Article on the subject of "malicious"
-
Iran: The Stuxnet 'total attack' of industrial systems
iranian officials confirmed that the stuxnet worm infested at least 30,000 pcs running windows in the country ...
-
Description of the P2P-Worm.Win32.BlackControl.g template
with the name p2p worm - they are mainly spread through peer-to-peer sharing models like kazaa, grokster, edonkey, fasttrack, gnutella ...
-
Symantec announced 100 dirty websites in 2009
in the list of the 100 most dirty websites of 2009 that symantec listed, most of them are fake antivirus software websites.
-
List of 114 fake virus removal programs
the malware tricked users into installing and paying for fake anti-virus software without cleaning the computer, nor protecting it against viruses.
-
Many vain Vietnamese websites
'viruses belonging to the w32.dashfer family when infected with a pc will cause the victim to visit any site thinking the site has been maliciously inserted'. in fact, the virus is in one or more computers where the victim machine has the same network connection.
-
A way to disable the Storm worm has been found
a group of german research experts announced that they had found a solution against the malicious storm computer worm that turned pcs into 'bots' to help hackers spread malicious code or send spam.
-
More than 1 million large websites are attacked?
according to security expert dancho danchev, hackers are opening a 'total attack' campaign aimed at the internet, with the number of web sites being shot up to more than 1 million.
-
New trojans appear via MSN network
msn messenger's instant messaging service network is currently undergoing a new wave of attacks from the dangerous trojan ircbot-rb. ircbot-rb trojan is often distributed through a msn messenger network message containing links to photos stored on web sites.
-
Halloween helps hackers penetrate computers
sophos has just discovered a halloween spam campaign that will attack and direct victims to malicious websites that have 'dangerous' files. spam emails can be easily identified with
-
A trojan appearance ... 'talking'
hackers have just launched a 'talking' trojan that can give users a sarcastic voice when it successfully infects their pc.
-
Flash funny ... 'piggyback' on Trojan
security firm sophos labs recommends that users be careful with funny flash clips that appear on the internet, which could be the source of trojan infection on your pc.
-
Storm became a 'record' of spam distribution
the trojan is responsible for controlling users' computers to form huge cyber-computer networks (botnets). security experts confirmed that the number of malicious e-mail increased 1,700% in july directly related to storm.
-
Trojan 'Pirates of the Caribbean'
a fake garbage campaign provides information about the new 'pirates of the caribbean' movie to spread a newly launched trojan. in terms of content, the above spam messages are full of information and a fake malicious link brings c
-
10 most dangerous malicious codes in March 2007
british security firm sophos has released a list of 10 most dangerous malicious codes in march 2007. accordingly, the leading position belongs to a very old name - netsky.
-
Malicious code is growing up
security firm mcafee warns that malicious code is currently on the way to prepare to reach a new level of complexity and professionalism. not only the malicious code and adware are now becoming a professionally distributed service
-
Deep detection of USB memory card
sophos security experts say they have discovered a new computer worm that specializes in potentially dangerous mobile drives. once infected on the pc the sillyfd-aa worm will search for removable disks such as disc m
-
Top 10 most dangerous malicious codes in April
sophos has announced the list of the most dangerous and distributed malicious code in april. last month saw a number of new names appear and dominate the rankings.
-
Storm Worm ruled the world of blogs
secure computing warns of 'storm' storm worm has begun to return to raging the blogger community and global forum since february 26. storm worm began to emerge last month and spread widely on the internet
-
Top 10 most dangerous malicious codes in February
british security firm sophos has announced the list of top 10 most dangerous malware in february. accordingly, the first position belongs to a brand new name. that name belongs to a completely new line of malicious code that could 'change the face
-
Top 10 most dangerous malicious codes in December 2006
sophos has announced the list of top 10 most malicious and distributed malware in december 2006. accordingly, even though it has just appeared, the 'happy new year' worm has knocked out two 'elder' stration and netsky.
-
Warning: The new Facebook virus, a malicious code that is spreading rapidly through Messenger
from yesterday (december 18, 2017), a new type of malicious code has appeared and raged in vietnam. this malicious code is not too sophisticated but is spreading very fast through facebook messenger because it is sent from the friends in the friend list.
-
Warning: New malicious code is infecting about 500,000 router devices
cisco researchers have released a warning warning about a malicious malicious code called vpnfilter, which is spread by a group of hackers spreading more than 500,000 home or small companies' devices across the globe. world.
-
14 games on the App Store contain malicious code, iPhone users be careful
security researchers wandera recently discovered 14 games linked to a server once used to control malware golduck that made the android world chaotic last year.
-
After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent
the 'blackmail' malicious code called petya, which appeared under the new version of petrraprap, is similar in effect to the wannacry malicious code, causing the computer system of many multinational companies to be shattered. according to the initial record, these first countries infected with
-
Malicious code is growing up
security firm mcafee warns that malicious code is currently on the way to prepare to reach a new level of complexity and professionalism. not only the malicious code and adware are now becoming a professionally distributed service
-
A series of malicious applications that collect user data, delete immediately if you are installing
security experts at mcafee have discovered a new type of malicious code that has entered the google play store through 60 different applications, called goldoson.
-
A malicious extension 'occupies' Chrome and Firefox browsers appears, preventing users from uninstalling
malwarebytes, the famous security company, has discovered a malicious extension that appears in chrome and firefox browsers. if the user installs it, it is difficult to remove.
-
10 million Android devices are preinstalled with malicious code from the factory
bad guys have compromised with the manufacturer to install malicious code on the device.
-
Detects many malicious Android applications that hide icons themselves to make it harder to uninstall
threat researchers at australia-based sophoslabs have found 15 android apps, apparently doing nothing but displaying ads on the device. these programs have product names and descriptions from qr readers to photo editors.
-
Android apps contain malicious code that uses motion sensors to avoid detection
the sad fact is that after many efforts by google to isolate the play store from malware, malicious applications somehow find new ways to deceive measures. malware prevention ...
-
Dirty SEO campaign brings a series of malicious software to the top of search
cybercriminals are using dirty seo methods to bring malicious software to the top of search.
-
Discovered a new line of malicious Android code that steals user data on the electronic application market
recently a security expert at trend micro discovered a new line of malicious code first written in kotlin, a kind of static language for android programmers.
-
How to Detect and Avoid Malicious EXE Files on Windows
cybercriminals often use malicious exe files to spread malware, ransomware, or spyware. that's why you should be able to recognize and avoid potentially harmful files to protect your device from infection.
-
Find bug in Emotet malware, prevent it from spreading for 6 months
according to researcher james quinn of the security firm binary defense, like other software, malicious code also has vulnerabilities, error codes. hackers can exploit software vulnerabilities to cause harm, security experts can also decompile the source code of malicious code to find the
-
Detects malicious code showing porn ads in children's games on Google Play
check point security company has discovered malicious code called adultswine that appears in children's games on google play.
-
Warning: Detected malicious code hidden in the graphics card's VRAM
one of the aspects that make cybercriminals dangerous lies in the initiative they take in deploying new forms of malicious attacks.
-
The list of applications containing malicious code or malicious ads should be removed from the phone
in order to avoid the risk of problems with leakage of important personal information, users should remove these applications from the smartphone.
-
Mozilla removed nearly 200 malicious Firefox add-ons in just 2 weeks
mozilla has launched a large-scale scanning campaign and removed a total of 197 malicious firefox add-ons.
-
Disable malicious HiddenTear Ransomware with HT Brute Forcer
if your system has been infected with hiddentear malicious code, don't worry because a program called ht brute forcer (developed by michael gillespie) can allow you to recover your encryption key without paying ransom.
-
Steps to protect email against malicious threats
the following ways seem to be very simple and popular, to the extent that 'everyone knows and of course', but not everyone seriously takes it to stay away from any risk of fraud or malicious code attacks.