comScore

Wait, what?

Looks like you came here from Geekosystem. Don't worry, everything is still here. We've just combined forces with The Mary Sue to bring you more and better content, all in one place.

malware

  1. New Zealanders Who Clicked on Nude Hack Links Got Hit With Malware, Possibly Broke the Internet

    Somebody call the Karma Police, cuz THIS IS WHAT YOU GET.

    Here at The Mary Sue we're pretty firm believers that no one should be clicking on links that advertise nude pictures from the celebrity hack last week, because those pictures were all stolen and that's a shitty thing to do. But you know what else is a good deterrent, for people who don't care about being shitty? The possibility of your computer getting hacked next.

    Read More
  2. A Malware Protection “Placebo” App Made $40,000 by Doing Nothing

    5/5 stars. Would get fooled by again.

    The placebo effect is great, because not only does it psychologically fix things from time to time, but it also tricks you into fun things like believing your car goes faster when you put a bunch of cool stickers on it. It also makes people a bunch of money when they sell an app that does nothing but tell people it's preventing malware.

    Read More
  3. New Report Says the NSA Poses as Facebook to Spread Their Malware, Good Thing We’ve All Moved on to Twitter

    When searching for terrorists, leave no picture of a baby or pet unchecked.

    Oh my God, the NSA is posing as Facebook to spread malware and steal all of your data! Can you even belie—no, I can't do it. I just cannot be surprised at the depths of this whole NSA spying debacle anymore. I don't have anything left. If they mounted a camera to my skull that observed my face at all times, all they'd see is a lack of shock.

    Read More
  4. Scientists Created Malware That Communicates by Sound, Because Malware Wasn’t Annoying Enough

    "Pssst, hey! Download me! I promise I'm just a nifty browser toolbar and won't break your computer!"

    If malware that can infect your computer through its speakers sounds like some kind of horrible nightmare, that's the appropriate reaction and demonstrates that your brain is functioning normally. However, it's probably a good thing that science discovered it, because there's a possibility that it's already circulating.

    Read More
  5. Mozilla Would Like You to Stop Making Your Spyware Look Like Firefox

    Gamma International makes commercial spyware that governments and other entities use for various spy stuff. One of the reasons Gamma's software works is that it disguises itself as Mozilla's Firefox browser so that the people being spied upon don't delete it. That's clever, but Mozilla would like them to knock it off. Mozilla's even sent a cease and desist letter to Gamma.

    Read More
  6. New Skype Malware Makes Computers Mine Bitcoins

    Bitcoin is all the rage right now, with the price hitting above $100 and people with a background in economics and finance taking it a bit more seriously, so it's only natural that folks would look to capitalize on its current prominence. Those that are looking to get rich quick are even getting inventive, going so far as to create a new form of malware propagating through Skype that turns the host computer into a Bitcoin-mining slave.

    Read More
  7. Android Malware Moves From Phone to PC, Listens in on You With Your Own Microphone

    The cyber-security wonks at Kaspersky have raised the alarm on a piece of malware for Android phones. The real target of the virus, though, isn't the phone -- it's the computer users will plug it into. The malware, which was available until recently in the Google Play store, masquerades as simple Android phone clean up apps going by the (slightly ironic) names SuperClean and DroidCleaner. Once the apps made it onto a computer, though, they doesn't clean up so much as clean house, copying sensitive data like photos and contact information to remote servers. That's not unnerving enough for you? Don't worry -- to turn the creep factor up to 11, the malware is also capable of turning on PC microphones to listen in on users and relay along those recordings to its shadowy overlords.

    Read More
  8. White House Cyberattack Was Just an Email With Malware, Nigerians Return to Drawing Board

    At what point do we start classifying something as a "cyberattack" rather than "malicious spam" when it comes to email? Apparently, that line is drawn when it involves the White House. After some reports were made that a brazen attack occurred that compromised the security of the United States' nuclear commands, the White House has confirmed that they were, in fact, the target of a "cyberattack" insofar as an email was sent to them that contained malware. Most everything else about the hyperbolic first reports, however, they claim to be false.

    Read More
  9. Forget Bloatware; Some New Computers Come Equipped With Malware

    There's a nasty little habit where computer manufacturers, or really any tech manufacturer, install software on the machine that is absolutely worthless before it hits store shelves. There programs are frustrating, but they ultimately constitute what amounts to a minor annoyance. On the other hand, it appears there's a new trend going on: Installing malware prior to purchase.

    Read More
  10. Emma Watson is the Most Dangerous Actress in Hollywood, to Computers

    the internet is serious business

    Emma Watson's The Perks of Being a Wallflower comes out later this month, and while we're a bit more excited for The Bling Ring, her flick where she's the leader of a gang of bored rich teens who go on a cat-burglary spree (based on a true story), we're sure that search traffic on her name is correspondingly up. But according to security firm McAfee, that might be dangerous for the casual internet searcher.

    Read More
  11. Frankenstein Virus Steals Code From Other Programs

    Well, this should terrify anyone who has ever experienced the perfectly rational terror inspired by machines that can think for themselves. New Scientist reports that computer scientists at the University of Texas at Dallas have created a computer virus, dubbed Frankenstein, that can make itself more damaging and harder for systems to detect by stealing bits and pieces of code from other programs. If you don't think this ends in a supervirus running out of control through the Internet, making machines come to life and subjugating humanity, you are not being anywhere near reactionary enough.

    Read More
  12. Malware Links on Twitter With Text “It’s You on Photo?”

    Recently, a number of Twitter users have found peculiar tweets with such messages as "It's you on photo?" or "It's about you?" followed by a suspicious URL. These links open pages that infect your computer with a piece of malware known as the Blackhole exploit kit. If you happen to be tagged in a tweet with terrible grammar with a link to an alleged photo, do yourself a favor and just steer clear.

    Read More
  13. Cyberweapon Flame Takes Cyber-Cyanide Pill, Is Systematically Deleting Itself

    There's all kinds of dangerous malware out there these days between Stuxnet, the stuff packed into North Korean video games and who knows what else. One particularly dangerous and efficient example, Flame, is actually helping solve the problem, kind of. Security researches have actually caught instances of Flame deleting itself.

    Read More
  14. North Korean Malware Hidden in Video Games Used to Launch DDOS Attacks

    A report from earlier this week claims that intelligence agents in North Korea managed to export malware-laden video games into South Korea for the express purpose of launching distributed denial of service attacks. If true, this is a remarkable scam, one that will probably make Korean gamers think twice about their purchases.

    Read More
  15. Android Malware Genome Project Is Taking A Scientific Approach To Fighting Malware

    Every form of technology has its weaknesses. By this point, we are all totally familiar with the concept of the computer virus, and most of us do something to stop it. Fortunately, there are plenty of tools -- free ones even -- to help but that's only because people have devoted time and energy into fighting the malicious little interlopers. As mobile platforms are coming into their own, mobile malware is finding a whole new gallery of targets, Android phones in particular. The Android Malware Genome Project aims to head that malware off at the pass with a particularly scientific approach.

    Read More
  16. Research Firm Says 1 in 5 Macs Contain Windows Malware, 1 in 36 Macs Contain Mac Malware

    If you can't go a day without bolstering your knowledge of malware prevalence, step out off that ledge, for Sophos has just the informational tidbits you've been seeking. Researchers at the firm have found that one in five Macs contain Windows malware, and one in thirty-six Macs contain Mac malware.

    Read More
  17. Mac Flashback Botnet Drops Under 30,000 Infected Computers, But More Trouble Could Be Coming [UPDATED]

    Earlier this month, the Mac community first became aware of Flashback (or Flashfake), a nasty piece of malware that used a Java exploit to turn infected computers into part of an ever-growing botnet. When its presence was announced, it was estimated to have infected over 600,000 computers. Now, thanks to quick action by Apple and security firms, the number of infected computers is estimated to be under 30,000. However, this probably marks the death of Mac's fictional invulnerability to malware and other digital nasties.

    Read More
  18. Fake Angry Birds for Android Fills Your Phone With Malware

    Fans of the Angry Birds shooting-exploding-fowl-at-pigs games should be wary of a nefarious impostor making its way around Android phones. Dressed up to look like the latest Angry Birds Space game, a malicious version of the software is available through unofficial app marketplaces. Once installed, it will load up your phone with more nasty code and even rope it into a smartphone botnet. Just goes to show you that it pays to buy the genuine article.

    Read More
  19. Watch Malware Get Embedded in Bone, Then Uploaded to a Computer in Bones

    Television, specifically run-of-the-mill procedurals, has a reputation for either not getting anything right when it comes to computers, or at the very least, the scenarios in which computers are used to progress the episode's plot are designed by people that actually know how computers work, but are trolls of the highest order. In this installment, we take a look at Bones, a show about Leonard McCoy's life after the Enterprise -- nah, actually it's a show about solving crimes because of bones or something. In this episode, we see a character's computer burst into flames because a malware fractal that was imprinted on bones shut the computer's fans off when the bones were scanned into the computer, thus uploading the virus. It's all very scientific. Watch the clip after the jump.

    Read More
  20. German Government Fesses Up to Spying on Citizens With Trojan, Says It's Legal

    Just days ago, the Chaos Computer Club announced that it had analyzed what it called a "Bundestrojaner" or "federal trojan" that the group believed had been developed and used by the German government. Security researchers at F-Secure Labs confirmed the malware's capabilities, giving it the name "R2D2." Now, state officials are confirming that the software is indeed state-sponsored. According to the Deutsche Welle, several German states have admitted late Monday to using the software for the past two years. The first to respond was Bavaria, followed by Baden-Württemberg, Brandenburg, Schleswig-Holstein, Lower Saxony, Brandenburg, and North Rhine-Westphalia. In their statements, several of the interior ministers for the states outlined the circumstances in which the trojans had been used, which generally characterize an infrequent and court-approved use of the tool. Some officials, including the Bavarian interior minister, say they will begin investigations into R2D2's use. Germany's Interior Minister said that the trojan has never been used as part of a federal investigation. Today, the German software company DigiTask confirmed that they created the program and have sold it to German clients as well as state and federal agencies in Austria, the Netherlands, and Switzerland.

    Read More
© 2015 The Mary Sue   |   About UsAdvertiseNewsletterJobsContributorsComment PolicyPrivacyUser AgreementDisclaimerContact RSS

Dan Abrams, Founder
  1. Mediaite
  2. The Mary Sue
  3. Styleite
  4. The Braiser
  5. SportsGrid
  6. Gossip Cop