Microsoft’s Bing shows five times more malware than Google

Between Google and Microsoft’s Bing search engine, Google has always reigned supreme as the most popular choice, and it’s a good thing too, since a recent study found that Bing returned around five times more malware in search results than Google, meaning that Bing highlighted websites that contained malicious code of some kind.

bing

German independent testing lab AV-Test conducted an 18-month study, and gathered up 40 million website provided by seven different search engines. 10 million websites came from Google and Bing each, with 13 million coming from Russian search engine Yandex, and the rest coming from Blekko, Faroo, Teoma, and Baidu.

Surprisingly, though, out of the 40 million sites, AV-Test only found 5,000 websites that were riddled with malware. Yandex had the most percentage of malware websites in its search results, while Bing returned 1,285 malicious results out of its 10 million websites. However, Google only returned a mere 272 malicious results — a lot less than Bing.

Of course, the chances of coming across a malware-infested website in either Google or Bing is slim to none, so whether or not you use Bing or Google, it’s always important to remember to know what you’re clicking on and make sure it’s not a website that’s infested with malicious code. Web browsers will usually warn you if you come across such a website, but it’s always good to have a little common sense anyway.

[via PC Mag]


Microsoft’s Bing shows five times more malware than Google is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Bing Serves Up Five Times More Malicious Sites Than Google

Not all search engines are created equal—and when it comes to Microsoft’s Bing, it seems that means malicious websites are happily returned far more often than by Google. More »

South Korea Blames North For TV Stations, Banks Cyberattacks

South Korea Blames North For TV Stations, Banks Cyberattacks

A few weeks ago, we reported on three South Korean television broadcasters and two banks becoming victims of a widespread malware attack, which resulted in serious network outages. The attack was perpetrated by “Whois Team,” which according to South Korea’s internet security agency was carried out by North Korea.

The attack was carried out by six computers located in North Korea accessing computer servers in South Korea, which used over a thousand different oversea IP addresses. The results of the attack wiped out the hard drives of over 30,000 PCs in the affected TV stations and banks and was being planned for up to eight months prior to when the attacks were carried out. (more…)

By Ubergizmo. Related articles: Adobe Launching Primetime To Tackle TV Everywhere, ‘North Korea Has Launched A Missile’ Accidentally Tweeted By Japanese City,

    

Skype trojan turns your computer into a Bitcoin miner

There is a Skype trojan going around that is turning PCs into Bitcoin miners. So far, victims are mostly located in countries like Italy, Russia, Poland, Costa Rica, Spain, Germany, and a few others. Bitcoin Mining is a another way for users to acquire Bitcoin’s currency by “making computer hardware do mathematical calculations for the Bitcoin network to confirm transactions and increase security.”

Skype trojan turns your computer into a Bitcoin miner

The trojan is going around via a Skype instant message. The translated message says, “This is my favorite picture of you”, and provides a shortened link. The trojan is spreading quickly, with an average 2000 clicks per hour. Kaspersky has identified the trojan as “Trojan.Win32.Jorik.IRCbot.xkt”, and the process it runs as bitcoin-miner.exe. The malware connects to a C2 server located in Germany with the IP address: 213.165.68.138:9000.

Skype trojan turns your computer into a Bitcoin miner 1

The malware immediately takes control of your computer and increases the victim’s CPU usage drastically. While the trojan’s primary use is for Bitcoin mining, it’s not its only capability. Bitcoin mining isn’t lucrative with just one PC, however, if there are many PCs infected and aimed towards a specific Bitcoin mining pool, it can be worthwhile.

Skype trojan turns your computer into a Bitcoin miner 3

This new trojan is speculated to have surfaced due to the meteoric rise in Bitcoin value. Late last month, it was reported that the value of a Bitcoin was $92, a number that has now reached about $140. The constant rise in value of Bitcoin is more than enough to drive many devious hackers to get creative. So in order to protect yourself from being infected, make sure to get an anti-virus software, and keep it up-to-date. Also be wary of suspicious Skype messages and shortened URLs. We’ll keep you updated if there are any resolutions to this issue.

[via Kaspersky]


Skype trojan turns your computer into a Bitcoin miner is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

New Mac trojan injects ads into web browsers using plugin

Viruses, trojans, and other malicious pieces of software are nothing new on OS X. While the mainstream consensus is that Apple‘s desktop platform is impervious to such malware, that’s actually not the case. In fact, a new piece of adware is making the rounds that injects advertisements into web browsers after installing a disguised plugin.

Screen Shot 2013-03-21 at 11.10.00 AM

The trojan is detected as “Trojan.Yontoo.1” and it was discovered by Russian security firm Doctor Web. Of course, you have to an install a plugin or other piece of software in order for the trojan to activate, but hackers are making it easy for unsuspecting users to take the bait. They’re prompting users to install a plugin before they can watch a mobile trailer, for example.

Of course, we’ve all come across this scenario before, where we don’t have a certain plugin installed in order to view something, so we’re forced to download and install it before continuing. However, it looks like criminals are taking advantage of that tradition by implementing the same kind of system in order to get users to install the trojan.

It’s said that a Windows version of the trojan also exists, but it doesn’t affect Windows 8 users currently. Cross-platform malware isn’t rare most of the time, but this particular one uses its own code to target each specific operating system, as opposed to targeting a universal piece of software like Java, which we’ve heard plenty about recently.

[via The Next Web]


New Mac trojan injects ads into web browsers using plugin is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

South Korean Broadcasters, Banks Crippled By Malware Attacks

South Korean Broadcasters, Banks Crippled By Malware Attacks

The digital world is starting to become a scary place with reports of numerous popular services getting hacked. We’ve seen ZenDesk, Evernote and even Dropbox suffer from hacker attacks, but a report is coming in from South Korea that may show how fragile our Internet infrastructure may be.

Three South Korean television broadcasters and two banks have reported they may have been the victims of a widespread malware attack as they all say they’ve experienced serious network outages with bank ATMs and online banking being down for hours. One thing that ties the banks and television broadcasters together is the fact they all use LG UPlus, which is provides Internet services to these particular companies. (more…)

By Ubergizmo. Related articles: Google Fiber Expanded To A New City For The First Time, Google+ Hangout To Get New Screen Capture Feature,

China’s new internet backbone explained: verified sources, IPv6 at the core

China's new internet backbone detailed for the public verified sources, IPv6 at the core

While most of the world is still coming to grips with malware and weaning itself off of IPv4, we’re just learning that China has been thinking further ahead. A newly publicized US Navy report reveals that China’s new internet backbone revolves around an IPv6-based architecture that leans on Source Address Validation Architecture, or SAVA. The technique creates a catalog of known good matches between computers and their IP addresses, and blocks traffic when there’s a clear discrepancy. The method could curb attempts to spread malware through spoofing and tackle some outbreaks automatically — and, perhaps not so coincidentally, complicate any leaps over the Great Firewall. Even with the existence of that potential curb on civil liberties, the improved backbone could still keep network addresses and security under reasonable control when China expects that over 70 percent of its many, many homes will have broadband in the near future.

[Image credit: Fangoufang, Wikipedia]

Filed under: ,

Comments

Via: New Scientist

Source: The Royal Society

Apple’s Phil Schiller tells Android users to “be safe out there”

Android is no stranger to malware. We’ve seen several instances of fake apps making their way into the Google Play store that are infested with malicious code, and while it just takes common sense to weed out the fake apps, some users can be unlucky enough to miss a couple and end up installing malware on their Android devices. Apple’s senior vice president of worldwide marketing, Phil Schiller, wants to remind you all to “be safe out there.”

Screen Shot 2013-03-07 at 12.16.48 PM

Schiller tweeted earlier today a link to a “Mobile Threat Report” from research and security company F-Secure, most of which highlights various security and malware vulnerabilities in Android. Along with the link, Schiller captioned it with a “be safe out there,” quietly giving a slight jab to Google’s mobile platform.

The report mentions several interesting facets about Android, including the statistic that Android accounted for 79% of just over 300 mobile threats in 2012, while just 0.7% of these threats dealt with iOS. Overall, the report states that iOS is one of the most secure mobile platforms out there, with BlackBerry also topping the list.

Of course, Apple is usually quiet when it comes to discussing their competitors, and they usually keep their fighting words to themselves, but we suppose that Apple execs have an open court when it comes to chatting on Twitter, and Schiller definitely wasn’t holding anything back with his tweet, no matter how subtle he was trying to be.


Apple’s Phil Schiller tells Android users to “be safe out there” is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Microsoft reveals hackers attacked it too, ‘no customer data affected’

Following revelations of hackers accessing files at companies including Apple and Facebook, Microsoft revealed today it also found evidence of intrusions. In a blog post on the Microsoft Security Response Center, general manager Matt Thomlinson indicated “a small number of computers, including some in our Mac business unit” were affected by malware of the type described in the other attacks. As he mentions, such cyberattacks are no surprise to a company with Microsoft’s profile, however one wonders if the folks in Redmond aren’t having a chuckle that Macs appear to have been exploited in this case. He continued to state that the investigation is ongoing, however it does not appear that any customer data was at risk.

Filed under: ,

Comments

Source: Technet Blogs, Reuters

Apple Says It Was Targeted By The Same Hackers That Hit Facebook, Will Release Protection Software Tuesday

Apple-Logo-MacBook

Apple has revealed that it was attacked by the same group that went after Facebook in a recent attempt to break that network’s security. The company says a “small number” of its employees’ Macs were affected, but there is “no evidence that any data left Apple,” according to a report by Reuters. The company will be issuing software to prevent customers from being attacked in the same manner, Apple said.

Apple’s report follows the news from Facebook on Friday that it was targeted by hackers apparently operating out of China. Facebook also reported that none of its users’ data was compromised through the attack. Apple is said to be workign with law enforcement on trying to find the source of the hacking attempt, and will be releasing a software tool aimed at its customers to help them protect their own Macs against the malware used by the unidentified assailant.

The goal for both Apple and Facebook, in being the source of these reports about attacks on their own companies is to be proactive and get out ahead of the news, in order to reassure customers that they’re doing everything possible to ensure the security of any data they hold. The object lesson of Sony’s PlayStation network breach, and the ensuing criticism and lawsuits that resulted from it being perceived as “slow” to notify outsiders of the attack is probably one cause of heightened transparency on the part of companies facing cyber-security threats.

For Apple, admitting to a security breach is a rare occurrence. The company acknowledged some 400 iTunes accounts were hacked back in 2010 in response to customer complaints, but this kind of pre-emptive move indicates that we’re likely dealing with a different level of security threat altogether. On the plus side, account data seems not to have been leaked, and this means authorities will have the help of two technology giants and their considerable resources in tracking the perpetrators down.