- Welcome Guest
- Sign In
In order to turn bigger profits from their armies of compromised computers, hackers this year will use a new tactic in targeting master boot records with viruses that plant rootkits on computers' hard drives, security experts warn. These infections activate during the boot sequence before the operat...
2007 turned out to be "one of the most remarkable years in the history of malware," according to the recently released "ESET Global Threat Report 2007." The movement of new digital devices, social networking channels, operating systems and platforms into the mainstream is providing malware creators ...
Hackers are targeting users of some older versions of Microsoft Excel with a zero-day exploit that could compromise their data, according to a security advisory Microsoft issued Tuesday. The vulnerability is in Microsoft Office Excel 2003 Service Pack 2, along with Microsoft Office Excel Viewer 2003...
A little more than two weeks into 2008, cyber-criminals are up to their same old tricks -- stealing users' private data -- but they have concocted a far more advanced and sophisticated method. They are now embedding their malicious code into legitimate Web sites using Web-hosting servers, according ...
Malware is replacing Google text ads with ads from another source, according to BitDefender. The virus, Trojan.Qhost.WU, is using the host's file to redirect the initial query sent to the Google Adsense servers to a malicious host, according to an advisory issued by the firm. The host's file is the...
An investigation into the latest version of "gpicode.ai" -- a Trojan horse carrier of malware that encrypts recipients' data -- put security researchers on to a trail of clues that provides new insights into the ongoing evolution of spam-driven malware and its use by botnet operators based in Russia...
A New Zealand cybercrime police force nabbed an 18-year-old this week who goes by the cyber ID "AKILL," officials said. While the New Zealand officials haven't arrested the man, he is being interviewed in conjunction with a wider botnet crackdown involving the FBI and Dutch authorities. The FBI said...
Organized criminal activity will continue to be a big risk on the Internet next year, but the growing tumors of cyber espionage and cyber warfare could metastasize, suggests security firm McAfee. In fact, it predicts that the rise in international cyber spying will pose the single biggest security t...
Despite improvements in system and network security, wily cybercriminals remain a significant threat, adjusting their methods to take advantage of unwary Internet users, the SANS Institute says in its report on the top 20 Internet security risks of 2007, released Tuesday. Hackers and cyberspies have...
The video gaming industry has seen huge growth over the past few years with the emergence of the massive multiplayer online model. These video games, examples of which include "World of Warcraft" and "Everquest II," allow thousands of players to interact simultaneously over the Internet in a persist...
Spyware was originally designed to observe users' Internet patterns and deliver pop-up ads based on their individual browsing and shopping preferences. Now, although pop-up ads continue to be a nuisance, hackers are far more focused on spyware as crimeware: computer programs designed expressly to fa...
We are on final countdown to the launch of Mac OS X Leopard. You'll see lots of feature head-to-head pieces start to ramp up, but the real difference is that Vista is from an engineering-driven company while Leopard is from a marketing-driven company -- and that is worth exploring this week. Last we...
Given the penchant of online scammers to exploit high-visibility events for their own malignant purposes, security experts were unsurprised this week to learn that Myanmar has became a vehicle for planting malware on unsuspecting users of personal computers. The e-mail scam publicized by endpoint se...
While many sectors of the business community are accepting Web 2.0 usage with open arms, enterprise IT departments are not prepared to deal with the consequences posed by related threats, according to recent research. IT professionals also largely lack risk awareness, user training and consistent po...
In a high-profile reminder of the security pitfalls that still exist with PC-based communications, eBay's Skype is warning users of a fast-spreading worm affecting users of Skype for Windows. The worm spreads through the peer-to-peer phone service's instant chat application and is activated when a u...