Gozi Virus Creators Found and Arrested

Recent news of about the three Europeans namely Nikita Kuzmin of Russia, Mihai Ionut Paunescu of Romania and Deniss Calovskis of Latvia charged with using Gozi virus used to steal millions of dollars from banks around the world has caught our attention. But we would ask ourselves, how did the Gozi virus cause this much theft? The Gozi virus is also considered a Trojan. Just like any other Trojan virus, users would receive this virus through emails containing fraudulent links, PDF attachment Continue Reading

How Secure Is Skype?

Not long ago, the thought of using a voice over Internet protocol program to effectively communicate would have been surprising. Since the Internet has become more commonplace though, many people use Skype daily to stay in contact with people over a distance. Skype is also used by many businesses as well. With all that in mind though, how secure is Skype? Skype as a Target Malware authors are always trying to find more new ways to get infiltrate people's computers. Skype has become a Continue Reading

Google Android Malware Threat

Android is an ideal target for malware creators and spammers for a couple of reasons. First of all, Android has the largest market share among mobile phones. This means that when a malware writer creates a new piece of software, it will get the most exposure on the Android platform. Additionally, when compared to Microsoft's Windows phone or an iOS platform, the Android platform is much easier to work on. This is partially due to the amount of freedom developers are given for creating Continue Reading

Java Is Becoming A Constant Security Issue

Java is an extremely common software that is used around the world by thousands of people. If you keep up with tech news, you probably know that the Java platform is also particularly insecure. Recently, the insecurity was found to be such a threat that the United States Department of Homeland security has instructed people who have it installed on their computer to have it disabled. Apple also responded to the security threat by having the Java plug-in blocked on their OS X. The Main Continue Reading

Attack on Web Servers via Apache Module and SSH Backdoor

Web servers are being hacked by injecting false Apache modules and SSH backdoors. Hackers are not taking advantage of system’s security weaknesses but rather stealing the login information from the web servers. Several alterations to the web server files such as httpd.conf file and /etc/httpd/conf.d were caused by this bug. It can be difficult to detect as it is random and often changes. The SSH binary files were also changed, allowing hackers to extract user’s credentials. The replacement of Continue Reading

The Real Hunt for Red October – Cyber Espionage

We’ve all read and seen the movie The Hunt for Red October by Tom Clancy. Who would have thought that Red October does exist! A report from Kaspersky Lab’s Global Research & Analysis Team revealed that Red October has been active since 2007 attacking various diplomatic and government agencies around the world. This particular virus has taken advantage of the vulnerabilities of MS Excel and Word. The virus was sent through email attachments in MS Word and Excel. It also indicates that it most Continue Reading

Vulnerability in Internet Explorer – Security Advisory 2794220

Security Advisory 2794220 was released by Microsoft to tackle certain vulnerability in Microsoft Internet Explorer 6, 7, and 8. The advisory mentioned that this vulnerability may allow remote code execution in Internet explorer. Meaning, this may allow an attacker to carry out arbitrary code if a user accessed a website which was deliberately created for such purpose. With this, the attacker could acquire the same user rights as the current user. However, users who have fewer user rights Continue Reading

Java Virus – Security Bug Helps To Spread Malware

“A fix will be available shortly”. This was the statement released by Oracle Corp, the company behind Java, last Friday after the U.S. Department of Homeland Security encouraged computer users to disable the Java software in web browsers. The Oracle Security Alert addresses this current code vulnerability. According to the Department of Homeland Security, criminal hackers are using a security bug in Java to attack PCs by installing malicious softwares through internet browsers. Because of this, Continue Reading

Google Awards $60,000 to Finder of Chrome Security Flaw

Google has for several years awarded lots of money to individuals who find security flaws in their Chrome web browser. The reason for offering awards is simply to encourage honest computer experts to find flaws in Chrome that may otherwise be discovered by malicious hackers. Google just awarded $60,000 to someone who goes by the name of "Pinkie Pie", for finding a security flaw in Chrome. The security flaw in question was considered to be a very critical flaw and therefore deserves the $60,000 Continue Reading

Firefox 16 Security Flaw Fixed

Mozilla, the company behind Firefox, released a safe version of Firefox 16 after a recent major security flaw discovered in the initial release of the software. Mozilla said in a statement on its blog that the security flaw discovered in Firefox 16 would have allowed malicious websites to view previous websites that visitors had viewed as well as URL parameters. The URL parameters flaw is a major concern. The ability for a malicious website to view previously visited websites of its visitors, Continue Reading