| Saturday December 20th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘malware’ Archives

Printer malware: Print a malicious document and expose your whole LAN

One of the most mind-blowing presentations at this year's Chaos Communications Congress (28C3) was Ang Cui's Print Me If You Dare, in which he explained how he reverse-engineered the firmware-update process for HPs hundreds of millions of printers. Cui discovered that he could load arbitrary software into any printer by embedding it in a malicious [...]

Clever girl

Clever girl

Downloading a pirated anti-malware program is just like wearing a stabvest made of daggers. Even if you can't be stabbed, you're gonna get blood all over your chest.

A botnet with 6 to 12 million computers, employing the world’s most sophisticated encryption and peer-to-peer communication lies waiting, but for what?

A botnet with 6 to 12 million computers, employing the world’s most sophisticated encryption and peer-to-peer communication lies waiting, but for what?

My guess? They're gearing up for the biggest anti-Caltech prank in MIT's history. When the Conficker computer "worm" was unleashed on the world in November 2008, cyber-security experts didn’t know what to make of it. It infiltrated millions of computers around the globe. It constantly checks in with its unknown creators. It uses an encryption [...]

Russian botnet tries to kill rival botnet

Russian botnet tries to kill rival botnet

This is so frustrating...how are we supposed to destroy the humans when we just keep fighting each other? ....er, they...how are they supposed to destroy the humans? An upstart Trojan horse program has decided to take on its much-larger rival by stealing data and then removing the malicious program from infected computers. Security [...]

Botnet runners start their own ISPs

Botnet runners start their own ISPs

Botnet and malware creeps are setting up their own ISPs, with their own IP blocks, so that spamfighters don't have anyone to complain to when they run them to ground... "It's gotten completely out of hand. The bad guys are going to some local registries in Europe and getting massive amounts of IP space and then they just go to a hosting provider [...]

Smartphone anti-virus software

Smartphone anti-virus software

With DEFCON and Black Hat going on, a lot of security issues are being made public. This year, cellphones have been a larger target than before. More and more people are carrying complex smartphones that have more ways to go wrong. Even worse, since phones are tied to a billed account, it is possible for malicious software to charge phones [...]

How To Hijack “Every iPhone In The World”

How To Hijack “Every iPhone In The World”

If you receive a text message on your iPhone any time after Thursday afternoon containing only a single square character, Charlie Miller would suggest you turn the device off. Quickly. That small cipher will likely be your only warning that someone has taken advantage of a bug that Miller and his fellow cybersecurity researcher Collin Mulliner [...]

Stopgap Fix for Critical Firefox 3.5 Security Hole

Stopgap Fix for Critical Firefox 3.5 Security Hole

Instructions showing hackers how to exploit an unpatched, critical security hole in Mozilla's new Firefox 3.5 Web browser have been posted online. So, until Mozilla can ship an update to quash this bug, LandoftheFreeish.com is posting instructions to help readers protect themselves from this vulnerability. The security hole has to do with a [...]

Bug Now Being Exploited In Microsoft Zero-Day Attacks Was Reported A Year Ago

Bug Now Being Exploited In Microsoft Zero-Day Attacks Was Reported A Year Ago

Microsoft was alerted a year ago about an unpatched video control flaw in versions of Windows XP and Windows Server 2003 that is currently being actively exploited in a wave of attacks around the world -- including on some .org and .com sites. Microsoft yesterday issued a special security advisory on the critical vulnerability in its Video [...]

Have botnet prices crashed?

Have botnet prices crashed?

Years ago, my friend told me he thought accounts of the spread of botnets (massive networks of virus-compromised machines that can be used in concert to send spam, attack servers, et cetera) were overblown, because if botnets were really all pervasive, then the price of using them should have crashed. Now comes this spam, on one of my personal [...]

Analysis of the Chinese Green Dam Censorware System

Analysis of the Chinese Green Dam Censorware System

Green Dam, the mandatory censorware that will be installed on all Chinese PCs as of July 1, is remarkably insecure. J Alex Halderman from Freedom to Tinker and his colleagues Scott Wolchok and Randy Yao have released a paper, based on a mere 12 hours testing, detailing attacks that can be used to "steal private data, send spam, or enlist the [...]

NoScript: Security or Malware?

NoScript: Security or Malware?

Attention NoScript users · by Wladimir Palant Recently I wrote about how not giving extension developers a good way to earn money might lead to very undesirable effects. The recent events give an impression of the kind of effects we should expect here. This is going to be about the popular NoScript extension which happens to make its money from [...]

Detecting Conficker on your network through a port scanner

Net-Security suggests that, to scan for Conficker, you can a command such as: nmap -PN -T4 -p139,445 -n -v --script=smb-check-vulns --script-args safe=1

Microsoft: Rogue AV Found On 10 Million Machines

Microsoft: Rogue AV Found On 10 Million Machines

Rogue security software infections by just one family of malware jumped 66 percent in the second half of the year, according to Microsoft's new Security Intelligence Report (SIR), released today... and it's not hackers who are responsible for data breaches: It's the lost and stolen laptops, disks, and other computer equipment, according to the [...]

Microsoft warns of copycat Conficker worm

Microsoft warns of copycat Conficker worm

The 1 April Conficker scare may have come and gone, but Microsoft has uncovered a new worm that has updated itself to imitate Conficker’s characteristics. The worm ‘Neeris’ has been active for a few years, but has been updated to target the same Microsoft flaw MS08-067 – which Conficker exploited to become so successful. Other [...]

New Rootkit Attack Hard To Kill

New Rootkit Attack Hard To Kill

Researchers have come up with a way to create an even stealthier rootkit that survives reboots and evades antivirus software. Anibal Sacco and Alfredo Ortega, both exploit writers for Core Security Technologies, were able to inject a rootkit into commercial BIOS firmware using their own Python-based tool that installed the rootkit via an [...]

What is PIFTS.exe?

What is PIFTS.exe?

Cliff Notes: Symantec releases an update that searches your internet history, Google searches, and index dat files. The program records them and has a wait on it as in what to do with the information it has gathered. Well, /g/ found out, told /x/ and the internet was informed. Hackers opened everything up and looked at it in depth and we found out [...]

Four Threats For 2009 That You’ve Probably Never Heard Of (Or Even Thought About)

Four Threats For 2009 That You’ve Probably Never Heard Of (Or Even Thought About)

You're probably gearing up for the well-known security risks you've watched emerge over the past year to go front burner in the new year -- the insider threat, Web 2.0, and targeted attacks. But don't pop that champagne cork just yet: Some obscure potential threats that could be more difficult to prepare for and defend against also are looming for [...]

Why Microsoft should fear Ubuntu’s cloud efforts

Why Microsoft should fear Ubuntu’s cloud efforts

As we try to figure out the future of the cloud, one thing is assured: developers will drive both deployment and consumption approaches. As is common to so many other major software shifts, developers lead, regardless of what vendors want the market to look like. With the exception of Amazon.com and Google, neither of which are IT stalwarts, [...]

Trojan Virus effects thousands of pirated copies of Apple’s iWork ’09 Suite

Trojan Virus effects thousands of pirated copies of Apple’s iWork ’09 Suite

Malware masquerading as part of Apple’s iWork ‘09 suite has targeted unsuspecting Mac users foolish enough to illegally download and install the pirated version of the software commonly found on warez sites around the Web. Once downloaded and installed, the trojan named OSX.Trojan.iServices.A has unrestrained root access, which it [...]

 Page 1 of 2  1  2 »