malware

Wed
04
Aug
John Lister's picture

Fake Windows 11 Riddled With Malware

A security company has warned that scammers are using bogus copies of Windows 11 to distribute malware. Kaspersky reminds users that Microsoft's Windows Insider test program is the only place to get the real deal. While the average user can safely ... wait until the system's official release, tech enthusiasts may be eager to get their hands on Windows 11. That interest may well rise in the coming days with the first release of a beta edition that, in theory at least, is complete and much less likely to crash than the currently available "dev" edition. Kaspersky notes that several rogue sites are ... (view more)

Tue
02
Mar
John Lister's picture

Apple Suffers Malware Scare

Apple says it has dealt with the risk from a newly-discovered piece of malware affecting macOS. It's a reminder that macOS isn't completely immune from malware - which may have been the point of the attack. Security company Red Canary discovered the ... malware and dubbed it Silver Sparrow. It says data from Malwarebytes showed it was present on 29,139 computers. (Source: redcanary.com ) It appeared to target computers which have the M1 chip. That's an Apple produced processor designed specifically for Macs. It's combines multiple functions on a single chip, the idea being to increase efficiency ... (view more)

Thu
12
Nov
John Lister's picture

Beware of Bogus Microsoft Teams 'Update'

If you use Microsoft Teams, watch out for bogus advertisements offering an "update". It's a scam designed to install malware that tries to steal personal data. The group chat and video conferencing tool has understandably become more popular this ... year with the increase in remote desktop connections to workplaces. That's attracted the attention of scammers who have put together a creative strategy to steal data. It's important to note that the attack doesn't aim to exploit any vulnerability in Teams itself. Instead, it's simply aimed at people using it, particularly those who have only started ... (view more)

Wed
14
Oct
John Lister's picture

Microsoft, Military Tackle Bonet Preceding Elections

Microsoft says it has disrupted "one of the world's most persistent malware operations." The action against "Trickbot" reportedly involved working with the US military. Trickbot is a botnet , created by infecting computers with malware then ... hijacking and combining their resources for further malicious activity. The operators largely built it using bogus emails that tricked users into opening a file attachment or clicking a link that downloaded and installed malware. The uses of Trickbot have included stealing login details such as online banking credentials; accessing sensitive data; and ... (view more)

Tue
21
Jul
John Lister's picture

Android Hit By New Banking Malware

A new strain of Android malware targets both social media accounts and online banking. It's a reminder of the risks of installing software from outside of the official Google Play store. The malware is dubbed BlackRock and appears to ultimately ... derive from the code used in an attack called LokiBot. Now thought to be inactive, LokiBot attempted to gain access to financial accounts through banking and related apps. One technique involved using automated scripts to login to a PayPal account and transfer money to the scammers. (Source: threatfabric.com ) BlackRock looks to take the same tactics ... (view more)

Wed
15
Jul
John Lister's picture

Windows 10 May Get Key Security Boost

Microsoft is testing a new Windows 10 security measure that could neutralize a malware technique. It's called Kernel Data Protection and will protect part of a computer's memory from tampering. The idea is to protect two key software parts of a ... computer: the operating system kernel and drivers. The kernel is the most central part of a system and acts a little like a central command point, deciding what the computer does at any precise moment. Meanwhile, drivers control the way the operating system communicates and interacts with hardware devices. Within the computer's memory, the kernel is ... (view more)

Tue
14
Jul
John Lister's picture

'Winky Face' Email Takes Control of PCs

An email with a "winky face" for a subject line has helped a malware campaign become one of the most widespread in the world. It's a scam to expand the reach of the Phorpiex botnet which distributes spam and malware from infected machines to others ... online the Internet. According to researchers at security company Check Point, Phorpiex jumped from the 13th most detected malware campaign in May to the number two slot last month. It reports that one in 50 organizations suffered at least one attempted breach from Phorpiex last month. (Source: zdnet.com ) Ransomware, Botnets and Blackmail The ... (view more)

Wed
01
Jul
John Lister's picture

25 Android Apps Steal Facebook Passwords

Google has removed 25 malicious Android apps which tried to steal user Facebook logins. As always, it's worth checking devices to see if these apps are installed, because they won't automatically uninstall from phones even being ousted from the Play ... Store. This particular batch of apps didn't have a common subject, but each promised to carry out a basic function, including: a flashlight, file cleaner, or card game. Hidden deep inside each app was malicious software that ran behind the scenes. The malware came alive each time an app was opened on the phone, specifically checking to see if the ... (view more)

Tue
28
Apr
John Lister's picture

Major Antivirus Flaw Deletes Files, Corrupts Windows

A security company says it found a simple way to turn antivirus software into a weapon for attackers. Most major manufacturers have now fixed the problem, but it's a reminder to keep such software updated. The discovery by Rack911 Labs effectively ... meant that a hacker could force the antivirus software to delete files on a computer. That would mean the hacker would need to have gained access to a computer first - whether internally on a network, or remotely using malware. The exploit is based on one of the most fundamental actions of any antivirus software: they scan files, check if they are a ... (view more)

Mon
13
Apr
John Lister's picture

56 Android Apps Hijack Devices, Drain Battery

Security researchers have warned of 56 infected Android apps that could compromise performance. They've been deleted from the Google Play Store, but could still be on users' phones and tablets. According to Check Point, the apps contain malware ... designed to hijack phones and simulate user actions to click on ads. That could run down batteries and eat into mobile data allowances. (Source: checkpoint.com ) The 56 apps include 24 supposedly aimed at children, and 32 which offer simple utilities. They all work as designed: the problem is what's happening in the background. (Source: express.co.uk ... (view more)

Pages

Subscribe to RSS - malware