Items tagged with Malware
Be careful what you download from Google Play, as auto-clicking adware dubbed “Judy” is believed to have infected up to 36.5 million users. The apps have been deemed as malware, despite their overall high review ratings on Google Play.
Judy was found on forty-one apps developed by a Korean company Kiniwini...
Read more...
Now that the dust has settled on a global ransomware outbreak that could have been much worse than it ended up being, we can all breathe a sigh of relieve. Meanwhile, security outfits are busy analyzing the outbreak to uncover as much information as possible about the threat known as WannaCry. According to Symantec's...
Read more...
WikiLeaks has posted its latest release from the Vault 7 series of CIA-related leaks that exposes a tool dubbed “Athena”, which acts as a beacon on compromised Windows-based systems and gives the agency remote loader capabilities as well.
Athena and its associated tools function on all versions of Windows from XP...
Read more...
The Wanna Decrypter ransomware that began floating around the Internet late last week, or WannCry as it's commonly known, has made a lasting impact, with hundreds of thousands of PCs worldwide being affected. What the malware does is even more alarming: one minute, you're using your computer normally; the next, your...
Read more...
Last fall, we reported on a somewhat humorous report of a mere "reply all" email that managed to bring down email servers of the UK's National Health Service. Unfortunately, we have something a bit more severe to report on today: an all-out cyberattack against the NHS.
At some point today, doctors at NHS had to...
Read more...
A vulnerability researcher at Google is giving props to Microsoft for issuing a quick fix to what he described as a "crazy bad" remote code exploit in the company's malware protection engine. He also said it was the worst of its kind in recent memory, and that is because prior to the patch, a remote attacker could...
Read more...
It seems like a day doesn't go by that we don't hear about some piece of malware that's harassing computer users. In 2017, you would expect that most people would be hesitant to download and extract random, rogue zip files, but sadly, that's not the case. There's a reason these pieces of malware still exist -- just...
Read more...
Official app stores are supposed to be safe havens for mobile users to download and install programs and games without fear of mucking up their smartphones and tablets. Unfortunately that is not always the case. Researchers at veteran security outfit Check Point, makers of the popular ZoneAlarm personal firewall...
Read more...
Despite Google's best efforts to protect its users who download apps from its Play Store, some malware inevitably slips through the cracks. While it might be easy to assume that most of that malware is found in obscure software that people shouldn't be downloading anyway, this latest case is proof that if malware does...
Read more...
The latest bombshell to come out of WikiLeaks’ Vault7 series of leaks from the CIA, exposes a tool codenamed “Grasshopper”, which allows operatives to deploy persistent surveillance and hacking payloads on target Windows-based computer systems and remain undetected from popular anti-malware and anti-virus...
Read more...
There are lots of obvious examples of how IoT (Internet of Things) connected and smart devices can enrich our lives. However, as we've noted numerous times over the past year, there are a number of caveats that can also come with them. The glaring issue of course has to do with security, or the lack of it really. And...
Read more...
It is pretty well known that Android devices are often the target of malware outbreaks due to the open nature of the software platform and also because it is by far the most prolific mobile operating system in use around the globe. In most cases, this malware finds its way onto a device after it is in the hands of its...
Read more...
It’s no secret the Epic founder Tim Sweeney hates Microsoft’s Universal Windows Platform (UWP), which he has made clear on many occasions. UWP, which in essence is a replacement for the venerable Win32 API, is increasingly being used for Windows games, and is the only way to distribute gamers through the Windows...
Read more...
A full-blown Skynet situation might be the thing of science fiction (we hope, anyway), but that doesn't mean bizarre things involving machines can't happen. As proof of this, Verizon teased an entry in its upcoming 2017 Data Breach Digest that describes a recent DDoS attack on an unnamed university involving vending...
Read more...
For what we're sure are obvious reasons, Google has long blocked certain types of attachments from being sent through its Gmail service. Those include .bat (Windows Batch), .exe (Windows executable), and .msc (Microsoft Management Console). Soon, .js (JavaScript) will be joining the prohibited ranks.
This is the...
Read more...
It appears that the first Mac malware discovery of 2017 belongs to "Quimitchin", a strange little find that targets, of all things, scientific research. The "strange" part of the malware comes from the fact that it features system calls that have long been deprecated, or at least haven't been relevant for quite some...
Read more...
As if hackers do not already have an easy enough time duping Internet users into forking over personal information, it turns out that browser autofill profiles may be helping them out when they're supposed to be making things more convenient for the person who inputted his information. By implementing hidden fields on...
Read more...
With a name like 'KillDisk', it's not hard to imagine what the malware it represents sets out to accomplish. Add on a good helping of ransomware, and KillDisk becomes the kind of malware that can give people nightmares, and not to mention a lot of undue stress.
In the past, KillDisk malware has infected computers...
Read more...
Malware writers continue to find ways to make themselves out to be bigger scumbags than they already are. The latest dirty trick by the worst the web has to offer is a new twist on ransomware. Instead of simply encrypting the files on an infected PC and demanding a ransom in order to decrypt them, a variant called...
Read more...
If you currently are in possession of a Google account (and who isn’t these days), you might want to pay close attention to the findings of researchers at Check Point. According to Check Point, new malware is making the rounds under the name Gooligan.
Gooligan’s main attack vector is through Android-based...
Read more...
It's been quite some time since malware-laden images have been a major security issue, but the risk is still out there. The attack vector has been exploited recently through a couple of leading social networks: Facebook and LinkedIn.
The attack, named "ImageGate" by researchers at Check Point, takes advantage of...
Read more...
A cloud security outfit is warning that a new ransomware strain called Stampado has emerged from the underground market and is wreaking havoc on systems. What makes Stampado stand out from the crowd is that it is available on the dark web for only $39 with a full lifetime license. That makes it one of the least...
Read more...