You may have heard about the Conficker Worm from way back in 2008. It caused quite a scare as it was infecting a huge amount of computers, was able to spread on it’s own, and no one knew how to stop it. Well, at this point this worm isn’t as popular or thought of as much, especially as there are now patches and protections from it, however, this worm is still alive and well with an estimated 12 million computers under its control.

Read More →

With so much of our society relying on the Internet to get through the day, we can easily see how much chaos and brain-ache a virus or cyber attack can cause. For example, a cyber attack aimed at an individual can not only wreak havoc on their social and personal life, but it can also bankrupt them financially as their bank accounts can be hacked and debt piled up under their name. As for large companies, those that are attacked by cyber criminals can not only lose millions of dollars due to downtime, but they can also have their most important trade secrets stolen  and shared with their top competitors.

Read More →

In today’s day and age, cars are no longer merely the mode of transportation they were 50 years ago. Instead, they’ve become Internet-connected entertainment machines as well as complex computers. And like other complex computers, they are vulnerable to viruses and malware. But the surprising twist on this automobile virus vulneravility is the delivery method developed for this malware: simple .mp3 files; meaning, all it takes to gain complete control over a car is an audio CD.

Read More →
In the past we’ve written a lot about PDF exploits (when a hacker or scammer sends you an e-mail with a PDF file attached and some compelling reason for opening the file). By now most people know that these are really viruses, especially when the e-mail comes from someone you don’t know or the file is there without good reason.
Read More →

A new type of malware has recently been discovered that not only gains access to your files, but also take access away from you. Known as “ransomware,” this virus works by taking control and encrypting your files with a 1024-bit encryption, a level of encryption that is nearly impossible to open unless you have the right key. And the only way to get this key is to pay the hackers a ransom.

Read More →

The most recent virus to hit corporate America is that “Here You Have” virus. It has been reported within the last few hours and is going around by e-mail. It comes with the subject line called “Here You Have,” so e-mail users beware.

If opened, the e-mail contains either a PDF file or a link that when opened will launch a windows script infecting your computer with malware and spreading itself to everyone else on your contact book.

As of right now,  the virus has already been sighted at ABC/Disney, Google, Coca Cola and NASA. Comcast was apparently forced to shut down its e-mail severs entirely after being hit with the virus.

If you have already accidentally opened the virus, make sure that your anti-virus or anti-malware software is up to date and run a full system scan.

(Via The Wrap)

Read More →

phone_money

As phones become “smarter” and let you do so much more than just make phone calls, hackers are seeing a new platform to target. One method that they are using is to hide malware in games such as 3D Anti-Terrorist and PDA Poker Art. Once installed onto your phone, the malware will secretly dial premium numbers in other countries and charge the victim’s bill for every call.

Read More →

mcafee-logoWhat started out as a regular day in Iowa ended up turning into a real wake up call for the community. Every so often, disaster exercises are scheduled to  see how everyone in a community will respond and how all the organizations (such as local government, county government, city government, hospitals, school district and businesses) will deal with an emergency in the case that it really did happen. This type of exercise is common as is carried out several times a year.

Read More →