Monday, January 12th, 2009
Here's a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote.
That's what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.
The message ...
Posted in Coding, Internet, Security, Windows | No Comments
Wednesday, January 7th, 2009
VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
Specs:
Free, independent service
Use of multiple antivirus engines
Real-time automatic updates of virus signatures
Detailed results from each antivirus engine
Real time global statistics
You can also email your file ...
Posted in Internet, Security, Software | No Comments
Tuesday, January 6th, 2009
The economic lifecycle of the underground fraud community functions very similarly to the world of legitimate business. Online fraudsters have supply chains, third-party outsourcers, vendors, and online forums where people with skills and people with opportunities to commit fraud can find each other. The underground fraud supply chain is becoming ...
Posted in Internet, Privacy, Security | No Comments
Monday, January 5th, 2009
A new trojan once again underscores the importance of exercising caution when downloading. Disguised as a keygen, Troj/Qhost-AC is one of the strangest pieces of malware I've seen.
The trojan doesn't appear to be particularly malicious. Its mission: to prevent you from downloading torrents from PirateBay and Mininova, keep you from ...
Posted in Internet, Privacy, Security, Software | No Comments
Saturday, December 6th, 2008
Researchers have identified a new trojan that can tamper with a wide array of devices on a local network, an exploit that sends them to impostor websites even if they are hardened machines that are fully patched or run non-Windows operating systems.
The malware is a new variant of the DNSChanger, ...
Posted in Internet, Networking, Privacy, Security | No Comments