Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $29,554
Woo hoo!! And the first 33% is in!! Thank you all very much!! God bless.

Keyword: trojan

Brevity: Headers | « Text »
  • What You Need to Know About Mac Malware 'Backdoor.MAC.Eleanor'

    07/06/2016 1:42:36 PM PDT · by Swordmaker · 8 replies
    MacRumors ^ | July 6, 2016 | by Joe Rossignol
    What is Backdoor.MAC.Eleanor? Backdoor.MAC.Eleanor is new macOS malware arising from a malicious third-party app called EasyDoc Converter, which poses as a drag-and-drop file converter. What is EasyDoc Converter? "EasyDoc" is a third-party Mac app that poses as a drag-and-drop file converter. The app has the following fake description:EasyDoc Converter is a fast and simple file converter for OS X. Instantly convert your FreeOffice (.fof) and SimpleStats (.sst) docs to Microsoft Office (.docx) by dropping your file onto the app. EasyDoc Converter is great for employees and students looking for a simple tool for quickly convert files to the popular...
  • Apple users targeted in first known Mac ransomware campaign

    03/06/2016 7:55:57 PM PST · by Swordmaker · 11 replies
    Yahoo News ^ | March 6, 2016
    By Jim Finkle BOSTON (Reuters) - Apple Inc customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks Inc told Reuters on Sunday. Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines, then typically asks users to pay ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data. Security experts estimate that ransoms total hundreds of millions of dollars a year from such cyber criminals, who typically target users of...
  • Brian Sandoval: Obama’s GOP Trojan Horse for the Supreme Court

    02/25/2016 7:55:27 AM PST · by Nachum · 16 replies
    National Review ^ | 2/15/16 | John fund
    The Wall Street Journal reports that the White House is vetting Nevada’s Republican governor Brian Sandoval for the Supreme Court. On Sunday night, Governor Sandoval sat at the president’s head table at a White House dinner in Washington. The next day, the governor requested and secured a meeting with Harry Reid, the Democratic Senate minority leader from his home state. Reid has put Sandoval on the short list of recommended candidates he has sent to the White House. The fix may be in, and it would be horrific news for conservatives: Sandoval is the most liberal of the country’s 29...
  • Dyreza trojan evolves for Windows 10

    11/26/2015 6:20:04 PM PST · by Utilizer · 29 replies ^ | Nov 23 2015 6:40AM (AUS) | Max Metzger
    ... Notorious banking trojan Dyreza has evolved to target the Windows 10 operating system, according to cyber-security firm Heimdall. The new feature of this pernicious strain of malware includes support for Windows 10, so cyber-criminals can stay up to date with the developments of their prey as well as the ability to latch on to Microsoft Edge, Window's 10's replacement for the much-maligned internet explorer. Heimdall also noted that this new version of Dyreza “kills a series of processes linked to endpoint security software, in order to make its infiltration in the system faster and more effective”. Nearly 100,000 machines...
  • CryptoWall 4.0 the nastiest strain yet

    11/10/2015 6:00:08 AM PST · by Utilizer · 18 replies ^ | Nov 10 2015 9:16AM (AUS) | Allie Coyne
    The fourth version of the CryptoWall ransomware has landed in the wild, equipped with better evasion techniques and tactics to thwart antivirus protection and detection. Ransomware attacks computers and encrypts user files and folders via infected email attachments, with attackers demanding ransom payments to unlock the scrambled documents. Users are told to make the payment by a specific deadline or risk having the private key to unlock the files deleted. The active CryptoWall ransomware spawned from CryptoLocker, which is thought to have extorted more than $3 million from victims before the botnet used to distribute it - Gameover Zeus -...
  • Malware warning on FreeRepublic

    10/27/2015 7:53:57 PM PDT · by TheBattman · 26 replies
    10-27-2015 | Me
    Updated from the beta program OS 10.11.1 to the recently full release version. Immediately, every link to a discussion on Freerepublic returns this: MacBook Pro OS X 10.11.1 (El Capitan)
  • "Help with computer"

    09/22/2015 3:50:56 PM PDT · by Dick Vomer · 41 replies
    self ^ | 9/22/2015 | me
    I've been unable to even pull up a local bank on my internet browsers ( Firefox and Safari). The website itself will not load. Just spinning until the request times out. What's odd is that my wife us
  • Stealthy Dopant-Level Hardware Trojans [govt funded research to defeat encryption]

    09/13/2013 6:11:57 AM PDT · by markomalley · 16 replies
    Slashdot ^ | 9/13/2013
    "A team of researchers funded in part by the NSF has just published a paper in which they demonstrate a way to introduce hardware Trojans into a chip by altering only the dopant masks of a few of the chip's transistors. From the paper: 'Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against "golden chips."'...

    08/20/2013 4:33:36 PM PDT · by Yosemitest · 48 replies
    VirusBarrier X6 Scan and Quarantine | Aug 20, 2013 | Yosemitest
    What is THREAT "OSX/CLICKAGENT.FLA" found in "opr0ETEF.tmp" file ? Notice the file name is using a ZERO after the "opr" . It was found just now with a firewall activity alert. Here's what the general information on the file says: Kind: Unix Executable File Size: 66KB on disk (61,836 bytes) Where: /Volumes/Untitled/Documents and Settings/(User Name)/Local Settings/Application Data/Opera/My Opera Web Browser/cache/g_0018 Created: Thursday, August 9, 2012 7:36 AM Modified: Thursday, August 9, 2012 7:36 AM It's under QUARANTINE now, and I'm looking to destroy it by "shreading" or "wiping" ? Any suggestions?
  • Hagel pushes wealth redistribution to Third World & other dangerous stuff

    01/20/2013 8:29:13 PM PST · by EinNYC · 11 replies
    KleinOnline.wnd ^ | January 20, 2013 | Aaron Klein
    Chuck Hagel, President Obamas nominee for Defense Secretary, sits on the board of numerous globalist groups that promote major increases in U.S. government funding for the third world. Hagel is a board member of the U.S. Global Leadership Coalition , a broad-based influential network of businesses, policy makers, national security and foreign policy experts; and business, faith-based, academic and community leaders pushing for more U.S. funding for diplomacy and third world development...One recent report entitled, Building a Better, Safer World, calls for the elevation of global poverty with increased U.S. humanitarian assistance worldwide...The Global Leadership Coalition includes an advisory board...
  • How to remove a computer virus

    12/14/2012 11:35:39 PM PST · by dennisw · 30 replies
    komando ^ | komando
    How to remove a computer virus QUICK SIMPLE VIDEO Computer viruses are the most dreaded inhabitants of the digital world! Here's how to kill them dead. Visit my security center for more detailed tips:
  • Menino gets bad vibe from proposed sex toy giveaway

    10/18/2012 8:58:07 AM PDT · by massmike · 43 replies ^ | 10/15/2012 | Dave Wedge
    Trojan is not feeling the love in the Hub as Mayor Thomas M. Menino pushes the condom kings New York marketing firm to pull the plug on plans to hand out free vibrators on family-friendly City Hall Plaza. Legally, the city may have no leg to stand on as officials acknowledged the public nature of the plaza provides constitutional protection for the company to distribute the pulsing plastic wands. In a statement, Trojan said: We are pleased to be working with the City of Boston to bring the buzz to Bostonians with the Trojan Vibrations Pleasure Carts. With this vibrator...
  • New Trojan Backdoor Malware Targets Mac OS X And Linux, Steals Passwords And Keystrokes

    09/01/2012 8:34:42 AM PDT · by grey_whiskers · 19 replies
    Forbes ^ | 8-31-2012 | Anthony WIng Kosner
    Russian anti-virus software maker Doctor Web, has identified, The first Trojan in history to steal Linux and Mac OS X passwords. BackDoor.Wirenet.1, is the first Trojan Horse program that works on the Mac OS X and Linux platforms that is, designed to steal passwords stored by a number of popular Internet applications. The company, which sells anti-virus software that, conveniently, protects you against the malware they are identifying, explains that, When launched, it creates its copy in the users home directory. The program uses the Advanced Encryption Standard (AES) to communicate with its control server whose address is The...
  • City officials pull the plug on vibrator giveaway, leaving thousands dissatisfied

    08/10/2012 9:50:52 AM PDT · by EveningStar · 34 replies
    New York Post ^ | August 9, 2012 | Amber Sutherland, Jennifer Bain and Todd Venezia
    They must have rubbed Mayor Bloomberg the wrong way. City officials pulled the plug on a vibrator giveaway by the Trojan condom company yesterday, disappointing potentially thousands of pleasure-seeking women who hoped to get their hands on some no-cost sex toys.
  • New Apple Mac Trojan Called OSX/Crisis Discovered (Possibly not in wild)

    07/26/2012 10:34:10 AM PDT · by zeugma · 14 replies
    Intego ^ | July 24, 2012 | Lysa Myers
    Update July 25, 2012 10:30AM PDT This threat may run on Leopard 10.5, but it has a tendency to crash. It does not run on the new Mountain Lion 10.8. _______ Intego has discovered a new Trojan called OSX/Crisis. This threat is a dropper which creates a backdoor when its run. It installs silently, without requiring a password, and works only in OSX versions 10.6 and 10.7 Snow Leopard and Lion. The Trojan preserves itself against reboots, so it will continue to run until its removed. Depending on whether or not the dropper runs on a user...
  • July 9th, FBI Pulls Plug on Infected PC's (link to self-check)

    07/06/2012 8:49:36 AM PDT · by Stayfree · 31 replies
    PRWeb ^ | July 6, 2012 | Unknown
    On Monday, July 9th, the FBI will pull the plug on internet access to hundreds of thousands of computers infected with a malware Trojan known as DNSChanger. Even if your computer is clean, companies that have compromised systems in their network will be taken offline, hindering their ability to do business and possibly breaking their websites, in what many are referring to as Internet Doomsday.
  • Federal Government Acts Against Trojan; Some Users May Lose Internet Access Monday

    07/06/2012 6:26:05 AM PDT · by JoeProBono · 32 replies
    crn ^ | JULY 6, 2012 | Ken Presti
    Efforts to eliminate a high-profile Trojan may cause some Internet users to lose connectivity on Monday. And, getting systems back up and running may be far more difficult than the preventative measures themselves. The Federal Bureau of Investigation will be shutting down servers used by operators leveraging the DNSChanger Trojan, and when that happens, people with infected systems will lose access to the Internet, according to Dave Marcus, director of advanced researcher and threat intelligence at McAfee Labs. A DNSChanger Trojan literally changes the infected computer's DNS settings, explained Marcus. When a user opens up a browser and enters a...
  • 'Tinba' Bank Trojan Burrows into Browsers to Steal Logins

    06/04/2012 8:25:11 AM PDT · by Perseverando · 17 replies
    PC World ^ | June 3, 2012 | John E. Dunn
    Researchers have spotted a new banking Trojan subbed 'Tinba' that appears to have hit on a simple tactic for evading security - be as small as possible. An astonishing 20KB in size, Tinba ('Tiny Banker') retains enough sophistication to match almost anything that can be done by much larger malware types. Its main purpose is to burrow into browsers in order to steal logins, but it can also use 'obfuscated' (i.e disguised) web injection and man-in-the-browser to attempt to finesse two-factor web authentication systems. A particularly interesting feature is the way it tries to evade resident security, injecting itself into...
  • COMPUTER QUESTION: Why Can't COMODO Internet Security Detect "trojan-downloader.banload" ?

    06/02/2012 12:27:01 AM PDT · by Yosemitest · 35 replies
    My Computer | June 2, 2012
    I trust TopTenREVIEWS. So when my security softeware expired, I took their recommendation and bought COMODO Internet Security Complete 2012. A little later I decided to get a utilities tool for Windows XP SP3, and again, I went to TopTenReviews. I purchased Advanced System Optimizer 3.1, Advanced System Optimizer 3.1, now 3.2, has a tool called "System Protector", and it finds many viruses and malware that COMODO doesn't. My find was "trojan-downloader.banload". It attacked the registry the following areas: hkey-users\.default\software\microsoft\windows\currentversion\internet settings\zonemap\ranges\ range10\* range10\:range range6 range6\* range6\:range range2 range2\* range2\:range range15 range15\* range16\:range range7 range7\* range7\:range range5 range5\* range5\:range This...
  • Security backdoor found in China-made US military chip

    05/28/2012 7:52:40 PM PDT · by Pelham · 50 replies
    Information Age ^ | May 28, 2012 | staff
    Cambridge University researchers find that a microprocessor used by the US military but made in China contains secret remote access capability A microchip used by the US military and manufactured in China contains a secret "backdoor" that means it can be shut off or reprogrammed without the user knowing, according to researchers at Cambridge University's Computing Laboratory. The unnamed chip, which the researchers claim is widely used in military and industrial applications, is "wide open to intellectual property theft, fraud and reverse engineering of the design to allow the introduction of a backdoor or Trojan", they said. The discovery was...
  • Computer Virus Info

    01/15/2012 9:27:55 AM PST · by jim macomber · 94 replies · 1+ views
    Brand new computer.
  • EA Games Germany: "Origin Is Not Spyware"

    11/04/2011 11:19:04 AM PDT · by MeganC · 18 replies
    The Escapist ^ | 1 Nov 2011 3:10 pm | Heather McLellan
    EA Germany has denied claims made by German gamers and journalists that its Origin service is invading their privacy. Germany's privacy laws are amongst the toughest in the Western world. It should come as no surprise that EA's Origin service - which is mandatory for gamers wishing to play Battlefield 3 on PC, and has been criticized for invasion of privacy before - has come under fire in the country known for challenging Google streetview and banning the Facebook "Like" button. German gamers are taking the situation pretty seriously. The furore began a few days ago, when pictures that appeared...
  • Major Security Firms Detect New Trojan Capable Of Disrupting Power Plants - Infrastructure

    10/19/2011 2:08:07 PM PDT · by blam · 33 replies
    SHTF Plan ^ | 10-19-2011 | Mac Slavo
    Major Security Firms Detect New Trojan Capable Of Disrupting Power Plants, Oil Refineries and Other Critical Infrastructure Networks Mac Slavo October 19th, 2011 In our October 7, 2011 report There Have Been Intrusions, we noted that DHS Undersecretary Greg Shaffer warned that hackers and foreign governments are knocking on the backdoor of the networked systems which connect everything from infrastructure grid control systems to financial networks. It now appears that our interconnected smart grid is actively under attack, as evidenced by a new Stuxnet-style trojan that has been detected by major cyber security leaders Symantec and McAfee. Much like its...
  • Trojan asteroid tags along on Earth's orbit

    07/28/2011 4:40:22 AM PDT · by Lonesome in Massachussets · 22 replies
    LA Times ^ | Amina Khan
    The asteroid in the Earth's orbit around the sun has been hiding from view, mostly overhead during daylight, study finds. Turns out the moon's not the Earth's only traveling companion. Space scientists have discovered an asteroid that's been following our fair planet for thousands of years, at least and there may be many more where it came from, according to a recent study.
  • Feds to remotely delete Coreflood from infected PCs

    04/27/2011 2:45:41 PM PDT · by decimon · 12 replies
    Digital Trends ^ | April 27, 2011 | Geoff Duncan
    In an unusual move, federal authorities will be contacting computer users with systems infected by the Coreflood botnet Trojan and asking them to agree to allow them to send commands to the malware so it will delete itself. The move comes in the in the wake of a coordinated takedown earlier this month by the FBI and other authorities, in which the U.S. government essentially substituted its own command-and-control servers in place of those used by Coreflood and issued commands telling the program to shut down on infected PCs. The move reduced activity from the Coreflood botnet by about 90...
  • Trojan-ridden warning system implicated in Spanair crash

    08/20/2010 9:16:53 AM PDT · by Erik Latranyi · 25 replies
    The Register ^ | 20 August 2010 | John Leyden
    Malware may have been a contributory cause of a fatal Spanair crash that killed 154 people two years ago. Spanair flight number JK 5022 crashed with 172 on board moments after taking off from Madrid's Barajas Airport on a scheduled flight to Las Palmas on 20 August 2008. Just 18 survived the crash and subsequent fire aboard the McDonnell Douglas MD-82 aircraft. The airline's central computer which registered technical problems on planes was infected by Trojans at the time of the fatal crash and this resulted in a failure to raise an alarm over multiple problems with the plane, according...
  • Online Virus Robs 3,000 UK Bank Accounts

    08/12/2010 4:30:12 AM PDT · by Cindy · 9 replies ^ | 10:26am UK, Wednesday August 11, 2010 | Rob Cole, News Online
    SNIPPET: "Thousands of online banking customers have had their accounts drained by a sophisticated new computer virus, internet security experts say. Around 675,000 was taken from a "large UK financial institution" over the last month with 3,000 customers hit - and the attacks are ongoing. Online security firm M86 Security Labs said the customers were infected with a Trojan virus - which cannot be detected by traditional anti-virus software - while browsing the internet. The Trojan, known as a Zeus v3, copies the passwords and usernames of customers' online details and transfers their funds to a different account. It then...
  • Computer QUESTION: About "!A2"

    08/11/2010 2:55:05 AM PDT · by Yosemitest · 28 replies · 1+ views
    My Firewall/Antivirus detected an infection of the "!A2" and says it's: A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment. I tried to block it and delete the infected files, but that just set off an attack against my computer, which caused me to reload from backup several times. How do I get rid of this nightmare, and prevent it from coming back?
  • Researchers discover way to create trojans in USB hardware

    07/06/2010 3:36:38 PM PDT · by oc-flyfish · 29 replies
    Tech 1984 ^ | 7/6/2010 | Tech 1984
    Wonderful, just one more way for our benevolent federal government to spy on us.
  • Obama: Americas Great Trojan Horse

    05/10/2010 9:54:51 AM PDT · by beericus · 3 replies · 316+ views
    Men's Daily Forum ^ | may 10th | B.H.Traakon
    Liberty flourished and those who would defeat her pressed their wills on distant shores. Wherever Liberty was oppressed, Free Men rose and ruined the yoke that would constrain them; the world saw America as the shining star of freedom and its defender at all cost. Despot after despot dashed their oppressive wills against the walls of Freedom and time after time, continent after continent, they were defeated. With direct assault failing the oppressors of men would need a new tactic, if Liberty could not be controlled from without it must be stolen from within. Thus began the construction of the...
  • COMPUTER " TROJAN:Win32/Alureon.A"; or, The ROOTKIT MALWARE You Don't Even Know You Have.

    04/07/2010 1:22:51 AM PDT · by Yosemitest · 134 replies · 3,665+ views ^ | Updated: Dec 16, 2009 | Microsoft
    Summary Trojan:Win32/Alureon.A is a data-stealing trojan. This trojan allows an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. Trojan:Win32/Alureon.A may also allow an attacker to transmit malicious data to the infected computer. The trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after Trojan:Win32/Alureon.A is removed from the computer. Microsoft MalWare Protection Center has more info.
  • Energizer battery charger contains backdoor.

    03/10/2010 1:11:32 PM PST · by Widdy · 12 replies · 614+ views
    ZDNet ^ | March, 8 2010 | Ryan Naraine and Dancho Danchev
    The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a backdoor that allows unauthorized remote system access. In an advisory, the US-CERT warned that he installer for the Energizer DUO software places the file UsbCharger.dll in the applications directory and Arucer.dll in the Windows system32 directory. For more:;col1
  • Suit: Pa. school spied on students via laptops

    02/18/2010 1:41:55 PM PST · by AtlasStalled · 43 replies · 1,887+ views
    Associated Press ^ | 02/18/10 | MARYCLAIRE DALE
    A suburban Philadelphia school district used school-issued laptop webcams to spy on students at home, potentially catching them and their families in compromising situations, a family claims in a federal lawsuit. Lower Merion School District officials can activate the webcams without students' knowledge or permission, the suit said. Plaintiffs Michael and Holly Robbins suspect the cameras captured students and family members as they undressed and in other embarrassing situations, according to the suit. * * * The Robbinses said they learned of the alleged webcam images when Lindy Matsko, an assistant principal at Harriton High School, told their son that...
  • Need help with virus warning!

    01/02/2010 7:51:53 AM PST · by Former Fetus · 82 replies · 2,589+ views
    Former Fetus
    I'm no computer expert, but I have Trend Micro Internet Security installed in my PC (renewed subscription yesterday) and scan the whole thing once a day (it takes over an hour, but I think it is worth). This morning, when I turned on my PC I got a warning from "website" that my PC is infected with a trojan and asking me to click and install some program. I did a quick scan of my PC, and Trend Micro says it is clean. When I tried to X out of the warning, it refused to go away, it kept demanding...
  • Linux webserver botnet pushes malware

    09/13/2009 9:24:24 AM PDT · by dayglored · 18 replies · 1,356+ views
    The Register (UK Tech) ^ | 2009-09-12 | Dan Goodin
    A security researcher has discovered a cluster of infected Linux servers that have been corralled into a special ops botnet of sorts and used to distribute malware to unwitting people browsing the web. Each of the infected machines examined so far is a dedicated or virtual dedicated server running a legitimate website, Denis Sinegubko, an independent researcher based in Magnitogorsk, Russia, told The Register. But in addition to running an Apache webserver to dish up benign content, they've also been hacked to run a second webserver known as nginx, which serves malware. "What we see here is a long awaited...
  • Bank data-stealing Trojan infects hundreds of thousands of PCs - researcher

    07/31/2009 9:36:51 AM PDT · by the invisib1e hand · 9 replies · 1,370+ views
    Finextra ^ | July 30, 2009 | Finextra
    A "tremendous" amount of financial data has been stolen by a Trojan that has infected hundreds of thousands of corporate and personal PCs, according to information security specialist SecureWorks. Clampi, also known as Ligats, Ilomo or Rscan, has spread across Microsoft networks in a "worm-like fashion" and is "one of the largest and most professional thieving operations on the Internet" says Joe Stewart, director of malware research at SecureWorks' counter threat unit. Once it has infected a PC, the Trojan monitors Web sessions to see if one of 4500 targeted sites are visited. If a victim uses one of these...
  • Can this Trojan be deleted?

    07/01/2009 7:12:27 AM PDT · by Oshkalaboomboom · 65 replies · 2,118+ views
    July 1, 2009 | Oshkalaboomboom
    I have a rootkit trace that refuses to go away. Macafee can't delete it. Malwarebytes Antimalware claims to delete it but it's right there as soon as it closes. I find hundreds of references to it via Google but nobody says how to get rid of it and nobody even discusses what it does besides annoy you. My cd burning programs have been disabled so I can't make an alternative OS like BartPE. I can boot off the Windows CD and get into the Recovery console. I use DOS commands to delete the files but they come right back again....
  • Virus hit me on Facebook - help!

    06/11/2009 8:49:43 PM PDT · by MeneMeneTekelUpharsin · 24 replies · 1,438+ views
    Vanity | 11 June 2009 | Mene Mene Tekel Upharsin
    Was downloading a video from the internet (Kung Fu movie) when my Avast anti-virus software first warned me of a trojan (from the find site) and then a worm. I deleted both. Both Avast and Trend Micro House Call show no infection. However, on my Facebook account, something sent an ugly message with an even uglier link (which also warned on a virus) to everyone on my Facebook. I do not automatically log in to Facebook, I put in my password every time. How did it do that?
  • Leaked copies of Windows 7 RC contain Trojan

    05/05/2009 7:35:35 PM PDT · by dayglored · 44 replies · 1,239+ views
    ComputerWorld ^ | May 4, 2009 | Gregfg Keizer
    Some pirated builds on file-sharing sites harbor attack code... Pirated copies of Windows 7 Release Candidate (RC) on file-sharing sites contain malware, according to users who have downloaded the upgrade. Windows 7 RC, which Microsoft Corp. will officialy launch tomorrow, leaked two weeks ago, with copies first appearing on BitTorrent tracking sites on April 24. Some of the pirated builds include a Trojan horse, numerous users said in message forums and in comments on BitTorrent sites such as "Just a warning for anyone downloading the new RC builds of windows 7. Quiet [sic] a lot of the downloads have...
  • Final Internet Worm Warning!!!

    03/31/2009 4:59:22 PM PDT · by papasmurf · 102 replies · 4,529+ views
    Self ^ | 03/31/09 | papasmurf
    The conficker worm, aka:Downup, Downadup and Kido, is scheduled to become active at 00:01:00 AM on 04/01/09. It's a complete unknown and has many experts worried. If you aren't sure about being protected on your Windows machine, please download the FREE application from Microsoft called Windows SteadyState , and install it. It only takes a few minutes, it's very easy and simple, and it will protect your hard drive. I use it on my XP Box and my Wife's Vista laptop, and I know it works. Download it, click to install, open it, and select "User Restrictions", and (if...
  • Pentagon Hit by Unprecedented Cyber Attack

    11/20/2008 4:43:58 PM PST · by Sammy67 · 244 replies · 12,359+ views
    FoxNews ^ | 11/20/08
    <p>Thursday, November 20, 2008 The Pentagon has suffered from a cyber attack so alarming that it has taken the unprecedented step of banning the use of external hardware devices, such as flash drives and DVD's, FOX News has learned.</p> <p>The attack came in the form of a global virus or worm that is spreading rapidly throughout a number of military networks.</p>
  • MSM Refusal to Vet Obama: Affirmative Action President?

    10/17/2008 9:29:12 PM PDT · by Bronco_Buster_FweetHyagh · 18 replies · 602+ views
    Joe the Plumber asks Barack Obama a simple question, which elicits a damaging and revealing peek into Obama's true beliefs. Within two days, the Main Stream Media and left wing pundits and bloggers have waged a full blown character assassination of Joe the Plumber. (1) Insinuation Joe Lied about his name (its his middle name) (2) Accusation that Joe is a deadbeat (he has a tiny back tax bill), (3) Accusation that Joe is a law breaker (he works under the license of a different plumber like MANY tradesmen across the US), (4) Accusation he's a wife beater and a...
  • Scientists calculate the exact date of the Trojan horse using eclipse in Homer

    06/24/2008 11:49:01 AM PDT · by LibWhacker · 42 replies · 109+ views
    Telegraph ^ | 6/24/08 | Roger Highfield
    The exact date when the Greeks used the Trojan horse to raze the city of Troy has been pinpointed for the first time using an eclipse mentioned in the stories of Homer, it was claimed today. # The truth about an epic tale of love, war and greed Scientists have calculated that the horse was used in 1188 BC, ten years before Homer in his Odyssey describes the return of a warrior to his wife on the day the "sun is blotted out of the sky". The legend of the fall of Troy is mentioned in Virgil and Homer's poems...
  • Incredible Message About[Dr. Don Boys'] Islam Book from a Muslim Nation!

    06/09/2008 7:46:55 PM PDT · by John Leland 1789 · 2 replies · 186+ views
    Preacher Helps ^ | June 9, 2008 | Dr. Don Boys
    Incredible Message About my (Dr. Don Boys) Islam Book from a Muslim Nation! How this brother got my book on Islam I don’t know. He must have purchased it while visiting in another country or someone sent it to him. He says he would be killed by followers of that peaceful religion of Islam if it were known that he had my book! What a way to live! Following is his email except for his name and country. I got to read some parts of your book Islam: America 's Trojan Horse. I would like to mention that it is...
  • The New E-spionage Threat (CHINA)

    04/14/2008 4:34:47 AM PDT · by Perseverando · 11 replies · 257+ views
    BusinessWeek Magazine ^ | April 10, 2008 | Brian Grow, Keith Epstein and Chi-Chu Tschang
    A BusinessWeek probe of rising attacks on America's most sensitive computer networks uncovers startling security gaps The e-mail message addressed to a Booz Allen Hamilton executive was mundanea shopping list sent over by the Pentagon of weaponry India wanted to buy. But the missive turned out to be a brilliant fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidious piece of computer code known as "Poison Ivy" designed to suck sensitive data out of the $4 billion consulting firm's computer network. The Pentagon hadn't sent the e-mail at all. Its origin is unknown, but the...
  • Worm infected Daughters Laptop (worm.win32.netsky)

    02/06/2008 6:12:48 PM PST · by SandRat · 23 replies · 102+ views
    Ok, Daughter's laptop with an up to date anti-virus program and firewall has gotten infected with a worm called worm.win32.netsky. Can't find a removal program for this bugger and the scans haven't found or removed it. She was going to various School District web sites to apply for a teaching job when it happened It loaded on it's own new desktop icons, and diabled remove program from the task bar along with Ctl-Alt-Del. Anyone out there got ideas?

    01/18/2008 6:48:33 PM PST · by SWAMPSNIPER · 8 replies · 410+ views
    self | January 18, 2008 | swampsniper
    Digital photo frames containing malware have been found, heads up!
  • (Reggie) Bush evidence mounts

    01/10/2008 10:02:58 PM PST · by stainlessbanner · 30 replies · 151+ views
    Yahoo Sports ^ | January 10, 2008 | Charles Robinson and Jason Cole
    A former business associate of the failed marketing agency that attempted to secure Reggie Bush as a client told Yahoo! Sports he spoke directly to Bush about the company's business plan before the running back completed his junior season at the University of Southern California. Such an action would have violated NCAA rules and is the latest in a series of facts uncovered in a Yahoo! Sports investigation that indicate Bush and his family had an improper relationship with New Era Sports & Entertainment. Ben Delanoy, now CEO of Next Level Sports Marketing, said Bush indicated he would be part...
  • Bhutto murder used to spread malware

    12/28/2007 8:23:00 PM PST · by snarkpup · 7 replies · 290+ views
    The Register ^ | 12/28/2007 | John Leyden
    Malicious JavaScript pushes Trojan Virus writers are exploiting morbid curiosity about the assassination of former Pakistani Prime Minister Benazir Bhutto's to spread malware. Surfers searching for video footage of the suicide attack that killed Bhutto and at least 21 others on Thursday are liable to find malware posing as video clips that attempts to trick users into running malign ActiveX controls. The malicious downloaded file is detected by Symantec as the Emcodec-Trojan.
  • Online Crooks Target Macs With Porn Ruse (Apple)

    11/01/2007 8:38:22 PM PDT · by Alter Kaker · 23 replies · 496+ views
    Associated Press ^ | 1 November 2007 | Jordan Robertson
    SAN FRANCISCO In a backhanded compliment to Apple Inc., online criminals are apparently so impressed with its scorching sales they are sending Macintosh computers an attack typically aimed at machines running Microsoft Corp.'s dominant Windows operating system. Symantec Corp. researchers said the Web sites serving up the new attack also deploy a Windows version. "For a while Mac users have enjoyed the benefits of being a small enough population that hackers didn't go after them directly _ that's obviously now changing," said Ben Greenbaum, senior research manager at Symantec Security Response. Lynn Fox, an Apple spokeswoman, said the Cupertino-based...