Virus Information News

 Title   Date   Author   Host 

Glenn Greenwald: Low-Level NSA Analysts Have 'Powerful and Invasive' Search Tool
July 28, 2013

Glenn Greenwald: Low-Level NSA Analysts Have 'Powerful and Invasive' Search Tool

Anonymous Operation NSA's first target: Californian Senator Dianne Feinstein. She has taken over $698,000 in bribes from security and defense contractors to vote in favor of them and against you.
July 18, 2013

Greetings Californian State Senator Dianne Feinstein. We are Anonymous. Did you think that your actions against the citizens of this country would go unnoticed?

Did you think that we the people, would not respond to your gruesome dishonesty? We have been watching. In accordance with phase II of #Op NSA we have found you, Senator Feinstein, GUILTY Of supporting unconstitutional acts carried out by the Government and its agencies. Although the opinion of the FISA court that oversees the National Security Agency's operations is often not released to the public, we are now making it known to the public. While the public may have been kept in the dark; you, Senator Feinstein were fully aware of the FISA court's two thousand and eleven opinion. Eighty pages detailing how the National Security Agency's surveillance conduct is in direct violation of the fourth amendment of the United States Constitution as well as in excess of the limitations imposed by the statute: The FISA amendments act of two thousand and eight. When you told the American people that you have no knowledge of the National Security Agency's surveillance program, PRISM, of violating anyone's civil liberties or freedoms: You were lying.

"LAPD visited Michael Hastings' house prior to his death, were seen looking under his car" - Starting to make sense now people?
July 14, 2013

Abby Martin takes a closer look at the death of award winning journalist Michael Hastings, featuring interviews with Michael's close friend, Joe Biggs, who suspects his death was not an accident, and Kimberly Dvorak, an investigative journalist who has been conducting an investigation into the anomalies despite stonewalling from the LAPD.

Tea Party Members Fit Profile of Domestic Terrorists, Obama Claims (which subjects them to "kill lists" and the NDAA)
July 4, 2013

A short time ago while addressing a CEO roundtable and Business Forum in Tanzania, President Barack H. Obama, told reporters and attendees that today's Tea Party members in the United States very closely fit the U.S. government's profile for domestic terrorists. The President's response came after a Tanzania businessman asked if civil unrest in the U.S. is likely to affect doing business with American companies. The President and First Lady are in Tanzania as part of their tour of South Africa. The President and First Lady attended a tree planting ceremony with President Kikwete earlier and are scheduled to have dinner with the South African President of the United Republic of Tanzania later at the State House, Dar Es Salaam, Tanzania.

xkcd: Wikileaks
December 15, 2010

We are Anonymous. We are Legion. We are no one and everyone. And we are here to fight for WikiLeaks.

WikiLeaks: New Leak - Names, addresses, IPs, and phone numbers of everyone in Anonymous. Download now!

Arrest made in Miss Teen USA 'Sextortion photos' case
September 27, 2013

A college student was arrested Thursday for allegedly hijacking the webcams of young women - among them reigning Miss Teen USA Cassidy Wolf - taking nude images, then blackmailing his victims to send him more explicit material or else be exposed.

Jared James Abrahams, a 19-year-old computer science student from Temecula, California, surrendered on Thursday to the FBI on federal extortion charges, the agency announced. Authorities say he victimized young women surreptitiously, by taking control of their computers then photographing them as they changed out of their clothes. When he admitted what he'd done in June, Abrahams said he had 30 to 40 "slave computers" - or other people's electronic devices he controlled - and has had as many as 150 total, according to a criminal complaint.

Malware Attack: acrossuniverseitbenet Hacks WordPress Sites
December 23, 2010

On December 22, 2010, we received several reports that a new malware attack has infected WordPress sites hosted at GoDaddy and possibly other hosting providers.

The worst part about this virus is it's much harder to clean. The malicious hackers have stepped it up a notch and decided to infect the WordPress database and not just server files. The above script is injected inside every single page and posts inside the database (wp_posts table). This malicious script redirects website visitors to various sites hosting "Fake AV" websites and some are zero-day attacks. A zero-day attack means that anti-virus programs may not yet have their definitions updated and your computer can become infected even with up-to-date software.

WordPress Hacked with holasionweb on Go Daddy!
by Regina Smola
May 12, 2010

WordPress sites self-hosted on are reporting being maliciously hacked today with script tag inserts.

Warning: This is dangerous malware! Anyone visiting an infected website can get their computers infected, if they do not have a up-to-date anti-virus program using the latest threat definitions. If you receive a message to download anything when visiting an infected site, do NOT click "yes" or "okay" to download. If your website is infected, put it down for maintenance immediately.

Why you should stop your plugin from updating
January 17, 2013

Per Soderlind recently alerted me to a rather important security issue regarding plugins hosted outside of

All hosted plugins receive plugin updates from Commercial plugins often add scripts to provide plugin updates from other sources*, but the vast majority of plugins simply go without automatic updates at all. Now, imagine a scenario in which you create a custom plugin, but someone with malicious intent registers a plugin with the exact same name and slug as yours with the repository. It is conceivable that you or someone else working on the site could accidentally hit the "update" button and be immediately infected by a malicious plugin launched to attack your site from itself.

Is Your WordPress Website Distributing Malware in Google Image Search?
by Siobhan Ambrose
May 10, 2011

Well, is it? Is your answer - "what the hell are you talking about?"

It turns out that thousands of hacked sites are infecting Google image search results with images redirecting to Fake AV sites. And, unfortunately for you and for me, WordPress sites are a prime target for this kind of attack. A PHP injection into a WordPress site can generate spammy websites, hijack Google Image SERPs and result in your WordPress website tossing unsuspecting Google Image searchers to a FakeAV site.


Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Shawn K. Hall © 2003-2023 Powered by 12 Point Design
Professional Web Hosting and Design Services: 12 Point DesignAt Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling painReliable Answers - developer information, current news, human interest and legislative newsLocal Homeschool provides the most up-to-date support group listings in a geographical and searchable indexTwain Harte, CA - The closest you can get to Heaven on EarthSaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security

AddThis Social Bookmark Button