By Roger A. Grimes Redirected Net searches, unexpected installs, rogue mouse pointers: Here’s what to do when you’ve been 0wned In today’s threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can […]
Reblogged from MakeUseOf. Article by James Bruce. We all have things we’d rather not tell the world about — whether that be a flagrant disregard for copyright law, a penchant for specialist videos, or a desire to simply stay out of Big Brother’s ever-probing eye. Whatever the reason, I think it’s about time we clear […]
Apple says a “small number” of computers on its Cupertino campus were attacked by hackers, according to a series of tweets from Reuters. The hack appears to exploit the same Java vulnerability that recently compromised computers at Facebook. “There is no evidence that any data left Apple,” the company reportedly said.
Below is a listing of basic troubleshooting steps for operating systems, software programs, and computer hardware. While solving computer problems can often be complex, more often than not, some basic troubleshooting will help you quickly fix the more common problems, which are often the simplest ones. Here are a few listed steps you should go […]
Newsday, a Long Island, New York based newspaper and News 12 New York, a Long Island cable news station were targeted by hackers on Thursday. Users of Chrome and Firefox who went to Newsday, including yours truly, were notified with the message below that the site was blocked because it contained malware. Newsday and News […]
Mozilla engineers plan to disable Java, Adobe Reader, and Microsoft Silverlight capabilities in their flagship Firefox browser in a move aimed at improving security and performance.
As Adam Martin noted in a blog post last week, there is an increase in a form of malware called “Ransomware”. The malware basically locks your computer on a screen with a FBI logo and basically asks you to pay a fee/ransom to unlock your computer. Here is WLTX’s feature story last night on Ransomware.
Today we saw a computer with Ransomware. It is likely that it was installed through the recent JAVA exploit. Ransomware is malware installed through a Trojan virus that takes control of your computer. All the user has to do is visit an infected website that takes advantage of the JAVA exploit. It’s important to keep […]
Late Friday afternoon, it was announced that there was a new malware Trojan that exploited a vulnerability in Java through version 7.10. The flaw potentially allows hackers to break into users’ computers via their web browsers from hacked web sites and install malware. Java came out with a new update, 7.11, over the weekend to […]