Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones. The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base…

read more

Computer Virus Hits U.S. Drone Fleet [Military]

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones. The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base…

read more

Android virus receiving orders from encrypted blog

Researchers from Trend Micro have spotted a piece of malicious software for Android that receives instructions from an encrypted blog, a new method of communication for mobile malware, according to the company. The malware, which can steal information from an Android phone and send it to a remote server, purports…

read more

IS&T changes to Microsoft’s virus protection program

IST changes to Microsoft’s virus protection program New software provides spyware and virus defense September 29, 2011 BY Deon Broyles Cleveland State University is changing its virus protection software from McAfee to Microsoft Forefront. The change will affect all Windows-based university computers located throughout the campus. The new software provides…

read more

Conficker Virus: Real Threat or All Hype?

The recent publication of “Worm: The First Digital World War” by Mark Bowden (“Black Hawk Down”) has renewed interest in the Conficker worm, an insidious piece of malware that can quietly take over your computer without your knowledge. There’s a lot of confusing information flying around the Internet about the…

read more

Trojan virus spreads via PC mouse

Think your computer or network can get a Trojan virus or malware only via a malicious website or an infected flash drive? Think again: even a mouse can get the job done, too. A modified mouse —and almost any hardware device that can be plugged into a computer— can potentially…

read more