How ironic! The website of the popular anti-virus service provider Kaspersky has been compromised by hackers who reportedly pushed malware to Kaspersky users for more than three and a half hours before it was brought under control. This is not the first time Kaspersky has fallen prey to malicious hackers. The website has fallen prey close to 36 times since 2000 and the most recent hack before this one was in early 2009 when a security lapse resulted in hackers getting access to the back-end database of the website.
In a statement released now, Kaspersky has admitted to the hack but has noted that no secure information was compromised.
“The website was simulating a Windows XP Explorer window and a popup window showing scanning process on the local computer and offering the user a fake antivirus program to install. The domain was making these redirections for 3.5 hours in total.”
Symantec has released the latest version of its antivirus software along with the new Internet Security product that is aimed at minimizing cybercrime. The popular security software provider has supplemented the launch with the release of its latest Cybercrime report where it claims that close to 65% of the global internet users have fallen prey to cybercrime – including online credit card theft, identity theft and computer viruses.
Speaking about the products itself, the new Norton Antivirus comes with features such as the Reputation service that instantly checks for the source of files, Pulse updates that dynamically updates the local virus database as well as a SONAR Behavioral protection system. The Internet Security 2011 software too comes with similar features in addition to the Download Insight that warns users of dangerous files before they are installed.
The two softwares are available on the Symantec website at an annual cost of $39.99 and $69.99 respectively.
Earlier this week, an Android Trojan was discovered by Kaspersky labs and was traced to Russia. Just a day earlier, BBC had published a report on how easy it was to create spyware applications for smartphones. Now, if you are scared of having contracted a virus on a mobile phone and wondering how to remove it, the PC2Mobile scan should come of help.
Developed by India-based Quick Heal technologies, this is the first of its kind virus scanner that will let users scan their mobile phone for virus by connecting it to a computer via cable or Bluetooth. The application was launched in May this year and now supports close to 550 different mobile handsets made by Asus, Apple, Fujitsu, Nokia, Motorola, Sony Ericsson, Samsung, HTC, BlackBerry, etc.
The PC2Mobile scan software is available as part of Quick Heal’s Total Security 2010 suite that is priced at Rs. 2,000 ($43 apprx.)
Kaspersky Labs have dug out an Android app that disguises itself as an innocuous media player app but is in fact a malicious virus application that hacks the owners’ mobile phone to subscribe their number to premium rate numbers that end up transferring money from the user’s account to the criminals’.
Kaspersky has identified the trojan as Trojan-SMS.AndroidOS.FakePlayer.a and has noted that the app is available in the conventional .APK format of Android apps and weighs only 13kb in size. A number of Android devices are reported to have been affected though all the victims are at present identified inside Russia.
Kaspersky has noted that such malicious programs in fact ask for the user’s permission to offer access to premium rate services which are often blindly agreed to by users. You may remember a recent study conducted by BBC that showed how creating spyware applications for mobile phones was pretty easy.
Zombie computers are those machines that are hacked by spammers with the help of computer virus so that they may be used as a host to send out thousands of spam messages. A study conducted by McAfee earlier this year showed that USA, Brazil and India are among the leading nations when it comes to […]
Zombie computers are those machines that are hacked by spammers with the help of computer virus so that they may be used as a host to send out thousands of spam messages. A study conducted by McAfee earlier this year showed that USA, Brazil and India are among the leading nations when it comes to producing spam. However, the report noted that China, USA and Brazil are countries that host the maximum number of zombie computers. India is nowhere in the top 10.
In a somewhat contrary note, CommTouch has come up with its latest quarterly security report where the researchers have noted that India has just overtaken Brazil as the country with the largest number of zombie computers. According to the report, here are the top ten countries and the percentage of zombie computer that they host.
1. India : 13%
2. Brazil : 11%
3. Vietnam : 6%
4. Germany : 5%
5. Russia : 5%
6. USA : 4%
7. Argentina : 3%
8. China : 3%
9. Saudi Arabia : 3%
10. Italy : 3%
11. Columbia : 2%
12. UK : 2%
13. Argentina : 2%
14. Romania : 2%
15. Poland : 2%
Nigerian scammers are no longer exclusively from Nigeria. Though email phishing attempts are now common-place, the stereotype that such emails originate only from Nigeria has struck. Nevertheless, with people getting aware about the regular phishing emails, these scammers have now been taking the extra mile to fool you.
Check out this extremely hilarious conversation between Brad Carter and “Rebecca Nemanova“. Rebecca apparently lives in Nigeria and wants Brad to courier his laptop to her boss. Over to Brad Carter
A new security flaw has been detected on the older versions of Microsoft Windows Operating system – namely Windows XP and Windows 2000. The vulnerability will allow hackers to exploit the system and subsequently run malicious code.
In a statement released to the media, Microsoft Group Manager Jerry Bryant said that his team was presently investigating the issue. The company has also confirmed that they are unaware of any attempts by hackers to make use of the vulnerability so far.
According to Secunia, the flaw could arise due to a boundary error in a function that was employed on these versions of the Windows operating system. Microsoft has termed the vulnerability “moderately critical“.
AVG Technologies, the popular antivirus solutions company has announced its plans to unveil a new LinkScanner malware detector application for Mac. The application will allow users to check web pages in real-time for malware in the outbound links from any website.
The application is already available on the Windows platform and AVG has revealed that the Mac version of LinkScanner will also be free to download. Explaining the software’s algorithm, the company notes that rather than relying on a database of blacklisted sites to offer an advice to users, LinkScanner will resort to real-time scanning of destination websites to issue an alert to users.
The date of release of the application has not been announced as yet.
[via PC World]
Symantec has released an anti-virus application that will offer Android users protection against virus, malware and even unwanted callers. The application is expected to be incorporated natively in Froyo though users may download it earlier that that.
The app shall be free to download and the users are offered 30 days of free service with respect to automatic updates. The service will need subscribers to upgrade to a paid plan after that. The subscription cost is unknown at the moment, though.
Here are some things we’ve learned the new Anti-Virus for Android OS can do
- Scan malware/virus
- Call screener to block unwanted callers
- Remotely lock/wipe in case of theft
That goes much beyond conventional anti-virus softwares, doesn’t it?
A cyberattack at the Penn State University – the third time in six months – has resulted in close to 15,000 social security numbers getting exposed. This comes just two weeks after a similar attack at PSU left close to 9,766 SSNs exposed. According to Geoff Rushton, a spokesperson of PSU, the institution is working with national and regional agencies to investigate the case. The names of these agencies have not been released due to confidentiality agreements.
The exposed individuals are noted to be students at the university prior to 2005. Since 2005, the institution has stopped using SSNs as a personal identifier. While the database of numbers have since then been removed, an archived copy of the same is reported to have remained undetected in the computer cache from where these numbers were exposed.
A similar attack in December last year is reported to have exposed close to 30,000 SSN numbers.
[via Pittsburg Live]