Items tagged with Malware

You might think that given the reaction consumers had after Lenovo was found to be installing malware on customer PCs, other vendors would think twice about doing the exact same thing. Not Samsung, it seems, as it's just been discovered that the software updater tool it bundles with its notebooks takes it upon itself to keep Windows Update disabled. Windows Update is perhaps the most important tool that ships with Windows, as it's directly responsible for patching bugs directly related to the OS -- and there are a lot of them. If these bugs don't get patched, it means that the user is left vulnerable,... Read more...
Leading antivirus firm Kaspersky Lab said that it recently suffered a security breach involving at least three techniques that it had never seen before. The AV company described the attack as "one of the most sophisticated campaigns ever seen," though it believes it was able to detect the intrusion at an early stage, thereby mitigating the damage."This highly sophisticated attack used up to three zero-day exploits, which is very impressive -- the costs must have been very high," Costin Raiu, director of Kaspersky's global research and analysis team, said in a statement.The sneaky malware used... Read more...
It seems that it was just yesterday that someone had to know a thing or two about software and programming to wreak havoc on fine upstanding Internet citizens via malware incursion. Ah, the good old days. Nostalgia aside, though, one cannot help but feel rattled by the news that security researchers at McAfee have discovered new software with which the oh-so-nefarious out there can easily construct their own ransomware. And not only is such a product in the wild, but it is online software, too, accessible by anyone capable of navigating a keyboard and a TOR browser. ... Read more...
If you thought that there couldn't possibly be more unbelievable stories to stem from Edward Snowden's leaks, you're sorely mistaken. Today, we learn of a truly appalling effort that the NSA and its partners worked together on to intercept Android users' connections to install malware and soak up information. The NSA's partners in crime are part of a group called 'Five Eyes', and in addition to the US, included countries are Canada, the UK, New Zealand, and Australia. Given other revelations that have trickled out in the past, this list shouldn't come as much of a surprise. The UK's GCHQ, which... Read more...
Given the incredible modding scene that surrounded Grand Theft Auto IV, it seemed inevitable that GTA V would follow suit. So far, that seems to be the case, although it will probably take some time before some of the best mods will be seen. Nonetheless, with prospects of great mods also comes prospects of other people trying to ruin your day, by giving you something extra with that mod. At GTAForum, user aboutseven notes that their PC was recently infected with malware, and after investigating, found that the source was a popular GTA V mod called Angry Planes. Since the post was made, many others... Read more...
Security firms and anti-malware providers sure do have their work cut out for them, a fact that seems to get emphasized every day. As attackers become more creative, researchers have to dig deep in order to understand how malware manages to hide itself so well. It used to be that static scanners would be suitable enough, but that's hardly the case nowadays. Attackers are becoming even more creative, creating almost ninja-like malware. Take Rombertik, for example. This is a piece of malware that was deeply analyzed by Cisco's Talos Security Intelligence and Research Group that at the high level... Read more...
Anyone who has driven an Android smartphone any distance whatsoever has no doubt wondered whether any of the apps they use could be serving as information conduits. The relaxed vetting process that the Google Play Store has in place ('relaxed' versus the jailer-esque process in use by those minding Apple's app store) results in their stocking all but the most obviously malicious apps, after all, so a little suspicion in the mix just makes sense. So is this neat new Find Parking app that just asked for location privileges pushing data on my movements into some database somewhere? Will personal... Read more...
Researchers from security outfit ESET discovered that several thousand servers running Linux and BSD have unwittingly been sending out spam as a result of a previously undiscovered malware infection. This has been going on for more than 5 years, as the malware was able to stay hidden all this time due to its sophistication and because the spammers haven't been constantly infecting new machines. "We were able to identify victimized system and began the process of notifying its owners," said Lead ESET security researcher Marc-Etienne M. Léveillé. "This is not trivial, as we identified over 8500 unique... Read more...
A lot of the attention Windows 10 has received from the media has focused on consumer features and amenities, but there's quite a bit for enterprise users to look forward to as well. One of them is called Device Guard, a previously unnamed feature from Microsoft that gives organizations the ability to lock down devices in a way that's designed to offer advanced malware protection. "It provides better security against malware and zero days for Windows 10 by blocking anything other than trusted apps—which are apps that are signed by specific software vendors, the Windows Store, or even your own organization,"... Read more...
When is it fair to deem a botnet "complex"? Well, I think it's fair to label it as such when it requires a collection of cybercrime fighters from the US and Europe to ultimately give it its final blow. Here's some context: "On 8 April, Europol’s European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce (J-CAT), joined forces with the Dutch authorities and the FBI, and U.S-based representatives at the National Cyber Investigative Joint Task Force- International Cyber Crime Coordination Cell (IC4) along with private sector partners, to target the Beebone (also known as AAEH) botnet".... Read more...
Think stealing hundreds of thousands of dollars from an enterprise organization is difficult? You might be surprised after learning about how the 'Dyre' malware that IBM has been tracking operates. Like most malware, Dyre needs to infect a PC in order to work. This can be done via a number of different methods, but email is the most common. Once someone takes the bait, the waiting game begins for a bank transfer to be made. If the thieves behind Dyre are lucky enough to infect an important PC, an error message will be displayed in the event that a bank transfer is initiated, complete with a phone... Read more...
What a week it has been for Lenovo. Often considered one of the best of the notebook vendors, it was discovered earlier this week that the company in recent months had been bundling some seriously shady software on many of the PCs it sold to consumers. Not only did this software inject advertising into user Web browsing, it also opened up a can of worms with regards to security. While it seemed at first that Superfish was more bundled bloatware, Lenovo quickly changed its tune after the Web exploded with ire and even US Homeland Security urged removal. That lead up to yesterday, where the company... Read more...
It feels like we can't go a single week without learning of some new strain of Android malware, but for the most part, it's rare when we learn of one that introduces a brand-new design or unique mechanics. Well, a nameless piece of malware discovered by AVG this past week helps break the mold. Infecting about 10,000 pre-Android 5.0 phones in China, this new piece of malware prevents a phone from being shut off completely, even though it looks like it is. There are many details missing here, but what we know is that the malware intercepts the shutdown routine of Android, making it so that the final... Read more...
Well... that sure didn't take long. Yesterday, we reported on Lenovo, and how it had been shipping its customers' PCs equipped with some of the shadiest adware out there. Not only did this adware inject advertising into a user's regular browsing, it brought with it some major security flaws. As we noted yesterday, Lenovo made it sound like the adware in question, Superfish, wasn't all too bad. While the company removed it for now, it said that should Superfish change its likeness a bit, it would be returned. Now, it seems like Lenovo has had a change of heart. It's funny how backlash can work,... Read more...
1 2 3 4 5 Next ... Last