Trojans—they’re not just for hackers anymore. German police, for instance, love them; a scandal erupted in Parliament last year after federal investigators were found to be using custom spyware that could potentially record far more information than allowed by law. The story made headlines, but it lacked a certain sense…
Microsoft Uses Android Malware Hysteria to Offer Free Windows Phones
Microsoft is capitalizing on a recent Android malware scam by giving away free Windows Phones to five Android users with the worst malware horror stories. Ben Rudolph, Microsoft’s Windows Phone evangelist, announced the contest on Twitter using the hashtag #droidrage. Microsoft followed Rudolph’s lead and publicized the contest on its…
Double whammy: New Mac Trojan spies on user, uses GPU
A new malware targeting computers running Apple’s Mac OS X system packs a double whammy: it spies on the user, and uses the computer’s graphics processing unit to mine for Bitcoins. Computer security firm Sophos said the malware — aptly dubbed DevilRobber (a.k.a. OSX/Miner-D) — comes with copies of an…
Government uses secret order to pry open WikiLeaks email
The Feds have obtained access to WikiLeaks volunteer Jacob Appelbaum’s email accounts with the help of a law that lets them go after email and cellphones without a search warrant. View full post on Naked Security – Sophos View full post on National Cyber Security
New Android malware uses blog platform to communicate with cybercriminals
Trend Micro Inc. has uncovered a new Android malware variant that uses a blog site with encrypted content as its command-and-control server and disguises itself as an e-book reader app. <img alt="New Android malware uses blog platform to communicate with cybercriminals, Blog, malware, Android, Blog, uses, Cybercriminals, Platform, communicate"height="0" width="0"…
Android malware uses blog posts as command post
Now, even seemingly innocent blog sites are being used for malware attacks targeting devices running Google’s Android operating system, a computer security firm warned. Trend Micro said one such new malware it recently detected uses a blog site with encrypted content as a command-and-control post. “From our analysis, we found…
Video: Officer uses pepper spray during NY protest
By PoliceOne Staff NEW YORK — A video has emerged that shows an officer use pepper spray on a woman as police tried to control a crowd of demonstrators in New York on Saturday. Four women are seen standing behind netting used for crowd control — part of police response…
Mac malware uses Windows-style PDF camouflage ruse
Mac malware creators are adopting Windows malware camouflage trickery in a bid to trick users into running their malicious creations. Boobytrapped PDF files have long been a problem for Windows users. The OSX/Revir-B Trojan reapplies this approach towards Mac fans, who may be less familiar with the ruse. The malware…
S.C. Man Uses Illegal Taser at Cowboys-Jets Game
Sports Published September 13, 2011 | Associated Press Print Email Share Comments Recommend Tweet EAST RUTHERFORD, N.J. – A South Carolina man was arrested after allegedly using an illegal Taser in a fight with other fans during the Dallas Cowboys-New York Jets game Sunday night, state police said. Leroy McKelvey…
Fan uses illegal Taser at Cowboys-Jets game
A South Carolina man was arrested after allegedly using an illegal Taser in a fight with other fans during the Dallas Cowboys-New York Jets game Sunday night, state police said. Leroy McKelvey of Moncks Corner, S.C., was charged with three counts of aggravated assault and two weapons counts. The 59-year-old…