Malware Articles

A look at the leaked CIA malware attacks on Apple software

  • 26/03/2017 at 23:32 by It's a Gadget Staff
  • News

Smartphone SpyWikileaks has once more released a series of documents that claim to show malware the CIA used to spy on owners of Apple products. And they are pretty hardcore.

The CIA’s Target: Macs

We have seen many examples of how the CIA, among other organizations, have used exploits to get backdoor access into people’s phones, computers, and other devices. But this is a new set of revelations, specifically targeting Mac computers using directly targeted malware installed by CIA operatives.

+Continue Reading

HTTPS pages face new risk, sensitive data stolen

  • 06/08/2016 at 17:49 by It's a Gadget Staff
  • News

Security KeyBad news! HTTPS, which has been touted as being more secure than the older HTTP, has now become a less so. An attack that steals sensitive information, such as social security numbers and email addresses, has been announced.

This is not the first time a leak has been discovered in HTTP coding. In fact, it isn’t the first time this particular exploit, HEIST, has been seen. But it has been once more proven as a threat by researchers who have warned major tech companies of the ability to continue exploiting it.

+Continue Reading

Security researchers plan to expose USB risks

  • 31/07/2014 at 21:37 by It's a Gadget Staff
  • Gadgets

USB StickTwo researchers are looking to change the way you think about USB drives. Mainly, to get you to dismiss the notion that they are safe to use. Or to pass around.

USB drives have become a bit of a dinosaur, thanks to cloud storage, SD and micro cards, p2p sharing and desktop transmission applications like Dropbox. But some people still use them, and they are a frequently gifted business item used as a promotional tool from many corporations.

The problem besides their age and lack of functionality in a world of big storage needs? They are flat out dangerous.

+Continue Reading

New Android security flaw could lead to stolen financial details

Android LogoA new flaw in Android security could potentially leads to stolen financial and personal details. It is all thanks to a “fake ID” style malware system that can sneak into other apps, undetected.

For some time, Android has been criticized for their lax approach to third-party app security. Fake applications, or those that only claim to provide a service but actually do nothing, have been featured in the past as “top apps” recommended by Google Play.

Now, a much bigger issue has been uncovered. A new form of malware could be using those apps to gain access to your information.

+Continue Reading

Facebook breaks down their role in taking down Lecpetex botnet

  • 09/07/2014 at 23:09 by It's a Gadget Staff
  • Technology

Lecpetex Botnet worldwide spreadFacebook has released a post describing their role in taking down the Lecpetex botnet, a security threat that was spread through the social media platform.

“Lecpetex”, named by Microsoft, was a lesser known bit of malware that first started to show a pattern about seven months ago. Giving a way in to the infected computer via the social account itself, it would hijack user accounts to promote spam files that further spread the malware.

+Continue Reading

NSA documents reveal plan to infect millions of computers with data tracking malware

  • 12/03/2014 at 18:32 by It's a Gadget Staff
  • News

NSA Spy ViewAnother alarming find in the documents leaked by Edward Snowden have shown the NSA’s intention to infect millions of computers globally with malware. The malicious implant would siphon data from targeted computers in massive quantities, giving otherwise protected devices an open backdoor.

This appears to be a joint effort by the NSA and the British GCHQ. Listening stations have been placed in the UK and Japan, though the primary center of operations is in Maryland, USA, where the primary headquarter is located.

+Continue Reading

More than half a Million Mac Computers are Hosting Malware

Mac OS XAn amazing 600,000 Apple computers were struck and conquered by the Flashback Trojan, Dr. Web from Russia claims. It infiltrates as a malware and then converts the machine into a botnet. A botnet is a network of machines vulnerable to the control of someone other than it’s users. What is worse is that more than half of these infected Macs reside in the U.S, according to Dr. Web’s estimates.

As could be expected, Apple responded with a security patch. Without the patch, your system lies vulnerable or at worst infected already. So do not wait to patch your Apple.

Flashback made itself known by disguising as a simple update on Flash Player. Accepting the request put the malware on the unsuspecting user’s computer, followed by a deactivation of selective security features.

+Continue Reading