. Hamas spokesman Fawzi Barhoum declined to comment. Mainly using Facebook, Hamas used fake online identities and photos of young women, apparently found on the Internet, to lure soldiers in, the officer said. "Just a second, I'll send you a photo,...
  • Ransomware spiked 6,000% in 2016 and most victims paid the hackers, IBM finds

    12/19/2016 5:28:33 AM PST · by TigerLikesRooster · 11 replies
    CNBC ^ | 14 Dec 2016 | Harriet Taylor
    Ransomware spiked 6,000% in 2016 and most victims paid the hackers, IBM finds Harriet Taylor 14 Dec 2016 Spam emails loaded with ransomware — malware that scrambles data and demands a ransom to decode it — increased 6,000 percent this year compared with 2015, a new study from IBM Security found. Ransomware was in almost 40 percent of all spam messages in 2016. The problem is, the business model works: 70 percent of business victims paid the hackers to get their data back, the study found. Of those who paid, 50 percent paid more than $10,000 and 20 percent paid...
  • Android Malware Used to Hack and Steal a Tesla Car

    12/01/2016 10:12:18 PM PST · by Swordmaker · 15 replies
    BleepingComputer.com ^ | November 25, 2016 | By Catalin Cimpanu
    By infecting a Tesla owner's phone with Android malware, a car thief can hack and then steal a Tesla car, security researchers have revealed this week. Previous attempts to hack Tesla cars attacked the vehicle's on-board software itself. This is how Chinese security researchers from Keen Lab have managed to hack a Tesla Model S last month, allowing an attacker to control a car from 12 miles away. Security experts from Norwegian security firm Promon have taken a different approach, and instead of trying complicated attacks on the car's firmware, they have chosen to go after Tesla's Android app...
  • Android 'Gooligan' Hackers Just Scored The Biggest Ever Theft Of Google Accounts

    11/30/2016 10:03:24 AM PST · by Swordmaker · 16 replies
    Forbes ^ | November 30, 2016 | By Thomas Fox-Brewster
    More than a million Android phones are infected with Gooligan, a strain of malware Google is fighting in earnest. Cybercriminals used the spyware to steal 1.3 million Google accounts in the last four months, researchers warned. (AP Photo/Paul Sakuma) A new variant of Android malware is responsible for what’s believed to be the biggest single theft of Google accounts on record. The so-called Gooligan strain has infected as many as 1.3 million Android phones since August, completely prizing the devices open and stealing the tokens users are given to verify they are authorized to access their accounts. It’s main aim,...
  • Office Depot halts PC Health Checks amid bogus infection claims

    11/22/2016 7:40:46 AM PST · by snarkpup · 13 replies
    The Register ^ | 22 Nov 2016 at 01:46 | Iain Thomson
    Office Depot has suspended PC Health Check – its malware-scanning service – after it was accused of lying about infections to push antivirus software. Former Office Depot technician Shane Barnett told Seattle TV station KIRO 7 that the PC Health Check service would lie to customers that their otherwise-clean PCs were infected with malware, and that this was used to flog expensive disinfection tools. He claimed he was let go from his job because he refused to run the allegedly dodgy scanner on people's machines. ... The station decided to investigate his claims and took six virgin PCs along to...
  • Important Note – Clear Your Cookies and Browser Cache Frequently…

    11/03/2016 7:38:24 AM PDT · by Bratch · 40 replies
    The Last Refuge ^ | November 3, 2016 | sundance
        A rather long and complex issue has surfaced that CTH has specific knowledge of. It’s a bigger issue than appears on the surface.  However, to avoid a lengthy distraction -which will consume unnecessary energy- the short version is: Until the election is over, if you travel the internet into news sites, political sites, and content containing political discussion therein, clear your browser and cache frequently throughout the day. SHORT SUMMARY:  We have become aware there is a specific, intentional and ongoing “malvertising” effort.  That is, hidden and targeted malware embedded within political advertising (by Team Clinton) that is...
  • Why Light Bulbs May Be the Next Hacker Target [Internet of Things]

    11/03/2016 6:38:05 AM PDT · by C19fan · 16 replies
    NY Times ^ | November 3, 2016 | John Markoff
    The so-called Internet of Things, its proponents argue, offers many benefits: energy efficiency, technology so convenient it can anticipate what you want, even reduced congestion on the roads. Now here’s the bad news: Putting a bunch of wirelessly connected devices in one area could prove irresistible to hackers. And it could allow them to spread malicious code through the air, like a flu virus on an airplane.
  • Google clashes with Microsoft over Windows flaw disclosure (actively exploited zero-day vuln)

    10/31/2016 6:41:58 PM PDT · by dayglored · 25 replies
    PC World ^ | Oct 31, 2016 | Michael Kan
    Google and Microsoft are butting heads over the disclosure of vulnerabilities. On Monday, Google revealed a critical flaw in Windows after it gave Microsoft a ten-day window to warn the public about it.Google posted about the zero-day vulnerability on its security blog, saying Microsoft had yet to publish a fix or issue an advisory about the software flaw."This vulnerability is particularly serious because we know it is being actively exploited," Google said. It lets hackers exploit a bug in the Windows kernel, via a win32k.sys system call, to bypass the security sandbox.The search giant originally told Microsoft about the problem...
  • Senator Prods Federal Agencies on IoT Mess

    10/26/2016 7:21:23 AM PDT · by snarkpup · 1 replies
    Krebs on Security ^ | October 25th, 2016 at 1:21 pm | Brian Krebs
    The co-founder of the newly launched Senate Cybersecurity Caucus is pushing federal agencies for possible solutions and responses to the security threat from insecure “Internet of Things” (IoT) devices, such as the network of hacked security cameras and digital video recorders that were reportedly used to help bring about last Friday’s major Internet outages. ... I have been asked by several reporters over the past few days whether I think government has a role to play in fixing the IoT mess. Personally, I do not believe there has ever been a technology challenge that was best served by additional government...
  • Need Computer Help

    10/09/2016 7:01:12 PM PDT · by hsmomx3 · 45 replies
    self
    My computer has been running fine until now, malwarebytes runs each day as does Windows Defender. I turned my computer off today and came home, turned it on and I get a message that says: The stub received bad data...so far this is when I try to get into malwarebytes program and windows defender. NOt sure about other programs. All of my updates seem to have disappeared. What is a program I can use online to check for a virus? I am not computer savvy when it comes to computer problems. Thanks. Running Windows 10.
  • Former NSA staffer demonstrates Mac malware that can tap into live webcam and mic feeds

    10/06/2016 12:26:15 PM PDT · by Swordmaker · 24 replies
    9 to 5 Mac ^ | October 6, 2016 | by Ben Lovejoy
    Security researcher and former NSA staffer Patrick Wardle is this afternoon demonstrating a way for Mac malware to tap into live feeds from the built-in webcam and microphone. His presentation is being delivered at the Virus Bulletin conference in Denver later today.Although any unauthorized access to the webcam will light the green LED – a firmware-level protection that is exceedingly difficult to bypass – Wardle’s presentation shows how a malicious app can tap into the outgoing feed of an existing webcam session, like a FaceTime or Skype call, where the light would already be on … Wardle was the researcher who previously uncovered a way...