| Monday October 20th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘malware’ Archives

Malware posing as Change.gov

Malware posing as Change.gov

PandaLabs has identified a botnet running a malware campaign impersonating president-elect Obama’s website. The front page of the site features a sensational story titled “Barack Obama has refused to be a president”. Clicking the link will download the malware and make the target’s machine part of the botnet. They’re using fast-flux to [...]

Interview with an adware author

Interview with an adware author

Philosecurity has an interview with Matt Knox, a former coder for Direct Revenue, an adware company which was sued in 2006 by New York governor Eliot Spitzer. The interview contains some interesting details of how the adware code worked internally: it created a Browser Helper Object, then ensured that the Browser Helper Object stayed up by [...]

You sneaky bastards!

You sneaky bastards!

I'm surprised they haven't started using double negatives yet... "Do you not not want to cancel your subscription? If you do want to not cancel, press cancel. If you do want to cancel, don't press OK."

Free “Trojan-Proof” Password Tool Released for Windows

Free “Trojan-Proof” Password Tool Released for Windows

A trio of German software firms claims to have developed a password system that prevents Trojans and viruses from stealing passwords from a Windows machine. The “Trojan-proof” virtual keyboard software, which was developed by Global IP Telecommunications, PMC Ciphers, and CyProtect AG, is available in a free beta version for [...]

The short life and hard times of a Linux virus

The short life and hard times of a Linux virus

Why aren't the existing Linux viruses anything more than a topic for conversation? Why don't they affect you in your daily computing in the way that MS viruses affect Windows users? There are several reasons for the non-issue of the Linux virus. Most of those reasons a Linux user would already be familiar with, but there is one, all important, [...]

DEFCON 16 – The Tools

DEFCON 16 – The Tools

DEFCON, the 9000+ attendee hacker conference in Vegas has become a sort of hydra conference. It has become more like a global fair than what most people think of conferences; even the badge is highly unique. I say this because there are so many things to do at DEFCON, other than going to talks, that you could spend your whole weekend looking at [...]

Microsoft Revamps Patch Tuesday Warning Process

Microsoft Revamps Patch Tuesday Warning Process

LAS VEGAS -- Black Hat USA 2008 -- As hackers and researchers get ready to unveil their latest vulnerability findings here, Microsoft today announced that it is improving its methods for sharing and categorizing the vulns that affect Windows and its other applications. "The introduction of these new programs helps address evolving online threats [...]

New worm transcodes MP3s to try to infect PCs

New worm transcodes MP3s to try to infect PCs

The new malware inserts links to dangerous Web pages within ASF (Advanced Systems Format) media files. "The possibility of this has been known for a little while but this is the first time we've seen it done," said David Emm, senior technology consultant for security vendor Kaspersky Lab. Advanced Systems Format is a Microsoft-defined [...]

Ohh, the irony… Microsoft says “Safari isn’t safe on Windows”

Ohh, the irony… Microsoft says “Safari isn’t safe on Windows”

This is bad news for all eleven Safari-on-Windows users... Apple's been making hay in its Mac vs. PC ads about Windows' security and malware problems. But now that Apple's playing in Microsoft's sandbox with a Windows version of the Safari Web browser, the worm has turned. The Windows version of Safari has a bug that's been dubbed the "carpet [...]

Consumer (Dis)Comfort With Online Tracking

Consumer (Dis)Comfort With Online Tracking

In privacy debates about online advertising, the focus is most often on consumers. Consumers love free content, the advertisers and ad networks say. They say consumers are willing to have their online activities analyzed and categorized, because an ad for a minivan that lands in front of a soccer mom is valuable, and valuable ads are what support [...]

Windows NT UNICODE Vulnerability Analysis

Windows NT UNICODE Vulnerability Analysis

It can be argued that the main purpose for computer systems is fast and reliable communication from one system to another. How is that accomplished? What allows a computer running an English operating system to communicate with one running a Russian operating system? Both have different human readable alphabets. Both have different character [...]

Figure Out If It’s Malware at exeLibrary.com

Figure Out If It’s Malware at exeLibrary.com

Search engine exeLibrary demystifies the EXEs running in your Task Manager to help you get to the bottom of whether or not that cryptic process actually needs to be running (and whether or not it's malware). Just search any process when you're unclear of its purpose in exeLibrary, and it'll give you a detailed description of what the process [...]

 Page 2 of 2 « 1  2