Ransomware may be mostly thought of as a (sometimes costly) nuisance, but when it hinders the ability of doctors and nurses to help people with an emergency medical problems, that qualifies as armed robbery.
Tagged With viruses
Experts say it's not a matter of if, but when a global scale pandemic will wipe out millions of people. And we are grossly unprepared for the next major outbreak. But in the event of a devastating pandemic -- whether it be triggered by a mutated strain of an existing virus or a bioengineered terror weapon -- there are some practical things you can do, both before and during the outbreak, to increase your odds of survival.
A while back quite the kerfuffle was made over Windows 10's somewhat ambitious telemetry features. If you're still keen to keep you computer locked down -- so to speak -- you might want to make sure Microsoft's Malicious Software Removal Tool also isn't sending data back to Redmond.
Computer viruses can be extremely destructive. They can not only cripple a victim's computer, they can also extort money and even stymie a country's nuclear development. Here are five computer viruses that caused a ton of damage to their victims' machines.
In human culture and warfare, the notion of self-destructive attackers like the Kamikaze pilots deployed during World War II, is pervasive. A more recent conflict is the cyber-war between those creating malware and the security firms and cyber-security specialists that attempt to thwart them. In this battle, the recently revealed Rombertik malware is an interesting evolution.
Having recently ditched the under-performing Microsoft Security Essentials for something better (in my case, the free edition of Avira), I know the pain of trying out new software. Anti-virus programs can sometimes be stubborn about removing themselves and if you're finding the ghosts of old AV apps lingering on your system, ESET has an all-in-one removal tool that can help.
The resurgence in Office macro viruses shows no sign of slowing up. According to Sophos, attacks using Office's built-in Visual Basic for Applications (VBA) now account for more than a quarter of all document-based attacks.
Macro viruses -- utilising Visual Basic for Applications (VBA) to execute code inside Office apps like Word and Excel -- were the most visible form of malware at one point, but improved security in Office meant their prevalence has dropped dramatically in recent years. Now, however, it seems they're on the prowl again.
In 2012, malware increased by its highest margin in the past four years, with emerging threats such as mobile 'drive-by downloads', Twitter-driven botnets and an explosion in Android malware all helping to bolster malicious activity. In the following infographic, security vendor ZoneAlarm takes a look at the ways in which malware are infecting us -- most involve common computing tasks that you probably performed today.
By now you've probably heard about the Flashback, the Mac's latest virus scandal at least 10 million times, but the folks who discovered the thing just released a tool to help you detect and get rid of it really, really easily.
This week is National Cyber Security Awareness Week. Security for your computer and mobile phone is vital, but despite the ever-growing range of threats, keeping your systems safe isn't too challenging if you follow some sensible basic steps. Here's a round-up of Lifehacker's most useful security guides.
Today, Apple released a Mac OS X security update offering protection from the recently surfaced malware known as Mac Defender (and a few other similar names). It protects you by isolating files known to be associate with Mac Defender, but since the malware continues to evolve it may not protect you fully.
Most malware targets Windows machines and vulnerabilities (because there's more of them), but that doesn't mean Macs are immune from security issues, especially of the "click on this tempting site" variety. Sophos is offering a free, unrestricted version of its Mac anti-virus package for home users concerned about security issues.
Criminals who write malware generally rely on users not realising their intentions, and often go to elaborate lengths to make fake sites and software look legitimate. But there's a secondary group of users afflicted by malware: those who get told a site or application is dangerous but can't resist looking to find out just why it's dodgy.