|Posted by Kenny Clemons on December 28, 2012 at 6:30 PM||comments (0)|
The Internet Crime Complaint Center (IC3) is the result of a partnership between the FBI and the National White Collar Crime Center. Designed to give cybercrime victims an easy way to report crimes, they also assist law enforcement in obtaining evidence to prosecute culprits. The IC3 first began receiving complaints about Reveton Ransomware in 2011. They issued a warning about it on their website in May 2012 (www.ic3.gov/media/2012/120809.aspx). Today, the IC3 receives dozens of complains eac...Read Full Post »
|Posted by Kenny Clemons on September 22, 2012 at 10:10 PM||comments (1)|
September 6, 2012
By Attorney General
A new “drive-by” Internet virus carrying a fake message and claiming to impose a so-called fine from the Federal Bureau of Investigation (FBI) may be targeting email addresses owned by Connecticut residents, Attorney General George Jepsen and state Department of Consumer Protection Commissioner William Rubenstein warned today.
The virus is designed to extort money from its victims. An email purportedly from th...Read Full Post »
|Posted by Kenny Clemons on August 10, 2011 at 11:55 AM||comments (1)|
Written By Robert McMillan, IDG News Service
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners.
Don Bailey and fellow iSec researcher Mathew Solnik say they've figured out the protocols that some of these software makers use to remote control the cars, and they've produced a video showing how they can unlock a car and...
|Posted by Kenny Clemons on August 6, 2011 at 4:40 PM||comments (0)|
Why do hackers hack? Why create a worm that sends out an email to everyone in your contact list, or a Trojan that deletes your term papers? Is it mischief, malice, money, or something else entirely?
This is the question that was on my mind when I met with Mikko Hypponen, a legendary computer security heavyweight who has been hunting viruses for 25 years—since Brain.a, the first PC computer virus.
From the plaza, I walked out to a seat by the water facing the San Francisco Ba...Read Full Post »
|Posted by Kenny Clemons on October 3, 2010 at 2:59 AM||comments (1)|
The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.
Read Full Post »
|Posted by Kenny Clemons on April 9, 2010 at 11:37 AM||comments (0)|
Win32 Trojan is a generic name for a specific type of malware, which infects Windows operating systems.
Technically this form of malware is not as many people believe a virus. A Win32 Trojan by definition does not replicate like a virus or worm, rather it creates a backdoor into the infected system.
This backdoor allows a hacker access to the system remotely. Via this access the hacker can perform a variety of functions some of which may include the follo...Read Full Post »
|Posted by Kenny Clemons on April 7, 2010 at 5:34 PM||comments (1)|
XP Anti Virus is a rogue antivirus software that, when runs, display false results as a tactic to scare you into purchasing the software. When XPAntivirus is first installed it will create 9 entries in your Windows Registry that impersonate infections on your machine. In reality, though, these registry entries are harmless and have absolutely no effect on your computer. Instead, these entries are set so that XP AntiVirus can find them when scanning your computer and report them as infections....Read Full Post »
|Posted by Kenny Clemons on April 7, 2010 at 10:52 AM||comments (1)|
A rash of home foreclosures and abandoned dwellings had already taken its toll on the tax revenue for the Village of Summit, a town of 10,000 just outside Chicago. Then, in March, computer crooks broke into the town’s online bank account, making off with nearly $100,000.
"As little as we are, $100,000 represents a good chunk of money, and it hurts,” said Judy Rivera, the town’s administrator. “We were already on a very lean budget, becau...Read Full Post »