facebook3Facebook users have something new to fear, a virus known as Bredolab, is rapidly spreading through the popular social network. The virus masks itself as a “Password Reset Confirmation Email” and appears to come from Facebook. This deceiving email includes an attachment that supposedly contains a new password for the user.

Read More →

worm_chomping_on_computer_hg_whtRecently, some of the best security minds in the world have started joining forces to fight an evil called the Conficker Worm. The Conficker Worm is a computer virus that targets a flaw in Microsoft’s operating system and then spreads rapidly through other computers connected to the same network.

To date the Conficker virus has infected at least 5 million computers. After the virus infects the computers, the hacker can control the computer systems and transform the systems in to a “botnet army.” The botnet army can be used to syphon banking information or to flood government servers knocking them off line. In July, Conficker knocked out parts of Manchester City Council’s IT system costing the council ¬£1.5 million in total. Similarly in January, the French Navy had to quarantine its computer network after it was infected with Conficker. This forced aircrafts at several air bases to stay grounded.

Read More →

snow-leopard1Mac users are all in a buzz about the latest Mac operating system release, Snow Leopard. However there are already growing compatibility and security concerns. According to Trend Micro, one of their researchers have discovered several websites advertising free versions of the new Mac operating system that actually download malware viruses into the users computer. Specifically the virus is a DNS changing Trojan called OSX_JAHLAV.K. According to Trend Micro, the virus¬† may also be downloaded without the user’s knowledge following a visit to a malicious Web site.

Trend Micro’s Bernadette Irinco stated,”Once executed, OSX_JAHLAV.K decrypts codes, which include a script that downloads other malicious scripts…the said script then alters the DNS configuration and includes two additional IP addresses in its DNS server. Users are thus possibly redirected to phishing sites and other fraudulent sites. In fact, some of these bogus sites are reportedly hosting FAKEAV (rogue antivirus) variants and components.”

Read More →