SaferPC.info

Virus Information News

     
 Title   Date   Author   Host 

Malware in the Air?
Unstrung
by Richard Martin
March 15, 2006

For the first time, researchers have raised the possibility of RFID tags being infected by viruses and worms.

In a paper being presented today at the Pervasive Computing and Communications Conference in Pisa, Italy, sponsored by the Institute of Electrical and Electronics Engineers Inc. (IEEE), a group of computer scientists show just how susceptible radio-frequency tags may be to malware. "Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify backend software, and certainly not in a malicious way," the paper's authors write. "Unfortunately, they are wrong."

Malicious-software spreaders get sneakier, more prevalent
USA Today
by Byron Acohido and Jon Swartz
April 24, 2006

From his home in Downey, Calif., the then-19-year-old high school dropout controlled thousands of compromised PCs, or "bots," that helped him earn enough cash in 2004 and 2005 to drive a souped-up 1993 BMW and spend $600 a week on new clothes and car part

But Ancheta got caught. In the first case of its kind, he pleaded guilty in January to federal charges of hijacking hundreds of thousands of computers and selling access to others to spread spam and launch Web attacks. In separate cases, federal authorities last August also assisted in the arrest of Farid Essebar, 18, of Morocco, and last month indicted Christopher Maxwell, 19, of Vacaville, Calif., on suspicion of similar activities. The arrests underscore an ominous shift in the struggle to keep the Internet secure: Cybercrime undergirded by networks of bots " PCs infected with malicious software that allows them to be controlled by an attacker " is soaring.

NSA spied on porn habits, HuffPo reports
usatoday.com
November 27, 2013

NSA found vulnerabilities including "viewing sexually explicit material online" and "using sexually explicit persuasive language when communicating with inexperienced young girls," HuffPo reports

The National Security Agency collected evidence of online sexual activity and visits to pornographic websites as part of a proposed plan to harm the reputations of six people the agency considered "radicalizers," the Huffington Post reported, citing documents released by former NSA contractor Edward Snowden. The targets, all Muslims, are described in the document as examples of how "personal vulnerabilities" can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority, HuffPo said in its report. Among the vulnerabilities are "viewing sexually explicit material online" and "using sexually explicit persuasive language when communicating with inexperienced young girls," according to the NSA document, dated Oct. 3, 2012.

SEC, FBI probe fake tweet that rocked stocks
usatoday.com
April 23, 2013

Hoax and ensuing crash on Wall Street show the new dangers of our light-speed media world.

A hacked Twitter account of a major news organization Tuesday dispelled any lingering notion that tweets are mere 140-character missives that harmlessly fly off into the ether. The FBI and the Securities and Exchange Commission are investigating the security breach that momentarily sent stocks into free fall Tuesday, erasing some $200 billion from the market's value.

National Intelligence Director Apologizes for Lying to Congress
usnews.com
by Paul D. Shinkman
July 2, 2013

Dir. Clapper says a response to the Intelligence Committee in March was 'clearly erroneous.'

The director of National Intelligence apologized in June to the chairman of the Senate Intelligence Committee for lying during a hearing, according to a letter published on the DNI website on Tuesday. Director James Clapper appeared before the committee in March, where Sen. Ron Wyden, D-Ore., asked him specifically if NSA spies on millions of Americans. Clapper answered, "No." Since then, Edward Snowden reportedly leaked government documents that unveiled a secretive government program that did precisely what Wyden suggested in collecting meta data for cell phone and internet records of hundreds of millions of Americans.

Father Jailed For Life Without Parole After His 12 Week-Old Daughter Died After Receiving 8 Vaccinations!
vactruth.com
by Christina England
January 16, 2014

On January 15, 2014, Mr. John Sanders was sentenced to life in prison without parole for the murder of his 12 week-old baby daughter, Ja'Nayjah, who died just 24 days after receiving eight vaccinations in one day.

Ja'Nayjah Sanders was born a healthy, normal baby and received routine vaccinations, along with her mother, Marrie, before leaving the hospital. Two days later, at a routine checkup, the doctor told Marrie that her daughter had lost a couple of pounds since her birth and asked her to bring the baby back the next day for tests. However, the doctor appeared unconcerned and told Marrie that Ja'Nayjah was probably 'eating too much.' Instead of checking the baby over thoroughly, as one would expect, the doctor proceeded to ignore the warning signs that something could be very wrong regarding the health of this child and instead vaccinated the sick baby with the eight vaccinations listed on her vaccination card. These were the triple vaccine, the DTaP; polio; Rotavirus; hepatitis B, meningitis; and the Hib vaccination.

LinkedIn DNS hijacked, traffic rerouted for an hour, and users' cookies read in plain text
venturebeat.com
June 19, 2013

App.net cofounder Bryan Berg noticed that LinkedIn was DNS-hijacked tonight and that traffic was rerouted to a shady India-based site. That's bad for LinkedIn, but there's worse news for you.

According to Berg, that site does not require SSL (secure sockets layer), which means that anyone who visited in the last hour or so sent it their long-lived session cookies in plain text ... a potential security risk. DNS hijacking is the process of redirecting a domain name to a different IP address. IP addresses are strings of numbers that identify a server, but they're long and hard to remember. The DNS system allows us to use simple, easy-to-remember names like linkedin.com, and it then translates them to IP address like 216.52.242.86.

Adobe falls through XML flaw
vnunet
by Iain Thomson
June 23, 2005

Adobe has issued a security advisory warning users to patch a flaw in its popular Acrobat and Reader software.

The bug lies within the Adobe Reader control and potentially allows a hacker to find files held locally on a PC. An XML script would need to be designed and inserted into a Javascript file which could then be used to open access to local files.

WordPress Spring Cleaning - The Master List For Cleaning Up Your Blog
w-shadow.com
April 10, 2012

Now that spring has arrived (at least in the Northern Hemisphere), it is an excellent time to clean up and decruft your WordPress site. In this post I will show you a number of plugins and techniques that you can use to do just that.

Not only do inactive plugins and themes waste disk space, they also clutter your database with unused settings and other metadata. Remember: most plugins won’t delete their DB options and tables until you completely uninstall them. You will also continue to receive update notifications, which can be a distraction. Remove any plugins and themes you’re not using any more.

Hackers Break Into Computer-Security Firm's Customer Database
Washington Post
by Brian Krebs
December 19, 2005

Guidance Software -- the leading provider of software used to diagnose hacker break-ins -- has itself been hacked, resulting in the exposure of financial and personal data connected to thousands of law enforcement officials and network-security profession

Guidance alerted customers to the incident in a letter sent last week, saying it discovered on Dec. 7 that hackers had broken into a company database and made off with approximately 3,800 customer credit card numbers. The Pasadena, Calif.-based company said the incident occurred sometime in November and that it is working with the U.S. Secret Service on a more detailed investigation. Michael G. Kessler, president of New York City-based computer-forensics investigative firm Kessler International, received a letter notifying him that the company's American Express card was among those compromised by the attackers. Kessler received the notice from Guidance at the same time that a company credit-bill arrived with what he said were $20,000 in unauthorized charges for pay-per-click advertising at Google.com.

     

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Shawn K. Hall © 2003-2022 Powered by 12 Point Design
Professional Web Hosting and Design Services: 12 Point DesignAt Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling painReliable Answers - developer information, current news, human interest and legislative newsLocal Homeschool provides the most up-to-date support group listings in a geographical and searchable indexTwain Harte, CA - The closest you can get to Heaven on EarthSaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security
Google

AddThis Social Bookmark Button