Tagged: Virus

Malware
Woke up this morning and had a discussion with a couple friends regarding PC performance and sluggishness.  So figured it was time to review technojunkyard’s  library list of tools we use to perform a clean up of a poorly performing system and do a write up on any new ones that may have come on the scene as well. (more…)

SuperFish Removal

superfish

Lenovo, the world’s largest PC manufacturer, has been installing a dangerous piece of adware on its consumer laptops. The software, called Superfish, leaves computers vulnerable to man-in-the-middle attacks in which hackers steal data as its sent from a user’s computer to a supposedly secure server. (more…)

Trend Micro predicts Targeted Attacks on the Rise worldwide

Hacking
Trend Micro Incorporated, has released its annual security predictions report, “Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible,” and the company’s threat defense experts are highlighting the report’s forecast that targeted attacks will become rampant from more countries as hackers from the usual suspects have found success targeting victims around the world. Additionally, the report breaks downs seven other cybersecurity threat predictions for 2015 including banks and payment systems.
(more…)

Akamai Warns of IptabLes and IptabLex Infection on Linux, DDoS attacks

AKAMAI TECHNOLOGIES LOGO
CAMBRIDGE, Mass.
, Sept. 3, 2014 — Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today released, through the company’s Prolexic Security Engineering & Research Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to launch distributed denial of service (DDoS) attacks against the entertainment industry and other verticals.  The advisory is available for download from Prolexic (now part of Akamai) at www.prolexic.com/iptablex.   (more…)

Researcher Details USB-Based Attack That Circumvents All Known Protective Security Measures

usb virus
Security research Karsten Nohl of Berlin’s SR Labs has revealed a flaw in USB devices that potentially allows hackers to evade all known security measures used by a computer. In a report by Wired, Nohl says his BadUSB exploit is “almost like a magic trick” because “you cannot tell where the virus came from.”
(more…)

WANTED: Russian Evgeniy Bogachev sought over cybercrime botnet

_75252296_75252295
The US has charged a Russian man with being behind a major cybercrime operation that affected individuals and businesses worldwide.

Evgeniy Bogachev, said to be known as “lucky12345″ and “slavik”, is accused of being involved in attacks on more than a million computers.  (more…)

Cryptolocker: what you need to know

decrypt-lock
What happens when a computer is infected with the malicious software, and what should you do to protect your files?

Cryptolocker is back in the headlines, thanks to a coordinated effort to take down the computers and criminals that run the notorious “ransomware”. But what is it? And how can you fight it?  (more…)