virus

Savings: the cause of failure of computer systems could be a virus

The bank stressed that during the incidents, 4 and April 6 customer personal data have not been compromised. Last week, April 6 computer systems of Sberbank of Russia were out for 40 minutes. During the incident, the Moscow branch of the organization is not served by customer payments, transfer Gazette. The press center of the(…)

12 Christmas scams from McAfee

On the eve of Christmas and New Year more and more people spend on the Internet – buying gifts, planning a meeting with the family and, of course, use of Internet and mobile banking in order to see how the material terms of all our plans really. But before all the preparations, the users would(…)

Certificate stolen from the Government of Malaysia, was used to sign malware

Researchers found malicious software freely circulating that uses a digital signature that belongs to the Government of Malaysia, in order to bypass the security warning operating systems and security software. According to Mikko Hipponenu, chief scientific officer F-Secure, a stolen certificate belongs to the Malaysian Agricultural Research Institute. He found that the certificate used to sign malware(…)

FBI shuts down ‘Ghost Click’ botnet of 4m PCs as seven face charges

Federal authorities shut down an international organization, which has forced more than four million computers to visit fraudulent websites when users attempted to visit the page Netflix, the U.S. Internal Revenue Service, iTunes and other services. Prosecutors have named seven defendants from Eastern Europe, which is supposed to have earned more than $ 14 million,(…)

A virus created in India that uses Kinect to track user

Kinect for Xbox 360 or simply Kinect, a system of motion sensors and the data entry system to the OS. Used mainly for console games. There are currently sold over 10 million devices so Kinect hit the Guinness Book of Records as the most rapidly-selling computing device. Such was the prevalence and the idea to create a malicious(…)

Doctor Web: BackDoor.Butirat steal information from computers and intercepts traffic browsers

Analysts ‘Doctor Web’ reported an increase in the number of new modifications to the family of Trojans BackDoor.Butirat. These malicious programs are able to download from the Internet and run different files, and transfer information from hackers infected computer and listen to the traffic of installed browsers. BackDoor.Butirat malware families have been known since 2010. Today in(…)

A computer virus disguised as a post-mortem photo Gaddafi

Under the guise of an e-mail with photos of the murdered Libyan leader Muammar Gaddafi on the web spreads malware. This was warned by experts from antivirus company Sophos. According to the blog Naked Security, the Internet is circulating a letter with the heading «Fw: AFP Photo News: Bloody Photos: Libya dictator Moammar Gadhafi’s Death. In the body(…)

Control Center unmanned aircraft was attacked by a virus-infostilerom

Additional details were revealed about how were infected with malware ground systems that control the U.S. drones. In a statement released Wednesday, the U.S. Air Force says that “autonomous database systems Creech U.S. Air Force in Nevada” have been infected with malicious software. Software for “theft of user accounts” was found in September on portable hard drives, and(…)

Lack of updating third party products is the cause of 99.8% of hacks

Failure to update third party applications was the main reason that Windows machines are infected with viruses. Drive-by attacks from Web sites controlled by hackers, carried out with the help of exploits that have replaced the spam messages with virus attachments, which are three to five years ago was the main way of spreading malware. According(…)

Criminals pretend to be friendly office printers

New ways to deceive people to open malicious applications and e-mail and infect computers with malware have been seen by researchers Symantec Hackers have invented a new method of cheating the people to open malicious applications: they send emails that supposedly came from the office printers, many of whom are now able to send scanned(…)