Category Archives: Badware News
Android Police Virus
Another type of ransomware infection, called Android Police Virus, appeared in May 2014. The concept of this infection is well-known because security specialists have dealt with similar ransomware infections before. For example, the notorious FBI virus is somewhat similar to Android Police Virus. However, the main difference between these infections is that Android Police Virus affects phones and tablets that run on the Android operating system. It does not affect desktop computers, and computer security experts suggest that compared to the desktop infection, removing Android Police Virus is not as complicated. ...
Coin Locker
There are malicious programs that transcend their primary targets and infect platforms that run on various operating systems. Coin Locker is a malicious ransomware application that was first targeted at Android devices, but now it may affect Windows operating system as well. The most annoying thing about this infection is that you cannot remove Coin Locker per se. Once it has released its payload, Coin Locker deletes itself automatically, so there is no actual malicious program for you to deal with. ...
Russian cyber criminals employ FessLeak malvertising campaign
FessLeak is a name of a new malvertising campaign whose origin is Russia. The date of its emergence is considered to be October 17, 2014; however, it is very active in 2015 as well. This name has been assigned to this campaign because researchers have noticed that cyber criminals leverage file-less infections to spread ransomware. Various ransomware infections exist; however, it is likely that CryptoLocker will slither onto your computer if you become a victim of FessLeak malvertising campaign. ...
Microsoft dissatisfied with Google's announcement about Windows bug
Microsoft has recently expressed their displeasure of how Google has released information about a vulnerability in Windows. According to Coordinated Vulnerability Disclosure (CVD), security researchers should give Microsoft a possibility to fix vulnerabilities detected before disclosing them to the public. Microsoft states that they seek to provide their customers with high-quality updates and protect the customers from malicious attacks while the update is being created. ...
The POODLE vulnerability: how can you protect yourself?
Recently, three Google researchers—Bodo Moller, Thai Duong, and Krzysztof Kotwic—have discovered the latest security hole in a basic protocol that is used for encrypting web traffic. The vulnerability is named POODLE, which stands for Padding Oracle On Downgraded Legacy Encryption, and affects the Secure Sockets Layer (SSL) 3.0 encryption protocol SSLv3. According to the latest reports, another variant of the POODLE vulnerability, known as (CVE-2014-8730) has been detected. Importantly, all these issues with the POODLE vulnerabilities are related to the old SSLv3 but not with any flaws in SSL certificates or their private keys. ...
Have you become a victim of the DeviantArt Scam?
The DeviantArt Scam may affect all deviantart.com users who browse for images on the popular website. The scam is operated by unreliable parties who have created accounts to flood the website with fake images that hide third-party links. According to our virtual security researchers, these images are repetitive, and so it should be easy to realize that they are linked to a scam. Luckily, nothing bad will happen if you click on the image. You will face the real risks if you interact with the links presented via these images. These links could introduce you to other scams, and this is something you need to avoid. ...
Malicious Advertisers Employ Authentic Ad-Networks
AdXpansion is an advertising network mainly targeted at the adult market. The ads presented via this network are usually displayed on porn sites, or they are employed to promote sites of this kind via other websites. Unfortunately, the ad network has been exploited by cybercriminals who may use malicious advertising (or malvertising) to open up security backdoors and infiltrate dangerous computer infections. ...
Shellshock bug - you might be next
Shellshock bug is a security vulnerability that affects users all over the world. This bug is relevant to machines that run on MAC, Linux and Windows operating systems. According to a number of news reports, this is a deadly serious vulnerability that can affect more than 500 million computers worldwide. ...
The silent attacks of Boleto infections
Those computer users who open spam emails carelessly may invite Boleto infections without even realizing it. There is a countless number of different threats from the family, including clandestine Trojans and malicious keyloggers; however, all of them have the same purpose – to scam you. As you can tell by the name given to this group of malware, they are associated to the Boleto payment system used for the banking transactions by millions of users in Brazil. ...
Russian hackers steal over 1.2 billion unique email addresses
Since the beginning of the year 2014, several significant Internet-related breaches have been discovered, including the last one that deals with stolen Internet credentials and emails addresses. In total, over 360 million stolen credentials were identified in February 2014. ...