From The Blog
-
Minecraft Mods stuffed with Malware Used to Target Windows and Linux
Written by Sean KalinichAs we hear more about Supply Chain attacks and the need for Software Build of Materials we are now hearing of an attack on the…Written on Wednesday, 07 June 2023 15:24 in News Read 238 times Read more...
-
Sextortionists Get a Boost from AI and Publicly Available Images
Written by Sean KalinichAs if the internet needed something else bad floating around it seems that groups that engage in extortion schemes involving the threat of releasing images…Written on Wednesday, 07 June 2023 14:24 in News Read 205 times Read more...
-
New PowerShell Malware Dubbed PowerDrop used to Target US Aerospace Industry
Written by Sean KalinichIt is Wednesday, so it is about time to talk about a new strain of malware. In this case one that leverages Microsoft’s PowerShell to…Written on Wednesday, 07 June 2023 13:31 in News Read 165 times Read more...
-
More Ransomware as a Service Fun as Cyclops Gang Now Offers Value Add Information Stealer
Written by Sean KalinichAnyone that does not think that cybercrime is now a bug business has been living under a rock. The news related to different cybercrime-as-a-service groups,…Written on Tuesday, 06 June 2023 15:08 in News Read 442 times Read more...
-
Why SBOM is in the News and Why it is Important
Written by Sean KalinichSince Executive Order 14028 came out on May 12th from the Biden Administration there has been a lot of talk about what it means and…Written on Tuesday, 06 June 2023 11:43 in Security Talk Read 93 times Read more...
-
Attackers Drop Card Stealing Scripts into Legitimate eCommerce Sites
Written by Sean KalinichSo, there you are, you have found the one thing in all the internet that will make your object drive life complete. You put the…Written on Monday, 05 June 2023 15:10 in News Read 843 times Read more...
-
MOVEit Transfer Zero Day gets added to the KEV and a Cool New Web Shell
Written by Sean KalinichSpring, the time of renewal, the time when nature wakes up. It is also a time when Zero-Day flaws hit the web. This year has…Written on Monday, 05 June 2023 11:12 in News Read 286 times Read more...
-
Google’s Verification Feature in Gmail already Abused by Scammers and Phishers
Written by Sean KalinichThe news that a feature in Gmail that shows a verification check mark for a sender is being abused by attackers should come as a…Written on Monday, 05 June 2023 10:20 in News Read 406 times Read more...
-
New APT Group targeting iOS Users with Zero-Click Malware, US gets the Blame
Written by Sean KalinichThere is a new bit of malware targeting iOS users via iMessage from what appears to be a new APT (Advanced Persistent Threat) group. The…Written on Friday, 02 June 2023 14:46 in News Read 391 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115117 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 84232 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 78429 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 77788 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 67371 times Read more...
Displaying items by tag: Malware
Malware Using Android "Master Key" Flaw Found In the Wild
![]() |
Remember how everyone was up in arms over the existence of a “Master Key” bug that existed in all versions of the Android operating system? Well it looks like someone has found a way to use the flaw to their advantage. Symantec has found two apps (available in China) that use the Master Key flaw to spread a new form of malware. To give a little background the original flaw was publicly disclosed by Bluebox security on the 3rd of July 2013. It was reported to Google in February 2013. The flaw allows a malicious individual (or group) to alter an application without affecting the apps cryptographic signature. This means that the app looks exactly like a legitimate app bypassing the security at the app store and the phone level.
Turkish Security Researcher Says Apple Breach Came After Apple Ignored Multiple Bug Reports
![]() |
Yesterday we reported on a breach in Apple’s developer portal. This breach appears to have happened over the course of about three days and resulted in Apple pulling the entire system offline for redesign. At the time of the article (which can be found here) no one had claimed responsibility Apple had not pointed the finger at anyone. Now it seems that a Turkish security researcher is claiming responsibility for the hack, but is saying that he was only looking for bugs in the system to show Apple that the portal was leaking user data.
Google Glass Hit By QRC Malware, or Monkey See, Monkey Do.
![]() |
As with many technologies there is a blind spot during the initial design and testing phase that happens. With SCADA devices this was the possibility that anyone would put them on the internet. These control devices were not built to be exposed like this and because the people that were using them did not follow best practices for protecting them we all know just how vulnerable our core infrastructure is. Even with devices like pacemakers that can be tuned using WiFi there was the failure of imagination that left them open to… well any one to connect to them. This failure of imagination seems to exist in almost any product as the designer continue to say, “no one will think of that”. Today we are seeing this happening to Google and their Google Glass project. It looks like they never thought someone would use QR Codes to infect the device.
Zeus Resurfaces on Facebook, Looks to Drain Your Bank Account
![]() |
There are sharks in the waters of the social networking seas. Of course this is not news to anyone that can read or that has paid any attention to malware trends over the last few years. The sharks have hunters in the form of security companies. However as we all know security companies can miss things and are never ahead of the bad guys. This is the case as a piece of malware once thought safely covered has now resurfaced this is the Zeus Trojan and it is back swimming in the waters of Facebook and other social networks looking for victims.
Apple iOS Devices Can Be Infected By USB While the DoJ Shows Apple Knew What It Was Doing With Price Fixing
![]() |
For those of you out there that might be laboring under the illusion that Apple products are safe and secure we have some bad news for you. Someone has developed a method of poisoning iPhones, iPads, iPods, well basically anything running iOS, through the use of their charging systems. This means that someone could sell you a compromised charger and take over your phone. This type of attack is hardware based and is almost impossible to get rid of; simply resetting the phone is not going to do it. This is also not the first time that someone has used Apple hardware to create a persistent infection. Not all that long ago someone showed how easy it was to infect the batteries on the MacBook and MacBook Pro. Even the Apple Bluetooth keyboard has been used to slip malware into Apple products.
Facebook Fan Page Verification scam
![]() |
Security experts from Hoax-Slayer posted a warning to Facebook Page owners about e-mails that they receive from the "Facebook Security", in which they were informed of the new system for the protection of sites called "Fan Page Verification Program."
ESEA Admits to Installing Bitcoin Mining Software on Users’ Computers
![]() |
How would you feel if one day you noticed that your GPU was going crazy even when your computer was sitting idle? We imagine that you would start scanning your system for viruses after an initial reboot. Now on top of that imagine how you would feel if your anti-malware scans started pointing fingers at the client software of an online service you typically trust. This is exactly what members of competitive e-sports group ESEA E-Sports Entertainment Association found after a recent update to their client software.
Corporate Developed Spyware Being Masked as FireFox Files; Mozilla is Not Amused
![]() |
Malware, spyware, viruses these are all things that are part of the modern computing experience. When you are online you always have to be aware of the dangers of these items. Over the years the developers of malware have become more and more clever at disguising their wares from users and anti-malware programs. This is something that you would expect of this group as in many cases they are looking to gather money, information or pull your system into their botnets (which can also equal money). However what you would not expect is for a legitimate company to use the same tactics to build their own spyware to assist governments and law enforcement.
BadNews malware on Google Play
![]() |
According to security firm Lookout, recently there was 32 apps on Google Play that contained malicious software called BadNews. Applications were from 4 different developer accounts, and were downloaded between 2 and 9 million times. Lookout immediately warned Google, which has suspended the accounts and disabled download of suspicious applications.
Microsoft Screws Up Security Fix While Bing Takes You to More Malicious Sites...
![]() |
At times it seems that the words Microsoft and Malware go hand-in-hand. I do not think that a day goes by that we do not hear about a new malware threat (often simply an old threat that has been modified). This has put Microsoft in an interesting position. They are always working to shore up holes in their operating systems we can see this by the continuous patches and hotfixes that are in existence for Windows (all versions). Of course it is not an easy task to develop an OS that is safe(er) or secure(ish) and still make it easy to operate. However recently we have seen Microsoft go to some extremes in trying to keep up with things… sometimes they appear to go way too far.