Thursday, March 27th, 2014
Malware targeting Word and Excel files has been around for some time, but we recently encountered a new malware family, CRIGENT (also known as “Power Worm”) which brings several new techniques to the table. (We detect these files as W97M_CRIGENT.JER and X97M_CRIGENT.A.)
Most significantly, instead of creating or including executable code, CRIGENT uses the ...
Posted in Internet, Security, Windows | No Comments
Tuesday, March 25th, 2014
There is a growing chorus of voices calling for businesses and home users to upgrade existing Windows XP installations to newer versions of Windows, if not for the features, then at least for the improved security and support. ATMs are basically computers that control access to cash, and as it ...
Posted in Internet, Security, Software, Windows | No Comments
Friday, March 21st, 2014
There are various ways to protect a wireless network. Some are generally considered to be more secure than others. Some, such as WEP (Wired Equivalent Privacy), were broken several years ago and are not recommended as a way to keep intruders away from private networks. Now, a new study published ...
Posted in Internet, Networking, Privacy, Security | No Comments
Wednesday, March 19th, 2014
Dubbed Operation Windigo, the attack has been ongoing for more than two and a half years and has compromised as many as 25,000 servers at one time, anti-virus vendor ESET said Tuesday. Systems infected with the backdoor Trojan are used in stealing credentials, redirecting Web traffic to malicious content and ...
Posted in Internet, Linux, Privacy, Security | No Comments
Wednesday, March 19th, 2014
According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day.
Despite Trojans have continued to ...
Posted in Internet, Privacy, Security | No Comments