Month: October 2013

Windows XP Six Times More Susceptible to Hacking Than Windows 8

Are you yet not ready to bid adieu to Windows XP operating system even after Microsoft has stopped support for this version within coming six months? If not, then you need to plunge at the idea of migrating to Windows 8 or 7 in order to keep PCs safe from hackers. That’s right! Windows XP has been discovered to be an easier target of hackers as this version of operating system has sported higher rate of vulnerability toward malware infection than its later versions. Mike Reavey, the general manager of Microsoft’s Trustworthy Computing, has revealed in a keynote presentation at the RSA Conference in Amsterdam. He gathered statistics and data from real-world computers running Windows OS and concluded “Windows XP is six times more likely to be infected than Windows 8, even though it has the same malware encounter rate. “There are over one billion Windows machines online and we can use them to track malware.” According to the data, Windows XP and Windows Vista-based computers are found to be have infected by about 16% malware attacks. With such rate of malware attacks registered on Windows XP and Vista, these two versions are turned out to be about 19% more vulnerable to malware threats than Windows 7 and 12% more vulnerable than Windows 8. Of 1000 Windows-based computers been scanned, about 9.1 Windows XP SP3-based computers were known to...

Read More

After Mexico, ATM Malware Targets English-speaking Countries

After Mexico, attackers of Ploutus will target an unidentified ATM brand to steal money in English-speaking countries. Attackers of Ploutus have further improved the software program and also translated in English language to be used for an unidentified ATM brand in English-speaking countries, Symantec Security Response suggests. Symantec antivirus vendor has also suggested they have discovered two versions of the Ploutus malware which are designed to clear out an unidentified type of ATM. So, how will this ATM malware work?  How does the Ploutus malware work?               Unlike usual malware software, attackers have chosen to install the malware by inserting the CD boot disk to the innards of the ATM systems based on Microsoft Windows operating system. On the basis of the nature of installation method used for Ploutus malware, Symantec suggests that attackers are targeting standalone ATM machines wherein they can operate and access data without difficulty. Symantec has also revealed that Ploutus malware developers have made changes to the binary name of the malware. Earlier the binary name of the software was ‘Ploutus.exe’ which is now changed to ‘PloutusService.exe’, as the researcher of the Symantec Security Response revealed to the SCMagazine. Attackers transfer this ‘PloutusService.exe’ to the ATM using an optical drive and send a 16-digit command code using the ATM keypad. Then, the dispatcher sends a 33-digit instruction to the...

Read More

New Computer Virus Steals Files and Claims for Hundreds of Ransom!

Here is one more security threat to scare you this Halloween! Have you been only scared and apprehensive about your kids being kidnapped or taken hostage by any malicious neighbor – well, you need to be careful of your computer data too! A new computer virus has recently emerged to take hostage of your computer files which you will not be able to open those files anymore. This new virus, named Ransomware or CryptoLocker, will emerge on your inbox as an email from a legitimate or renowned company such as FedEx, UPS or even legitimate security organizations such as FBI or Homeland Security. As per the news, CryptoLocker or Ransomware has already intruded in several computers across the United States, including a company in Central Texas. The virus is designed with the purpose to extort money from its victims. How CryptoLocker or Ransomware computer virus infects files?            According to Shawn Richeson, the computer technician of Click-A-Nerd, has warned that one hasty or incautious click may lead users to lose all of their vital information on their computers. The computer virus will hide under the guise of a fake mail from UPS, FBI, FedEx or other legitimate company; as the user will click on such mail, the virus file will be installed and starts prying for documents, images, videos and other types of files. Later, the victim will notice...

Read More

Most Notorious Hacking Attacks on News Media

2013 is increasingly becoming the year of hacking attacks, with major news media outlets and social networking sites becoming hacktivists’ target. While some hackers target government websites to denigrate those portals, some focused on social media and biggest news media worldwide. The most notorious attackers of them are the Syrian Electronic Army (SEA). Led by Syrian President Bashar al-Assad, Syrian Electronic Army (SEA) has attacked a third-party link network called Outbrain to hack major media organizations which are linked to the same network. In addition to the website and the organizations, users of these media portals were also affected and suffered inconvenience to a certain degree. These top media hacks include – Fox News: Earlier on July 4, 2011, a message popped up stating assassination of President Barack Obama on the Twitter account of Fox News media site. As soon as the incident exploded as an erroneous announcement, a secret service was appointed to investigate the incident. As it found out that the furor was created by a group called Script Kiddies. One of the members of Script Kiddies revealed to Stony Brook University’s Think magazine that they targeted Fox News as “their security would be just as much of a joke as their reporting”. NBC: Hackers attacked NBC.com in February, 2013 as they loaded the website with the Citadel Trojan malware which were being automatically transferred to visitors’...

Read More

Finally BBM is Rolling out on Android and iOS

BlackBerry has rolled out BlackBerry Messenger (BBM) app on Apple App Store and Google Play Store to download on their on iOS and Android-based devices. BlackBerry has confirmed that BlackBerry Messenger has already got five million downloads within the first eight hours despite the delay, as confirmed through Twitter by the @BBM. In addition to glorious release on Google Play Store and Apple App Store, the app will be available from some select Samsung App Stores. Users who will install the BlackBerry Messenger app on their Android and iOS devices require signing up at BBM.com. Users need to use a headstart to be able to use the messenger on their respective Android or iOS devices. Users, who have not already registered with BlackBerry Messenger, need to register with the BlackBerry Messenger and wait for the confirmation email before activating the app. Those who have pre-registered with the BBM will be given first priority; other users will be put in a queue. The company quoted on the use of BlackBerry Messenger app “Customers who have already downloaded BBM for iPhone will be able to continue to use BBM. The unreleased Android app will be disabled, and customers who downloaded it should visit www.BBM.com to register for updates on official BBM for Android availability,” It also continues that “As soon as we are able, we will begin a staggered country rollout...

Read More