Red October Virus Explained

Rocra, which is short for Red October, was detected by Kaspersky. Kaspersky started to look into the malware last year in October. They found that a group of hackers were using exploits in order to steal information worldwide from high level departments. They also believe that the attacks have been occurring for over five years. How does it work? The malware operates by using exploits in Microsoft Word and Excel. The primary technique they hackers used is a form of phishing called Continue Reading

Gozi Virus Creators Found and Arrested

Recent news of about the three Europeans namely Nikita Kuzmin of Russia, Mihai Ionut Paunescu of Romania and Deniss Calovskis of Latvia charged with using Gozi virus used to steal millions of dollars from banks around the world has caught our attention. But we would ask ourselves, how did the Gozi virus cause this much theft? The Gozi virus is also considered a Trojan. Just like any other Trojan virus, users would receive this virus through emails containing fraudulent links, PDF attachment Continue Reading

How Secure Is Skype?

Not long ago, the thought of using a voice over Internet protocol program to effectively communicate would have been surprising. Since the Internet has become more commonplace though, many people use Skype daily to stay in contact with people over a distance. Skype is also used by many businesses as well. With all that in mind though, how secure is Skype? Skype as a Target Malware authors are always trying to find more new ways to get infiltrate people's computers. Skype has become a Continue Reading

Google Android Malware Threat

Android is an ideal target for malware creators and spammers for a couple of reasons. First of all, Android has the largest market share among mobile phones. This means that when a malware writer creates a new piece of software, it will get the most exposure on the Android platform. Additionally, when compared to Microsoft's Windows phone or an iOS platform, the Android platform is much easier to work on. This is partially due to the amount of freedom developers are given for creating Continue Reading

Java Is Becoming A Constant Security Issue

Java is an extremely common software that is used around the world by thousands of people. If you keep up with tech news, you probably know that the Java platform is also particularly insecure. Recently, the insecurity was found to be such a threat that the United States Department of Homeland security has instructed people who have it installed on their computer to have it disabled. Apple also responded to the security threat by having the Java plug-in blocked on their OS X. The Main Continue Reading

Attack on Web Servers via Apache Module and SSH Backdoor

Web servers are being hacked by injecting false Apache modules and SSH backdoors. Hackers are not taking advantage of system’s security weaknesses but rather stealing the login information from the web servers. Several alterations to the web server files such as httpd.conf file and /etc/httpd/conf.d were caused by this bug. It can be difficult to detect as it is random and often changes. The SSH binary files were also changed, allowing hackers to extract user’s credentials. The replacement of Continue Reading

The Real Hunt for Red October – Cyber Espionage

We’ve all read and seen the movie The Hunt for Red October by Tom Clancy. Who would have thought that Red October does exist! A report from Kaspersky Lab’s Global Research & Analysis Team revealed that Red October has been active since 2007 attacking various diplomatic and government agencies around the world. This particular virus has taken advantage of the vulnerabilities of MS Excel and Word. The virus was sent through email attachments in MS Word and Excel. It also indicates that it most Continue Reading

Vulnerability in Internet Explorer – Security Advisory 2794220

Security Advisory 2794220 was released by Microsoft to tackle certain vulnerability in Microsoft Internet Explorer 6, 7, and 8. The advisory mentioned that this vulnerability may allow remote code execution in Internet explorer. Meaning, this may allow an attacker to carry out arbitrary code if a user accessed a website which was deliberately created for such purpose. With this, the attacker could acquire the same user rights as the current user. However, users who have fewer user rights Continue Reading

Vista Internet Security 2013 – Virus Removal Instructions

Vista Internet Security 2013 is malware that uses scare tactics to try and get personal information from someone. It is a member of the Braviax family of viruses. The Braviax virus type is called scareware because it tries to frighten people into thinking they need the software that is being offered by the virus. Vista Internet Security 2013 tries to trick people into thinking their computer is infected in a number of ways. Removal instructions are at the end of the article. Aliases: Vista Continue Reading

Java Virus – Security Bug Helps To Spread Malware

“A fix will be available shortly”. This was the statement released by Oracle Corp, the company behind Java, last Friday after the U.S. Department of Homeland Security encouraged computer users to disable the Java software in web browsers. The Oracle Security Alert addresses this current code vulnerability. According to the Department of Homeland Security, criminal hackers are using a security bug in Java to attack PCs by installing malicious softwares through internet browsers. Because of this, Continue Reading