Lenovo, the world’s largest PC manufacturer, has been installing a dangerous piece of adware on its consumer laptops. The software, called Superfish, leaves computers vulnerable to man-in-the-middle attacks in which hackers steal data as its sent from a user’s computer to a supposedly secure server. (more…)
Scientists at the Johns Hopkins Medical School and the University of Nebraska have discovered an algae virus that makes us more stupid by infecting our brains. (more…)
Trend Micro Incorporated, has released its annual security predictions report, “Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible,” and the company’s threat defense experts are highlighting the report’s forecast that targeted attacks will become rampant from more countries as hackers from the usual suspects have found success targeting victims around the world. Additionally, the report breaks downs seven other cybersecurity threat predictions for 2015 including banks and payment systems.
CAMBRIDGE, Mass., Sept. 3, 2014 — Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today released, through the company’s Prolexic Security Engineering & Research Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to launch distributed denial of service (DDoS) attacks against the entertainment industry and other verticals. The advisory is available for download from Prolexic (now part of Akamai) at www.prolexic.com/iptablex. (more…)
Security research Karsten Nohl of Berlin’s SR Labs has revealed a flaw in USB devices that potentially allows hackers to evade all known security measures used by a computer. In a report by Wired, Nohl says his BadUSB exploit is “almost like a magic trick” because “you cannot tell where the virus came from.”
The US has charged a Russian man with being behind a major cybercrime operation that affected individuals and businesses worldwide.
Evgeniy Bogachev, said to be known as “lucky12345″ and “slavik”, is accused of being involved in attacks on more than a million computers. (more…)
What happens when a computer is infected with the malicious software, and what should you do to protect your files?
Cryptolocker is back in the headlines, thanks to a coordinated effort to take down the computers and criminals that run the notorious “ransomware”. But what is it? And how can you fight it? (more…)
WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.
Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection.
Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts your files until you pay a ransom. Unfortunately, the answer for these folks is usually either to pay up or suck it up. This post offers a few pointers to help readers avoid becoming the next victim. (more…)