"It seems that if a virus writer is going to bother writing a hack for a mobile, they are only going to do it for Andriod. A new report from security outfit F-Secure said that virus writers are ignoring the chance to download a complete Coldplay collection from Apple phones and are instead writing code for Android... More than 99 per cent of viruses are being written for Android with only two new ones written for the iPhone or Symbian this year. To be fair, we are not taking about a big threat to mobiles. F-Secure detected just 277 new threat families, of which 275 honed in on Android.
"A vulnerability in many Linksys routers, allowing for unauthenticated code execution, is being used to mass-exploit various Linksys routers right now. Infected routers will start scanning for vulnerable systems themselves, leading to a very fast spread of this 'worm.'"
"Security researchers have detected a new malware campaign that attempts to infect Skype users by sending them booby-trapped links from contacts in their address book.
"Microsoft is telling Windows users that they'll have to reinstall the operating system if they get infected with a new rootkit that hides in the machine's boot sector.
A new variant of a Trojan Microsoft calls "Popureb" digs so deeply into the system that the only way to eradicate it is to return Windows to its out-of-the-box configuration, Chun Feng, an engineer with the Microsoft Malware Protection Center (MMPC), said last week on the group's blog.
"The next time a website says to download new software to view a movie or fix a problem, think twice. There's a pretty good chance that the program is malicious.
In fact, about one out of every 14 programs downloaded by Windows users turns out to be malicious, Microsoft said Tuesday. And even though Microsoft has a feature in its Internet Explorer browser designed to steer users away from unknown and potentially untrustworthy software, about 5 percent of users ignore the warnings and download malicious Trojan horse programs anyway."
"The idea is that ISPs could detect signs -- say, by intercepting outbound spam, or botnet command-and-control traffic -- and cut the infected customer off from the internet. The user would be placed in a walled garden, where a web browser would only be able to see certain pages, which give instructions on how to fix the problem.
Copyright 2013 © Godem Online Inc. | Web and server solutions by NewTech Solutions.