Skip to main content

Home/ Digit_al Society/ Group items tagged virus

Rss Feed Group items tagged

dr tech

Ransomware hackers steal a hospital. Again. / Boing Boing - 0 views

  •  
    "A month after a hospital in Hollywood was shut down by a ransomware infection that encrypted all the files on its computers and computer-controlled instruments and systems, another hospital, this one in Kentucky, has suffered a similar fate. "
dr tech

Ransomware gets a lot faster by encrypting the master file table instead of the filesys... - 0 views

  •  
    "In just a few short years, ransomware -- malware that encrypts all the files on the computer and then charges you for a key to restore them -- has gone from a clever literary device for technothrillers to a cottage industry to an epidemic to a public menace. "
dr tech

5 Security Software Myths That Can Prove Dangerous - 0 views

  •  
    "Excluding mobile operating systems for tablets and smartphones, Windows still owns about 90% of the global computing market, so it's no surprise it remains a prime target for malware. That doesn't mean other operating systems are perfectly safe, however, as they too can prove easy pickings."
dr tech

'Ransomware-as-a-service' discovered on the darknet | Technology | The Guardian - 0 views

  •  
    "Branded as "Tox", the tool lets anyone, regardless of technical ability, automatically create ransomware: software which encrypts a victim's hard drive and demands payment before decrypting it."
dr tech

OK, panic-newly evolved ransomware is bad news for everyone | Ars Technica - 0 views

  •  
    "And that means that there's now a financial incentive for going after just about anything. While the payoff of going after businesses' networks used to depend on the long play-working deep into the network, finding and packaging data, smuggling it back out-ransomware attacks don't require that level of sophistication today. It's now much easier to convert hacks into cash."
dr tech

Petya ransomware encryption system cracked - BBC News - 0 views

  •  
    "Petya ransomware victims can now unlock infected computers without paying. An unidentified programmer has produced a tool that exploits shortfalls in the way the malware encrypts a file that allows Windows to start up. In notes put on code-sharing site Github, he said he had produced the key generator to help his father-in-law unlock his Petya-encrypted computer."
dr tech

The Morris Worm Was the World's First Cyberattack - 0 views

  •  
    "His program became the first of a particular type of cyber attack called "distributed denial of service," in which large numbers of internet-connected devices, including computers, webcams and other smart gadgets, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked."
dr tech

Briton who stopped WannaCry attack arrested over separate malware claims | Technology |... - 0 views

  •  
    "Marcus Hutchins, the 23-year-old British security researcher who was credited with stopping the WannaCry outbreak in its tracks by discovering a hidden "kill switch" for the malware, has been arrested by the FBI over his alleged involvement in another malicious software targeting bank accounts."
dr tech

Opinion | The Worm That Nearly Ate the Internet - The New York Times - 0 views

  •  
    "While some experts still disagree, most now believe that Conficker was the work of Ukrainian cybercriminals building a platform for global theft who succeeded beyond all expectation, or desire. The last thing a thief wants is to draw attention to himself. Conficker's unprecedented growth drew the alarmed attention of cybersecurity experts worldwide. It became, simply, too hot to use."
dr tech

Hackers are using coronavirus maps to infect your computer - 0 views

  •  
    "As coronavirus threatens to become a global pandemic, everyone's keeping a close eye on how it's spreading across the world. Several organizations have made dashboards to keep track of COVID-19. But now, hackers have found a way to use these dashboards to inject malware into computers."
dr tech

NHS services in England and Scotland hit by global cyber-attack | Society | The Guardian - 0 views

  •  
    "Computer security experts suggested that the crisis could reflect weaknesses in the NHS's cybersecurity. Ross Anderson, of Cambridge University, said the attack appeared to exploit a weakness in Microsoft's software that was fixed by a "critical" software patch earlier this year but which may not have been installed across NHS computers."
dr tech

Google Chrome: Phishing Scam 'Practically Impossible to Spot' | Fortune.com - 0 views

  •  
    "Indeed, this scam is far subtler. It works like this: fraudsters are able to register domains with characters plucked from various alphabets other than the default Latin script. When displayed, it's all but impossible to tell apart a Greek "O" from a Cyrillic "O" from a Latin "O," for instance."
dr tech

Meltdown and Spectre: 'worst ever' CPU bugs affect virtually all computers | Technology... - 0 views

  •  
    "Serious security flaws that could let attackers steal sensitive data, including passwords and banking information, have been found in processors designed by Intel, AMD and ARM. The flaws, named Meltdown and Spectre, were discovered by security researchers at Google's Project Zero in conjunction with academic and industry researchers from several countries. Combined they affect virtually every modern computer, including smartphones, tablets and PCs from all vendors and running almost any operating system."
dr tech

A Supercomputer's Covid-19 Analysis Yields a New Way to Understand the Virus | Elemental - 0 views

  •  
    "The computer had revealed a new theory about how Covid-19 impacts the body: the bradykinin hypothesis. "
dr tech

Russia unleashed data-wiper malware on Ukraine, say cyber experts | Ukraine | The Guardian - 0 views

  •  
    ""It's not so much the technical disruption, it's what it does to undermine confidence, like in the financial sector. It gets people quite nervous. It's more that kind of secondary impact," said Jamie Collier, a Mandiant consultant, who described a DDoS as akin to stuffing a thousand envelopes through a letterbox every second."
dr tech

Google Play app downloaded more than 10,000 times contained data-stealing RAT | Ars Tec... - 0 views

  •  
    "On Tuesday, security firm Cleafy reported that TeaBot was back. This time, the trojan spread through a malicious app called QR Code & Barcode Scanner, which as the name suggests, allowed users to interact with QR codes and barcodes. The app had more than 10,000 installations before Cleafy researchers notified Google of the fraudulent activity and Google removed it."
‹ Previous 21 - 40 of 40
Showing 20 items per page