Items tagged with Malware

The Raspberry Pi is terrific for plenty of uses, from retro-style gaming to running an extremely low-cost server. A team of researchers have discovered another new use for Raspberry Pi: hands-off malware detection. While most virus and malware detection depends on file signatures and behaviors, this new project... Read more...
It is a good idea to always be wary of packages, especially if you are not expecting one. The United States Federal Bureau of Investigation (FBI) recently warned American companies that cybercriminals are sending USB drives with ransomware in the mail. The cybercriminals have attempted to mimic legitimate institutions... Read more...
Google Docs pretty much revolutionized online collaboration when it came about. Instead of having to install clunky network software packages, or worse, use awkward remote desktop features, you could simply send your coworker or collaborator a web link and the two of you could work on a document simultaneously in your... Read more...
You may not be aware of this, faithful HotHardware reader, but ransomware attacks are rarely random. More commonly, it's an operator within a group who targets a specific organization or network looking for a hefty payout. One such group is the organization AvosLocker, who uses a tool by the same name to encrypt... Read more...
Do you let your browser store logins for websites like Twitter, Facebook, or HotHardware? Well, you probably shouldn't. Not only does it let anyone who gets on your PC access your personal information, but it also opens you up to easy attacks from "info-stealer" malware. South Korean cyber-security firm Ahnlab just... Read more...
Nobody wants to rack up bad karma, which should be reason alone not to pilfer movies from the internet via BitTorrent or whatever other means. But even disregarding the moral aspect or pirating movies and games, there's another reason not to engage in such behavior—you could end up with a malware infection. Some... Read more...
One app on the Google Play store has sent users’ contacts to a Russian server on the sly. Then, it signed them up for expensive subscriptions. That one app has already been downloaded half a million times. If you’re among those 500,000 users who downloaded the app, you’d best delete it now. The app is called Color... Read more...
Criminal ransomware distributors have evolved dramatically over the past few years. Operators that were once splinter groups or lone individuals have become highly sophisticated and organized. Security experts say it’s not getting any better, either. Rather, some say we’re in the “golden era of ransomware” and 2022... Read more...
Installing pirated software is always risky business. The hacking tools used to bypass legitimate software activation quite frequently include viruses and malware. The latest in a long line of malware piggybacking is a popular activation tool that targets your cryptocurrency wallets. The threat was first noticed by... Read more...
An Android malware analyst at Kaspersky continues to expose apps in Google play that may appear legitimate at first glance, but actually have a sinister underside. Each of the nearly two dozen apps (so far) identified since late July contain a Joker trojan, which itself features a bag of devious tricks to swindle... Read more...
This weekend, cyber-security firm Palo Alto Networks released a detailed analysis of an ongoing hacking campaign targeting technology, defense, healthcare, energy, and education industries. The attack targets Zoho's ManageEngine ADSelfService Plus password management system and uses vulnerability CVE-2021-40539 to... Read more...
If you were a threat actor, what better way to get a payload onto someone’s device than through a program that nearly everyone has installed like Google Chrome? Unfortunately, this appears to be what is happening with the Infostealer malware, masquerading as a legitimate update to the popular web browser from Google... Read more...
Malware on Windows devices has become a real problem in the last few years, specifically with a recent uptick in ransomware. It appears that Microsoft has been trying to combat this issue, though, with updates to Microsoft Defender, so it has more teeth than ever before. However, what if Microsoft is part of the... Read more...
A lot of folks buying (legitimate) software are disgruntled about the rise of "software as a service," or SaaS. Proponents claim that the continued payments enable further development of useful applications, while opponents complain that they end up paying far more than they might under a more traditional "buy to own"... Read more...
Practically everyone owns a mobile device these days, and the majority of them run on Android, the most popular smartphone OS in the world. Don't think that malicious hackers aren't paying attention. Just the opposite, a security firm says it recently discovered an "aggressive mobile premium services campaign" that... Read more...
Security researchers say they discovered and reported to Microsoft a "highly sophisticated" zero-day attack vector in Windows that targets Office 365 and Office 2019 users. In some cases, simply opening an infected document would be enough to compromise a PC. Furthermore, there does not yet exist a patch, though one... Read more...
A notorious cyber-criminal group is believed to be responsible for a malicious Word document that attempts to lure victims by preying on their curiosity towards Windows 11, the next major operating system from Microsoft. The document began making the rounds in June, the same month a leaked Windows 11 ISO tipped up... Read more...
Do you ever feel like the universe just has it in for you? Adding to the theory that some entity is pulling the strings from behind the scenes and having a good chuckle at our expense, not only are graphics cards frustratingly almost always out of stock (and overpriced), but if you do manage to procure one, you may... Read more...
It is somewhat common for enterprising developers to add features to popular apps via plug-ins, companion apps, or even by modifying the original when possible. By reverse-engineering apps, like WhatsApp for example, a skilled developer can tweak and modify features or even add their own spin on things. However, this... Read more...
Not everything has to be high-tech to perform dastardly deeds these days, and the same is true of malware. However, malware can slip by conventional security solutions using some email tricks and social engineering and still infect end-users, as Microsoft reports. This Tuesday, the Microsoft Security Intelligence... Read more...
Network Attached Storage (NAS) devices from Synology are being targeted by the StealthWorker Botnet in an ongoing brute-force attack that could lead to ransomware infections. Perhaps we should just drop the “network attached” of NAS portion for now. According to an August 4th report, Synology’s Product Security... Read more...
Some of Gigabyte's support sites have been taken offline, the result of an apparent ransomware attack in which a hacking group claims to be in possession of sensitive data, and is holding it hostage. If a ransom is not paid, the culprits say they will publish 112 gigabytes of stolen files, including ones containing... Read more...
First ... Prev 4 5 6 7 8 Next