Posts tagged Malware
The new malware variant, OSX/Imuler-B, uses images of supermodel Irina Shayk in an attempt to trick end users into execution the malicious application. The malware relies on the fact that by default, Mac OS X doesn’t display full file extensions, and therefore is attempting to trick users into thinking that they’re about the view a JPG image file.
Once the file is executed the malware will delete the original infection file and only leave an image file of Irina Shayk. It will also open a backdoor on the infected host, transferring private information from the infected host to a remote Web More >
As 9/11 approaches, we look back with a solemn demeanor and with pride in our hearts. America is resilient. For those that lost their lives on that dreadful day and those whose lives were forever changed, we offer our gratitude and our condolences. It is because of the people of America that we are strong.
As America reflects on the events of the past, do not be lured in by heartless hackers and thieves. These malicious individuals are preparing to release malware attacks by taking advantage of your curiosity and your giving heart.
They are targeting social networking sites as well as More >
The world was recently attacked by malware that installed itself through the AutoPlay feature, and it is happening again. The previous attack placed a second AutoPlay option in the window that pops up when you insert a flash drive. Clicking on the wrong one would infect the computer. This new threat attacks shortcut icons. It targets USB sticks and other removable drives.
A security advisory issued by Microsoft warns users of targeted attacks against Windows Shell (that is the main interface that Windows uses to organize the desktop and file system). The attacks work on virtually all versions of Windows and More >
We trust our security software to keep us safe, but without service and support backing it up, our trust may be misplaced. According to a new report from NSS Labs, an independent product analysis company, security software vendors often miss the latest malware threats from hacked websites. As many as 50,000 malicious programs are released everyday. This report suggests that infection is inevitable; whether your software tells you or not is another issue.
Most security software vendors charge heavy fees to remove infections that their software should have prevented to begin with. Doesn’t that seem a bit strange? That’s like More >
A new threat has been discovered that is spreading rapidly though email. The email includes a message that asks the user to test their computer to see if it will be able to run Windows 7.
The email contains a .zip file which has the “Windows Upgrade Advisor” inside. If you run the program what you will actually get is a Trojan that steals passwords from your computer as well as other important information.
The Trojan will also open a backdoor to allow the download of other malicious software.
What You Need to Do:
- Do not open emails from people or organizations you do More >
A malicious ad for greeting cards on Facebook redirects clickers to a page selling fake anti-virus software. The ad is intermittently displayed with a Farm Town ad which has over 9 million monthly users.
The website may tell you that you are infected and ask you to buy the removal software.
What You Need to Do:
- Don’t install anti-virus software without researching it first.
- If a site or program is saying that you are infected with something, call your technicians at INVISUS to have them investigate. They will remove any infections that may be on your computer. Remember, it is free to call if More >
Every week I get a message from Microsoft that pops up next to my clock . It says that updates are ready for my computer. Mostly this message is just annoying and I click the ‘X’ to get rid of it. I don’t have time to do whatever Microsoft wants, in fact I don’t want to have anything to do with Microsoft. Have you found yourself having the same thinking process?
Well, let me put this in perspective. Yes Microsoft can be overbearing sometimes and we don’t have to do half of the things they want us to do, but updates More >
The Mariposa botnet has 13 million computers under its control. These computers have been tasked to do the usual botnet thing. You know, steal information including banking information, credit cards, and usernames and passwords.
Having 13 million computers under your control is pretty amazing, but what astonishes me is the tool used to take over these computers. Mariposa is based on the Butterfly botnet kit which can be easily purchased online.
What makes this tool unique is that you can’t classify Mariposa as a virus or a Trojan. It is whatever the hackers command it to be.
3 people have been arrested in More >