Blog Posts Tagged with "virus"


System Compromise: What the Heck is a FeeLCoMz String?

February 03, 2012 Added by:Brent Huston

If you find those strings, they usually indicate other PHP scanners, worms or attack tools have compromised the system. Now, if you don’t find those, it does NOT mean the system is safe, the list of all of those relevant strings would be too large and dynamic to manage...

Comments  (0)


Report: Malware Creation Hit Record High in 2011

January 31, 2012 Added by:Headlines

The report attributes the increase to automation techniques being more widely used in the creation of malware variants - slightly altered signatures developed to foil anti-malware detection software. The report notes a sharp increase in the proliferation of Trojans...

Comments  (0)


Malware Infection Rates – Who Has the Most Viruses?

December 07, 2011 Added by:Dan Dieterle

A look at the top viruses for each country shows a lot of cookie based viruses. Which may or may not be real viruses, but the rates are high none the less. But how does this compare to what other vendors are finding?

Comments  (0)


Duqu Malware Authors Display Sense of Humor

November 14, 2011 Added by:Headlines

"This is another prank pulled by the Duqu authors, since Showtime Inc. is the cable broadcasting company behind the TV series Dexter, about a CSI doctor who happens also to be a serial killer who avenges criminals in some post-modern perversion of Charles Bronson’s character in Death Wish..."

Comments  (0)


The History of Computer Malware: An Infographic

November 01, 2011 Added by:Dan Dieterle

Received this infographic that traces the history of computer viruses from our friends at Bitdefender and thought we would pass it along. Hope you enjoy it...

Comments  (0)


US Drone Fleet Infected with Computer Virus

October 10, 2011 Added by:Ron Baklarz

We will probably never know how the infections occurred. Were vendor support connections the cause? Was an infected thumb drive or disk the culprit? At any rate, these types of incidents underscore the enemy's desire to exploit cyber-security to their advantage...

Comments  (0)


What the Law Says about Distributing a Virus or Malware

September 20, 2011 Added by:Craig S Wright

It is probable a service provider or content hosting entity will face a degree of liability dependent on intention. If malware is intentionally posted such as in the Morris’ case, no uncertainty as to whether the conception and insertion of the malware was deliberate exists...

Comments  (0)


Chinese Security Firm Discovers BIOS Based Virus

September 19, 2011 Added by:Dan Dieterle

When a system is infected, the trojan checks to see if the system has an Award Bios. If it does, it hooks itself to the BIOS. Once the system is restarted, it adds itself to the hard drive’s master boot record (MBR). Next it infects the winlogon.exe or winnt.exe system files...

Comments  (0)


The Life of a Zero Day Worm

August 18, 2011 Added by:Javvad Malik

Given the number of devices currently connected to the internet, factoring in new devices that are being added daily, subtracting devices being removed, factoring in energy reserves and the possibility of a giant tsunami wiping out humanity, I have approximately 134.2 years to go...

Comments  (0)


Myth: Apple Products Don’t Get Viruses

August 16, 2011 Added by:Robert Siciliano

The growing popularity of Apple products has inspired cybercriminals to create viruses that will harm Macs. Until now, Macs have been immune to these threats, but McAfee Labs is seeing the very first wave of fake programs targeted at Mac users...

Comments  (3)


PowerShell 2.0 Protects You From Viruses

July 26, 2011 Added by:Dawn Hopper

You can imagine that when building PowerShell, Microsoft surely wanted to avoid the disaster produced by the freely-executable nature of VBScript and JavaScript on Windows systems. PowerShell was launched with some significant protections against this kind of mischief...

Comments  (1)


Oslo Bombing Facebook Scam Infects One Per Second

July 25, 2011 Added by:Headlines

"Be cautious when clicking on breaking news trends and stories within search results related to the Oslo tragedy. Right now it seems to be infecting one user every second. The scam is a form of ‘clickjacking’ that replicates itself on users’ walls after they click on fake posts..."

Comments  (0)


Jay Leno: Most Dangerous Celebrity in Cyberspace

July 18, 2011 Added by:Emmett Jorgensen

“Cyber criminals follow the latest trends just as consumers do and they use these and the names of popular celebrities in their campaigns in order to lure people to websites that are full of malicious software (malware)..."

Comments  (0)


FBI: Malicious Software Features Usama bin Laden Links

May 04, 2011 Added by:Headlines

The FBI warns computer users to exercise caution when they receive e-mails that purport to show photos or videos of Usama bin Laden’s recent death. This content could be a virus that could damage your computer...

Comments  (0)


Did You Get the FakeRean Windows Virus?

May 01, 2011 Added by:Global Knowledge

The rogue security software will be accompanied by deceptive sales tactics and false positives to lure you into purchasing a software license or security subscription. This is known as scareware. Don’t take the bait unless you are in the mood for additional malware...

Comments  (0)


Experts: Is Iran Crying Wolf over Stars Malware Attack?

April 28, 2011 Added by:Headlines

"Given the lack of opaqueness on the part of Iran, it seems unlikely that there has been anything new discovered and it is questionable as to whether or not anything at all was found, and if something was, whether or not it was truly malicious..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »