Search Results for: malware

Events like the recent spat of earthquakes and hurricanes in the United States inspire curiosity, especially when it’s so easy to find information these days. However, any time there’s a topic with a high volume of search traffic, cybercriminals swoop in … Continue reading

Posted in Malware Alerts | Tagged , , , | Leave a comment

From precious photos to important work documents, a computer’s hard drive typically contains heaps of priceless data.  That’s why losing everything in the hard drive is a great fear for many—especially those who haven’t taken precautions to back their files … Continue reading

Posted in Malware Alerts | Tagged , , , | Leave a comment

Image via Flickr user ♀Μøỳαл_Bгεлл♂ These days, mobile phones are capable of sending emails, checking Facebook, playing streaming music, and a whole bag of other tricks.  They’re essentially small computers that transport your digital persona wherever you go.  The emergence … Continue reading

Posted in Virus News | Tagged , , , , | Leave a comment

By Steve Espino – PC Tools Malware Research Team Stealthy malware can redirect web search results to websites other than what was initially being searched for. The user may be redirected to advertising websites, fake antivirus sites, and some completely … Continue reading

Posted in Malware Alerts | Tagged , , , , , , | Leave a comment

Image courtesy of Flickr user Rev Dan Catt Businesses be warned: according to the FBI, hackers have stolen millions of dollars from small to medium-sized American companies by making unauthorized bank transfers to Chinese companies.  While it’s not a new … Continue reading

Posted in Virus News | Tagged , , | Leave a comment

Image courtesy of Flickr user indi.ca Fake AVs have been tormenting PC owners for years.  And they have now finally made their way to the Mac. A fake antivirus designed to look like a real Mac OS X application emerged … Continue reading

Posted in Malware Alerts | Tagged , , , | Leave a comment

Image courtesy of Flickr user swanksalot While the news that U.S. forces killed Osama bin Laden probably came as a big surprise to all of us, the use of the topic to spread malware should be a surprise to no … Continue reading

Posted in Malware Alerts | Tagged , , , , | 1 Comment

Image courtesy of Flickr user debaird The plot in the ongoing Stuxnet story thickens…  Iranian officials have not only recently accused the U.S. and Israel of creating the Stuxnet worm as a direct attack on Iranian industry, but a high-ranking … Continue reading

Posted in Virus News | Tagged , , , | Leave a comment
Comments Off

Drive-by downloads are downloads of software, adware, or malware that is either authorized by the user without understanding the consequences or downloaded without the knowledge of the user. This can occur by visiting nefarious websites, clicking on links in email, … Continue reading

Comments Off

A computer virus is a program that spreads malicious code by copying itself and infecting host computers. Although some viruses are latent, others can corrupt data or impede system performance. The term is specific, distinguished by how viruses are distributed … Continue reading

Comments Off

A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day … Continue reading

Comments Off
Comments Off

A backdoor is an undocumented method of gaining access to program or a computer by using another  installed program or rootkit that bypasses normal authentication. The backdoor is generally written by the programmer who created the original program and is … Continue reading

Comments Off
Comments Off

Through arbitrary code execution, a cybercriminal may acquire control of a target computer through some sort of vulnerability, thereby gaining the power to execute commands on that user’s computer at will. Programs that are designed to exploit software bugs or … Continue reading

Comments Off

Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer worms, and Trojan horses. Antivirus software may also remove or prevent spyware and adware, along with other forms of malicious programs. Free antivirus software generally … Continue reading

Comments Off

Ad supported software, often called Adware or Advertising Supported Software, is used when referencing any type of program that downloads or displays unwanted banner advertisements in the software being used. Adware is often bundled within software a computer owner purchases. … Continue reading

Comments Off
Comments Off

A Trojan horse, often shortened to Trojan, is a type of malware designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses … Continue reading

Comments Off

Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information. Spyware is often hidden from the user in order to gather information about internet … Continue reading

Comments Off

Spear-phishing defines a more specialized phishing scheme (an attempt by a hacker to obtain confidential information about a user through fraudulent means) targeting a specific employee in order to gain access to a company’s information. In order to do this, … Continue reading

Comments Off

Search engine poisoning exploits the use of search engines to spread malware and viruses. This practice is becoming more prominent as a means of stealing credit card information. Generally, hackers will employ black hat SEO methods to gain higher search … Continue reading

Comments Off
Comments Off

A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executables. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that … Continue reading

Comments Off

Rogue security software, or “scareware,” masquerades as genuine security software, while actually reporting incorrect results of fake malware scans. Most people are tricked into installing rogue security software when a pop-up window appears on their screen informing them that their … Continue reading

Comments Off
Comments Off

Ransomware is a category of malware that demands some form of compensation, a ransom, in return for data or functionality held hostage. For instance, ransomware might change Proxy settings in a browser to limit web use, making it difficult to … Continue reading

Comments Off
Comments Off

Pharming refers to an attempt by a hacker to redirect a website’s traffic to another site, developed for the purpose of stealing information from users. Hackers can exploit vulnerabilities in either the host files on a personal computer or on … Continue reading

Comments Off

Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. There are various types of malware including spyware, keyloggers, true viruses, worms, … Continue reading

Comments Off
Comments Off

A keylogger, also known as keystroke logging or keylogging, is a method of tracking the strokes on a keyboard without the knowledge of the user. This information is then collected and used to access private accounts or collect personal information. … Continue reading

Comments Off

Antivirus programs employ heuristic analysis in order to find previously unknown computer viruses or to detect new variants of known viruses. Heuristic analysis is often performed by antivirus software by running the suspect program in a virtual machine (a separate … Continue reading

Leave a comment
Comments Off

Heap spraying refers to the attempt to insert code into a predetermined location using the exploits of vulnerable browsers. “Heap” comes from the term heap-based memory allocation (also known as dynamic memory allocation), which is the allowance of memory storage … Continue reading

Comments Off
Comments Off

Botnets employ fast flux techniques to obfuscate the specific host involved in their phishing schemes, malware delivery or other criminal enterprises. A fast-flux domain name service (DNS) enables bots to utilize a shifting number of compromised hosts. Fast flux uses … Continue reading

Comments Off

Image via. Any time there’s an upcoming movie with an extremely dedicated fan base, you can expect to find cyber-crooks trying to take advantage of the fanaticism to make money.

Posted in Malware Alerts | Tagged , , , , | Leave a comment

Image via Flickr user alancleaver_2000 According to some security experts, Lizamoon is the most successful SQL injection attack ever witnessed.  During its short lifespan it has already compromised hundreds of thousands of websites.  While reports vary on the number of … Continue reading

Posted in Malware Alerts | Tagged , , | Leave a comment