Wait, what?

Looks like you came here from Geekosystem. Don't worry, everything is still here. We've just combined forces with The Mary Sue to bring you more and better content, all in one place.

malware

  1. Malware Links on Twitter With Text “It’s You on Photo?”

    Recently, a number of Twitter users have found peculiar tweets with such messages as "It's you on photo?" or "It's about you?" followed by a suspicious URL. These links open pages that infect your computer with a piece of malware known as the Blackhole exploit kit. If you happen to be tagged in a tweet with terrible grammar with a link to an alleged photo, do yourself a favor and just steer clear.

    Read More
  2. Cyberweapon Flame Takes Cyber-Cyanide Pill, Is Systematically Deleting Itself

    There's all kinds of dangerous malware out there these days between Stuxnet, the stuff packed into North Korean video games and who knows what else. One particularly dangerous and efficient example, Flame, is actually helping solve the problem, kind of. Security researches have actually caught instances of Flame deleting itself.

    Read More
  3. North Korean Malware Hidden in Video Games Used to Launch DDOS Attacks

    A report from earlier this week claims that intelligence agents in North Korea managed to export malware-laden video games into South Korea for the express purpose of launching distributed denial of service attacks. If true, this is a remarkable scam, one that will probably make Korean gamers think twice about their purchases.

    Read More
  4. Android Malware Genome Project Is Taking A Scientific Approach To Fighting Malware

    Every form of technology has its weaknesses. By this point, we are all totally familiar with the concept of the computer virus, and most of us do something to stop it. Fortunately, there are plenty of tools -- free ones even -- to help but that's only because people have devoted time and energy into fighting the malicious little interlopers. As mobile platforms are coming into their own, mobile malware is finding a whole new gallery of targets, Android phones in particular. The Android Malware Genome Project aims to head that malware off at the pass with a particularly scientific approach.

    Read More
  5. Research Firm Says 1 in 5 Macs Contain Windows Malware, 1 in 36 Macs Contain Mac Malware

    If you can't go a day without bolstering your knowledge of malware prevalence, step out off that ledge, for Sophos has just the informational tidbits you've been seeking. Researchers at the firm have found that one in five Macs contain Windows malware, and one in thirty-six Macs contain Mac malware.

    Read More
  6. Mac Flashback Botnet Drops Under 30,000 Infected Computers, But More Trouble Could Be Coming [UPDATED]

    Earlier this month, the Mac community first became aware of Flashback (or Flashfake), a nasty piece of malware that used a Java exploit to turn infected computers into part of an ever-growing botnet. When its presence was announced, it was estimated to have infected over 600,000 computers. Now, thanks to quick action by Apple and security firms, the number of infected computers is estimated to be under 30,000. However, this probably marks the death of Mac's fictional invulnerability to malware and other digital nasties.

    Read More
  7. Fake Angry Birds for Android Fills Your Phone With Malware

    Fans of the Angry Birds shooting-exploding-fowl-at-pigs games should be wary of a nefarious impostor making its way around Android phones. Dressed up to look like the latest Angry Birds Space game, a malicious version of the software is available through unofficial app marketplaces. Once installed, it will load up your phone with more nasty code and even rope it into a smartphone botnet. Just goes to show you that it pays to buy the genuine article.

    Read More
  8. Watch Malware Get Embedded in Bone, Then Uploaded to a Computer in Bones

    Television, specifically run-of-the-mill procedurals, has a reputation for either not getting anything right when it comes to computers, or at the very least, the scenarios in which computers are used to progress the episode's plot are designed by people that actually know how computers work, but are trolls of the highest order. In this installment, we take a look at Bones, a show about Leonard McCoy's life after the Enterprise -- nah, actually it's a show about solving crimes because of bones or something. In this episode, we see a character's computer burst into flames because a malware fractal that was imprinted on bones shut the computer's fans off when the bones were scanned into the computer, thus uploading the virus. It's all very scientific. Watch the clip after the jump.

    Read More
  9. German Government Fesses Up to Spying on Citizens With Trojan, Says It's Legal

    Just days ago, the Chaos Computer Club announced that it had analyzed what it called a "Bundestrojaner" or "federal trojan" that the group believed had been developed and used by the German government. Security researchers at F-Secure Labs confirmed the malware's capabilities, giving it the name "R2D2." Now, state officials are confirming that the software is indeed state-sponsored. According to the Deutsche Welle, several German states have admitted late Monday to using the software for the past two years. The first to respond was Bavaria, followed by Baden-Württemberg, Brandenburg, Schleswig-Holstein, Lower Saxony, Brandenburg, and North Rhine-Westphalia. In their statements, several of the interior ministers for the states outlined the circumstances in which the trojans had been used, which generally characterize an infrequent and court-approved use of the tool. Some officials, including the Bavarian interior minister, say they will begin investigations into R2D2's use. Germany's Interior Minister said that the trojan has never been used as part of a federal investigation. Today, the German software company DigiTask confirmed that they created the program and have sold it to German clients as well as state and federal agencies in Austria, the Netherlands, and Switzerland.

    Read More
  10. Keylogger Virus Found on Drone Pilots' Computers

    A recent story in Wired claims that the operators of the Reaper and Predator drone fleets are struggling against an enemy we can all relate to: Malware. According to the story's sources, which are unnamed, the computers used to remotely control drones around the world have been infected with a nasty keylogger that is resisting efforts to destroy it. If the article's sources can be believed, the problem is centered around a drone control facility at Nevada's Creech Air Force Base. Pilots on the base use computers to fly drones on missions in Pakistan, Afganistan, and around the world. With more and more missions being flown by these armed robotic aircraft, facilities like Creech have become hubs of activity for reconnaissance and more lethal operations. For security purposes, the computers on the base are not connected to the Internet in order to avoid any chance they could become infected. However, the Creech facility was one of the few places the Department of Defense (DoD) allowed USB flash drives to be used in order to transfer mission data between computers. It's believed that this special allowance was the point of entry for the keylogger virus, though its not clear if it was intentionally placed on the infected computers. This is, obviously, bad news for the Air Force, but it might not be as horrific as it seems.

    Read More
© 2014 The Mary Sue   |   About UsAdvertiseNewsletterJobsContributorsComment PolicyPrivacyUser AgreementDisclaimerContactArchives RSS

Dan Abrams, Founder
  1. Mediaite
  2. The Mary Sue
  3. Styleite
  4. The Braiser
  5. SportsGrid
  6. Gossip Cop