code

Tue
07
Nov
John Lister's picture

Bogus 'WhatsApp' Chat Client Downloaded 1 Million Times

Scammers used a computer code loophole to trick more than a million people into downloading a rogue Android app. The fake variant of WhatsApp appears to have been designed to distribute ads. The bogus app took advantage of the popularity of the ... genuine WhatsApp Messenger, which has been downloaded more than 60 million times on Google Play alone. It's a tool for exchanging messages with friends or groups over the Internet rather than eating into SMS text message allowances. Extra Space Went Unseen "Update What's App Messenger" was one of numerous bogus apps that tried to mislead users with ... (view more)

Tue
13
Jun
John Lister's picture

Malware Threatens Power Grids

Russian-backed hackers appear to have the ability to remotely shut down power stations, researchers claim. However, the cyber weapon appears to only have been successfully deployed once so far. Two companies, Dragos Inc and ESET, have revealed their ... analysis of malware that was used in an attack on a transmission station in Kiev, the Ukrainian capital, last December. The outage lasted for an hour and blacked out buildings that normally use 20 percent of the city's electricity. (Source: washingtonpost.com ) Malware Easily Customized The researchers say the malware, which they've dubbed ... (view more)

Wed
12
Apr
John Lister's picture

Researchers: Phone Tilt Could Reveal PIN

Motion sensors in smartphones could give away your lock code to hackers according to new research. But practical limitations mean related attacks might have to be specifically targeted. Researchers at Newcastle University explored the idea that ... tools such as accelerometers, gyroscopes, compasses and GPS chips in phones could reveal more detail than users realize. The tools are used for a variety of functions such as location tracking, fitness tracking and gesture control such as a user turning a phone face down to instantly switch it to "do not disturb" mode. Their theory was that ... (view more)

Tue
09
Jun
John Lister's picture

New Cloud-Based Antivirus Strategy Unveiled

A new security firm says it has come up with a way to stop malicious software before it reaches a user's computer. The "Isolation Platform" will initially be offered to business users, but remains to be seen how practical the solution is. According ... to makers Menlo, the main problem with most security tools are that they are based around the idea of examining programming code on a user's computer, and trying to determine if the code is malicious. Only if everything appears to be OK is a program allowed to run on the computer. Menlo says that's flawed because malware ... (view more)

Fri
01
Aug
Brandon Dimmel's picture

'FocusWriter 1.5.2', and 'SynWrite 6.6.1225'

FocusWriter 1.5.2 This unique word processing tool limits distractions by expanding to include the entire display. You can access the hideaway interface by moving the cursor to the edges of your screen. This tool is compatible with Linux, Mac OS X, ... and Windows. http://gottcode.org/ SynWrite 6.6.1225 SynWrite is a completely free and open source code editor, making it a great tool for people who write, edit, code, and design content for the Internet. Special tools found inside include macro recorder, code highlighter, and expressions. http://www.uvviewsoft.com/ (view more)

Thu
17
Oct
Dennis Faas's picture

D-Link Routers Vulnerable to 'Backdoor' Exploit

Up to ten different router models, including some by popular manufacturer D-Link, are now vulnerable to hackers. It appears the code that runs the devices contains a master password that anyone could find and use. The problem was discovered by ... security researcher Craig Heffner, who admitted he had nothing more exciting to do on a Saturday than nose through code accompanying a recent firmware update for his D-Link DIR-100 router. Like most routers, the settings menu for the D-100 router is accessible through a web browser -- the idea being that the user can access the router through one of ... (view more)

Wed
11
Sep
Dennis Faas's picture

Patch Tuesday: Microsoft Fixes Serious Outlook Flaw

Another monthly Patch Tuesday security update has arrived and this time Microsoft is providing fixes for 'critical' flaws in its Internet Explorer web browser and its Outlook email manager. In total, Microsoft's Patch Tuesday offering includes 13 ... bulletins, four of which have been marked critical -- Microsoft's highest security rating. Many security experts are pointing to the critical bulletin affecting Outlook as the most important security issue this month. Code Execution Flaw Affects Outlook Wolfgang Kandek, chief technology officer at IT security firm Qualys, says it's imperative that ... (view more)

Thu
24
Jan
Dennis Faas's picture

'Red October' Virus Revives via Malicious Email

Security researchers have uncovered a complex virus capable of reappearing even after it is thought to have been removed from a computer system. This so-called 'Red October' virus reportedly attaches itself to Adobe Reader and Microsoft Office ... software. The virus is named after the Tom Clancy novel about a Soviet submarine crew trying to defect. It's an appropriate moniker because the majority of computers infected by the virus are located in Russia and Eastern Europe (though there are victims in at least 37 other countries). The infections mostly affect computers used by government ... (view more)

Fri
07
Sep
Dennis Faas's picture

BitFloor Faces Disaster, Hackers Pull Huge Heist

Bitcoin currency exchange BitFloor is in big trouble after a security blunder resulted in the theft of $250,000. The heist at the BitFloor "exchange" came after operators did the online equivalent of leaving the keys in the door. Bitcoin is a ... virtual currency that isn't controlled by a government and therefore isn't subject to any seizure of funds. With no government backing, Bitcoin has value only so long as enough people agree to use it. Unlike most currencies, Bitcoin exists only online, with no physical currency (like coins or bills). Each Bitcoin exists solely as a unique identification ... (view more)

Tue
12
Jun
Dennis Faas's picture

Flame Hackers Kill Own Malware with Suicide Module

The creators of the Flame virus now appear to be attempting to remove it from the computers it has infected. This bizarre move from hackers, who normally seek to increase rather than decrease the number of machines their code infects, may be part of ... a belated attempt to prevent further analysis of how Flame works. The existence of Flame was announced late last month by security firm Kaspersky Lab. At the time, Kaspersky noted the virus was exceptionally sophisticated and had been designed specifically to harvest data using tactics as diverse as taking screenshots and eavesdropping on phone ... (view more)

Pages

Subscribe to RSS - code