A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones. The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base…
Computer Virus Hits U.S. Drone Fleet [Military]
A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones. The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base…
Android virus receiving orders from encrypted blog
Researchers from Trend Micro have spotted a piece of malicious software for Android that receives instructions from an encrypted blog, a new method of communication for mobile malware, according to the company. The malware, which can steal information from an Android phone and send it to a remote server, purports…
IS&T changes to Microsoft’s virus protection program
IST changes to Microsoft’s virus protection program New software provides spyware and virus defense September 29, 2011 BY Deon Broyles Cleveland State University is changing its virus protection software from McAfee to Microsoft Forefront. The change will affect all Windows-based university computers located throughout the campus. The new software provides…
Virus removal site serves malware instead
Instead of removing viruses as it claims to do, a United Kingdom-based virus removal site has been compromised and is now doing the opposite: serving malware. View full post on firefox hacker – Yahoo! News Search Results View full post on National Cyber Security
Idaho laboratory analyzed Stuxnet computer virus (Reuters)
Reuters – Behind the doors of a nondescript red brick and gray building of the Idaho National Laboratory is the malware laboratory where government cyber experts analyzed the Stuxnet computer virus. View full post on Yahoo! News: Security News View full post on National Cyber Security
Conficker Virus: Real Threat or All Hype?
The recent publication of “Worm: The First Digital World War” by Mark Bowden (“Black Hawk Down”) has renewed interest in the Conficker worm, an insidious piece of malware that can quietly take over your computer without your knowledge. There’s a lot of confusing information flying around the Internet about the…
Google Virus This Quarter’s Most Frequently Requested Virus Removal
My Computer Expert announces most requested virus removals for summer 2011. Palm Springs, CA (PRWEB) September 26, 2011 The google virus was this quarter’s most frequently requested virus removal as announced by leading remote computer repair company My Computer Expert. The virus also commonly called the google redirect virus is…
Just because your company’s spam filter, virus filter and other defenses let an email through, doesn’t mean it’s harmless
View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime
Trojan virus spreads via PC mouse
Think your computer or network can get a Trojan virus or malware only via a malicious website or an infected flash drive? Think again: even a mouse can get the job done, too. A modified mouse —and almost any hardware device that can be plugged into a computer— can potentially…