Month: November 2013

A New Worm Exploiting Linux-based “Internet of Things”

Leading security software vendor, Symantec has detected a new Linux worm which attempts slithering Linux-based computers and ‘Internet of things’ devices. Then, are too many Internet-enabled “Internet of things” devices unsafe to use until we are get rid of such slithering worms and threats. How and what devices are most vulnerable to Linux.Darlloz worm? Researchers at Linux have detected and reported a new worm dubbed as Linux.Darlloz which is capable of intruding a plethora of “Internet of things” devices and Linux-based computers. Though Linux.Darlloz has been classified as a low-level threat, but the malware can make minor modifications and use variants which may include executable and linkable format (ELF) files. Then, the malware will be capable of spreading these ELF files to the “Internet of things” devices such as webcam, cameras, routers, and other Internet-connected devices. Furthermore, Linux has specified devices that contain chips made by ARM and those devices that are based on MIPSEL, MIPS, and PPC and architectures are more susceptible to be infected by this Linux.Darlloz worm. Kaoru Hayashi, Symantec researcher, has published his blog on Wednesday that – “Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability. If the target is unpatched, it downloads the worm from a malicious server and starts searching for its...

Read More

TechGenie Absolute Black Friday Week Deal… Till Stocks Last!

Did you know cyber criminals will monitor your Internet activities, online transactions, every message you exchange and your social networking activities this holiday season? That’s why you must equip your computer with the robust protection to fight hackers, malware phishing, slow PC and other PC issues to sail smoothly during this Black Friday and Cyber Monday shopping season. Hence, get TechGenie Absolute before cyber criminals get you! For this, we have slashed the price of TechGenie Absolute with a lucrative limited Black Friday Week deal to help you deal with different types of computer problems. How to save your PC and pocket with TechGenie Absolute? With this special holiday deal on TechGenie Absolute, protecting against hacking, browser hijacking, data stealing, online identity theft, malware install and other nuisance will be easy to deal with and money saving too… well, till this flat 50% discount stock lasts. Grab this Black Friday Week, which is starting from this Thanksgiving to Cyber Monday, to add this all-encompassing protection of TechGenie Absolute to your PC. Yes, you will get all the components you need to ensure fast, safe and hassle-free computing including Antivirus Anti-malware Anti-Spyware Anti-Rootkit Real-time Protection Email Spam Filter Browser Protection Safe/not-safe list Application, Games and Website Blocking Encryption and Decryption Hackers’ Intrusion Detection Parental Control Internet Optimization Disk Defragmentation Registry Cleaner Problem Troubleshooter and you name it. Easy to set...

Read More

NSA Hacked and Installed Malware on More Than 50,000 Computer Networks

Earlier in September, British intelligence service (GCHQ) was reported to have planted malware on computer via SlashDot and LinkedIn on the to trace Belgacom’s Engineers. Yesterday, another new revelation surfaced when a PowerPoint slide has been released by Dutch newspaper NRC Handelsblad. According to the document, the American security agency has spread malware computer networks to infiltrate and conduct spy operations. NSA has hacked more than 50,000 computer networks, as per the new PowerPoint slide released by former NSA-employee Edward Snowden and found by the newspaper. In that slide, the document contains a global map that demonstrates that more than 50,000 computer networks mapped as “world-wide implants”. The malware is written to infiltrate those networks to extract sensitive information. How NSA breaks into computer security? The management presentation slide dated in 2012 proved that the National Security Agency uses Computer Network Exploitation (CNE) which covered those 50,000 computer networks spotted as hacked by NSA. Computer Network Exploitation is a covert infiltration process in which NSA installs malicious software on the network to steal information they require. NSA employs hackers? According to public sources, NSA computer network infiltrations are performed by hackers. A dedicated department of NSA called Tailored Access Operations (TAO) is designated to perform such hacking activities; the department is known to recruit more than one thousands of hackers to conduct this covert cyber operations. Earlier in 2008,...

Read More

Are you safe this Cyber Monday? Watch out! Online Threats are here to pounce on you!!

You have started preparing for the long Thanksgiving weekend, but are you aware of Internet fraudsters and their newest tactics to harm you as well? They are looking forward to you this Cyber Monday- the busiest shopping day when cyber crooks become highly active. Cyber Monday – observed on the first Monday of December comes after the Thanksgiving weekend. As we all know, Thanksgiving announces the beginning of the Christmas shopping season, so in order to attract customers on this day, retailers offer huge discounts and sale. And this has contributed greatly to the popularity of this day and thus it came to be recognized as one of the busiest shopping days of the year.. Although traditionally people would go out to the markets and shop physically, time crunch, inconvenience and overcrowding discouraged them from continuing to do so and a new wave of online shopping started emerging. Since 2005, this day started being observed as Cyber Monday, the day when online shopping too commences. That’s history; and what we have in the present isn’t all hunky dory as it appears. Like with every good thing there comes (mostly) a bad element as well, Cyber Monday also comes accompanied with several negatives. This includes a boost in cyber crime such as identity thefts, misuse of personal information, phishing attacks, poisoned search engine results, and several other frauds and survey...

Read More

Healthcare.gov is an Easy Target of Hackers, Security Experts Have Testified

Four computer security experts including a ‘white-hat hacker’ have testified Obamacare website Microsoft Silverlight could be an easy target of hackers. The website invites sign up for attaining new healthcare insurance for individuals, family and small businesses could be a readily available resource to capture details on signee’s details. Security experts have warned Congress that the “website should be shut down” at the ‘Republican-sponsored hearing’ held by the House Science, Space and Technology Committee. Why Healthcare.gov should be offline?    Four computer security experts have warned that until the critical security flaws are addressed and patched, the website can be hacked by malware writers to extract personal information of signees. David Kennedy, the white hat hacker of the group of four computer security experts have suggested before the Science, Space and Technology Committee that – “The purpose of security isn’t to say, ‘Hey, we’re 100 percent impenetrable all the time,’ but can we detect the hackers in the very early stages of the life cycle of the attack, monitor that, and prevent the attacks from happening. And none of those are clearly being done on the Healthcare.gov website,” He added that “Just by looking at the website, we can see that there is just fundamental security principles that are not being followed.” Hackers can monitor chat and webcam! Kennedy who hacks online programs and websites to identify security flaws...

Read More