malware

  1. Boiling Frog

    FBI Admits It Controlled Tor Servers Behind Mass Malware Attack

    In an wired article the FBI spelled the way in which they "hacked" the TOR network. Here some of the things they were able to do: Hacking into a popular TOR server. Having that server offer up what looked like an error message screen. Embedding malware in that error message that executed on...
  2. 100th Monkey

    Hijacked smartphone camera spies on your world

    Hijacked smartphone camera spies on your world 12:33 1 October 2012 Hal Hodson, technology reporter (Image: Joos Mind/Getty Images) We tend to imagine that cybercriminals want to target our digital lives, aiming to steal credit card numbers and email accounts as we exchange them for services...
  3. Denise

    Internet blackout looms for thousands: What you need to know

    Thousands of computer users may lose Internet access on Monday, when the deadline for a temporary fix to a malicious software scam shut down by the FBI last year expires. What is it? Millions of computers were infected with the so-called "Internet Doomsday" virus used in the hacking scam...
  4. White Rabbit

    Over 600,000 Macs infected with Flashback Trojan

    By Emil Protalinski | April 4, 2012, 8:56pm PDT Summary: The Flashback Trojan botnet reportedly controls over 600,000 Macs. Thankfully, Apple yesterday released a patch for Java, which the Trojan exploits, so make sure you install it. Over 600,000 Macs infected with Flashback Trojan By Emil...
  5. Unhypnotized

    Computer Expert: US Was Behind Stuxnet Virus

    TED Conference speaker confirms New York Times admission – “ridiculous conspiracy theory” is true Paul Joseph Watson Prison Planet.com Friday, March 4, 2011 A computer expert at the influential TED Conference in California has confirmed what the New York Times already admitted in January...
  6. CASPER

    In setback, Iran to unload fuel from nuclear plant

    TEHRAN, Iran – In a major setback to Iran's nuclear program, technicians will have to unload fuel from the country's first atomic power plant because of an unspecified safety concern, a senior government official said. The vague explanation raised questions about whether the mysterious computer...
  7. CASPER

    AP Exclusive: Report warns of Iran nuke disaster

    VIENNA – The control systems of Iran's Bushehr nuclear plant have been penetrated by a computer worm unleashed last year, according to a foreign intelligence report that warns of a possible Chernobyl-like disaster once the site becomes fully operational. Russia's envoy to NATO, Dmitry Rogozin...
  8. CASPER

    After failed Iran nuclear talks: What now?

    ISTANBUL – The collapse of another attempt at international outreach to Iran on Saturday has left world powers with few options except to wait — and hope that the bite of sanctions will persuade Tehran to reconsider its refusal to stop activities that could be harnessed to make nuclear weapons...
  9. Unhypnotized

    How To Disable Geolocations In Specific Programs

    Geolocation is a rather secret feature of some browsers and toolbars. It allows the creator of that program to get a fix on the location of your computer to within a few meters of where you actually live. For the potential dangers read the article from BBC News entitled 'Web attack knows where...
  10. Unhypnotized

    Wikileaks Mirror Accused In DoS Attack

    Kurt Nimmo Infowars.com December 20, 2010 In an email posted on Cryptome, Joly MacFie cites the website Spamhaus that has accused a “Russian dedicated cybercrime host” of launching a cyber attack against its servers. The denial-of-service attack occurred after Spamhaus posted a warning about...
  11. Unhypnotized

    US Air Force Blocks Internet Access To New York Times, Guardian And 23 Other Website Posting WikiLeaks Documents

    Tyler Durden Zero Hedge Dec 15, 2010 Score one more for freedom of speech (and leaking of documents so secret only 3 million people have access to them). We are trying to discover just why the Air Force has resorted to this drastic move (and having hosted a few WikiLeaks docs ourselves...
  12. Unhypnotized

    Chinese Operation Against Google Involved Accessing the Firm’s Internal Intercept Sys

    Cryptogon Thursday, January 14, 2009 Via: Computer World: Drummond said that the hackers never got into Gmail accounts via the Google hack, but they did manage to get some “account information (such as the date the account was created) and subject line.” That’s because they apparently...
Top