Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

F-Secure Weblog

by Threatresearch

May 21, 2012

Earlier today, while doing our daily data mining, we came across a new variant of ZeuS 2.x. It includes a new backdoor command called: win_unlock. Very interesting, turns out this slightly modified ZeuS 2.x includes a ransomware feature.

When this particular variant is executed, it opens Internet Explorer with a specific page (lex.creativesandboxs.com/locker/lock.php) and prevents the user from doing anything else with the infected system. The webpage that was opened presumably showed some type of extortion message, but it's currently unavailable because the site is offline. The most straightforward way to unlock the system is to simply delete the trojan. This can be a bit tricky since the trojan prevents doing anything with the infected system, luckily the locking itself can be easily disabled first.

F-Secure Weblog

by Threatresearch

March 20, 2012

Variants of the SpyEye trojan target banks using a plugin called webinject.txt. We collected 1,318 samples in our back end that matched those from SpyEye Tracker's RSS Feed.

Taking a look inside, we discovered that this collection of samples contains 632 different bank domains and that commerzbank.com was the most targeted bank domain. Here's a graph of the top 40 banks targeted by SpyEye...

F-Secure Weblog

by Threatresearch

January 16, 2012

Brod, a researcher on our Threat Research team has been tasked with tracking emerging Mac based threats.

Microsoft Excel is one of the tools he uses to chart variants. From April to December 2011, there have been several dozen new Mac threats. Well, that's nothing when compared to Windows malware - but it's definitely something when compared to the number of Mac threats seen prior to 2011. Keep in mind that by "new", we're referring to unique variants, and not the raw number of unique binaries that we've seen. We prefer a more conservative approach when counting malware. The more generic and family based, the better.

F-Secure Weblog

by Threatresearch

December 28, 2011

There's a run of ZeuS (aka Zbot) trojans currently targeting several Finnish banks.

This version of ZeuS 2.x (Zbot.AVRC) has two new commands it will accept: user_activate_imodule and user_restart_imodule.

F-Secure Weblog

by Threatresearch

November 18, 2011

Analysts on our Threat Research team recently discovered OpFake, a premium rate SMS trojan that shares code with Spitmo. And this week, our automation flagged a new sample.

F-Secure Weblog

by Threatresearch

October 27, 2011

Here's the technical analysis related to yesterday's post on Trojan:SymbOS/OpFake.A.

OpFake.A arrives as a supposed Opera Mini updater using file names such as OperaUpdater.sisx and Update6.1.sisx. The malware installer adds an Opera icon to the application menu. When run, it will show a menu and a fake download progress bar.

F-Secure Weblog

by Threatinsight

April 3, 2012

Last week Kahu Security blogged about Escalating Java Attacks . Kahu's post dissects two Java exploits.

The first exploit targets CVE-2012-0507, the latest Java vulnerability that's been seen being exploited in the wild. This vulnerability was patched (for Windows) by Oracle in February 2012. I found the second exploit to be more interesting. It clearly appeared to be related to some Java CORBA vulnerability, possibly CVE-2012-0506, a Java vulnerability not yet known to be exploited in the wild. Last Friday I decided to take a closer look at this mysterious exploit.

F-Secure Weblog

by Threatinsight

March 15, 2012

WordPress.org is being targeted once again, and although this time there isn't much sneaky sophistication, the infection is still prevalent enough for Internet users to be wary.

Spam appears to be the driver of these campaigns. Various websites have already been identified to be redirecting to Blackhole exploit kit. Compromised websites would render any of the following pages upon visit...

F-Secure Weblog

by Threatinsight

January 26, 2012

Facebook is recently doing a decent job at keeping survey spam posts at bay (all things considered).

So, what's an entrepreneurial Facebook spammer to do? Well, some have tweaked their master plan, and have expanded their use of "cloud" services. Using Amazon's S3 file hosting service solves quite a few problems for these perpetrators. Number 1, Amazon's S3 web service is pretty inexpensive to set up, therefore they can still earn from the surveys. Number 2, because Facebook has been pretty successful at blocking suspicious URLs linked to spam, hosting their scam's code in a safe and popular domain such as amazonaws.com gives them a better chance to sneak through Facebook's protections.

F-Secure Weblog

by Threatinsight

January 10, 2012

Yesterday, we stumbled across this ad from an Android-related site. Clicking this led to a malicious Android Market...

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith
Carschooling
[AspSecurity] - learn and discuss Active Server Pages-related Security

Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.


Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options.
Reliable Answers.com/virus/news.asp AddThis Social Bookmark Button
Google