A hoax circulating since February 2008 warns users to beware of "the worst virus ever" in the form of an email attachment titled "POSTCARD" or "POSTCARD FROM HALLMARK." Though real e-card viruses certainly do exist, this one is a hoax.
A Los Angeles hospital paid a ransom of nearly $17,000 in bitcoins to hackers who infiltrated and disabled its computer network because paying was in the best interest of the hospital and most efficient way to solve the problem, the medical center’s chief executive said Wednesday.
Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal computers in over 190 countries over the course of the past year.” The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and Microsoft, is releasing this Technical Alert to provide further information about Dorkbot.
People using Internet Explorer and possibly other Windows applications could be at risk of attacks that abuse counterfeit encryption certificates recently discovered masquerading as legitimate credentials for Google, Yahoo, and possibly an unlimited number of other Internet properties.
A new malware threat scans the Internet for POS systems and tries to access them using common usernames and passwords.
Thousands of compromised computers are actively trying to break into point-of-sale (POS) systems using brute-force techniques to guess remote administration credentials.
The United States Postal Service is warning residents about fake emails using their name. The messages claim to be alerts about an undelivered package, but they really carry a virus.
When the visitor clicks “Install,” they will be given several files, including the Install_Adobe_Flash_Player.exe, two DLL files and a ReadMe.htm. It turned out that the files were actually not for a Flash Player but instead a Trojan and the files place themselves into the Temp folder and become hidden. Once this process is completed, the computer becomes infected with the malware.
If I offered you a way to protect your car from ever getting stolen, or your house from ever getting broken into, would you pay me for it? Lots of people would — for many people, their brand is just as important as anything else. This is why Chinese domain name scams have become so popular, and so successful.
Chinese domain name scams are rampant. In a little bit, I’ll explain exactly what these scams are, but first it’s more important to understand what started them. The effort to get businesses to register for Asian domains to “protect the brand” has been ongoing for many years. It appears this became a phenomenon as early as 2006. But it has accelerated within the past year, after the CNNIC registry announced that the Chinese .CN domains were public.
A Distributed Reflective Denial of Service (DRDoS) attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible UDP servers, as well as bandwidth amplification factors, to overwhelm a victim system with UDP traffic.
A newly discovered cross-site scripting attack uses a sly variant on an existing hack to deliver malware in a way that’s so heavily obfuscated, even experts didn’t notice it at first.