computers

Wed
29
Jan
John Lister's picture

Malware Botnet Mysteriously Hijacked

A malicious network of 500,000 computers used to spread malware around the globe has been taken over by do-gooders in an apparent hijack meant to foil cyber criminals. Victims of the botnet have not only found the stealth malware removed from their ... system, but are also receiving an on screen warning to update their computers. It appears the malware creators are themselves the victim of a hack attack by an online vigilante. Phorpiex Botnet a Decade Old, 500k Strong The malware concerned is distributed through the Phorpiex botnet, which has been operating for nearly 10 years. A botnet is a ... (view more)

Thu
09
Jan
John Lister's picture

Cyber Attack Fears Rise Over Iran Conflict

Cyber analysts warn Iran may further target the US with cyber attacks as tensions rise in the Middle East. While one federal website has already been compromised for propaganda purposes, the real danger may be to infrastructure, with businesses and ... home users caught in the crossfire. The most eye-catching attack this week involved the website of the Federal Depository Library Program, which was altered to show and Iranian flag and an unflattering picture of the President. However, this doesn't appear to be a particularly sophisticated breach and may well have been the work of amateur hackers ... (view more)

Wed
27
Nov
John Lister's picture

Buggy SSD Hard Drives Could Self-Destruct in 3 Years

A hard drive manufacturer has warned its solid state drives could effectively self-destruct after a little less than four years of total operation. HPE (Hewlett Packard Enterprise) says users need to apply a firmware fix immediately, while it's ... another reminder of the importance of backups. 20 different HPE models are affected, all in the SAS range, which are hard drives typically meant for enterprise. All are solid state drives, which have no moving parts. This makes them more expensive and much faster than traditional hard drives. (Source: hpe.com ) The problem isn't with the actual drives ... (view more)

Tue
19
Feb
John Lister's picture

Windows 7 Users: Get this Critical Update (due March)

Microsoft has warned an update coming next month is absolutely critical for users running Windows 7. Without it, computers won't be able to use any future Windows security and feature updates, leaving users extremely vulnerable to malware infections ... (or worse). It's all to do with a change in the way Microsoft delivers security updates in a secure manner. Whenever Microsoft releases an update, it comes with a digital signature to prove that it came from Microsoft's servers and that the code it contains has not been tampered with. You can think of these security measures much the same way when ... (view more)

Tue
15
May
John Lister's picture

Google Drone Military Involvement Sparks Resignations

Around a dozen Google employees have resigned over the company developing artificial intelligence for use with military drones. An internal petition against the work has reportedly been signed by 4,000 employees. The protest is over Google's ... involvement in Project Maven, a program the US Department of Defense is developing to make better use of its aerial drones. It is said to collect so much video footage from its drones in war zones and other areas where the US has a military presence that it's not viable to have humans analyze all the material. The idea of Project Maven is to use computers ... (view more)

Tue
03
Apr
John Lister's picture

Google Cracks Down On Cryptomining Scams

Google is banning Chrome browser tools that harness a computer's power to 'mine' virtual online currencies for a third party. It seems Google gave up trying to distinguish between different levels of legitimacy in such set-ups. The whole concept of ... "cryptomining" using a web browser may seem baffling to many users. In the simplest terms, the cryptomining program could automatically load when visiting a particular web page or would always remain active (if it was through a browser extension). The users' computer would then "mine" (using mathematical equations) until a ... (view more)

Wed
21
Feb
John Lister's picture

Microsoft Details Anti-Malware Cloud-Based System

Microsoft says it used artificial intelligence to not only spot and identify and attempted malware attack, but to block it more than a thousand times in the next half hour. It says the defense was possible thanks to Windows Defender being used ... locally on the victim's computer, as well analyzing the snippet of code using cloud-based antimalware. The company calls it an example of machine learning. This means computers are able to figure things out for themselves, rather than simply following 'true or false' routines that are part of a program. Similar to antivirus, the most basic level of anti ... (view more)

Thu
15
Feb
John Lister's picture

Thousands of Sites Hit By 'Cryptojacking' Scam

Visitors to more than 5,000 websites had their computers hijacked to earn money for scammers. But the attack would have earned them less than $25 - and they aren't getting paid anyway. The attack involved compromising screen reader software called ... BrowseAloud. Websites can add the software to their site to make it easier for visitors with vision problems to browse the pages. Because the software is so widely used, compromising it was an effective way to reach a large number of computers - regardless of whether the owners needed to use a screen reader. The software is particularly popular ... (view more)

Thu
11
Jan
John Lister's picture

Intel and IBM Demo Quantum Computer at CES 2018

Intel and IBM are battling to show off some of the most advanced 'quantum computers' ever made. It's a big step towards incredibly powerful computers that could even replicate the workings of a human brain. A quantum computer takes advantage of one ... of the most curious aspects of physics: that tiny particles can exist in two different states at the same time. This essentially allows a complete rewrite of the mathematics behind computing. Ordinary computers work by turning data into binary code: a string of 0s and 1s. In traditional computers, that involves a series of electronic 'gates' that ... (view more)

Wed
23
Aug
John Lister's picture

New Malware uses PC Power to Make Cash

Hackers could use your computer to literally make money. That's thanks to an unusual malware attack that doesn't involve any files, making it harder to detect. The "Coinminer malware" takes advantage of a Windows and browser bug nicknamed Eternal ... Blue. That's the same bug that was exploited in several high-profile ransomware attacks recently . While Microsoft has issued updates, it seems some users haven't installed the security patches. Malware Runs Inside Memory One big problem with the Coinminer malware is that it works in the computer's memory, rather than as ... (view more)

Pages

Subscribe to RSS - computers