Microsoft reports that 24% of all PCs are unprotected

Many of you are probably sporting some kind of anti-malware software on your computer, whether it’d Norton, McAfee, Kaspersky, etc. However, it turns out that almost a quarter of all PCs in the world are unprotected, leaving them wide open for all kinds of havoc that no one really wants lurking around.

malware

According to Microsoft’s latest Security Intelligence Report, 24% of all PCs are absent of any kind of anti-malware software. Microsoft says that unprotected computers are 5.5 times more likely to catch a virus than computers that have anti-malware software installed. However, it seems some users are willing to take the risk.

According to the report, the country who has the most unprotected computers roaming around is Egypt, with a whopping 40% of unprotected PCs laying around, with India coming in second at 30%, and Russia with 29%. The US comes in at 26%, with the UK at 21%, which ties for the lowest percentage along with Brazil and Australia.

However, Microsoft notes that the reason for unprotected PCs may not just be about laziness on the users’ part, but they simply may not be well-informed on the importance of having anti-virus software on their computer. There’s also other contributing factors, like free trials expiring without notice, or a virus itself disabling your anti-virus software.


Microsoft reports that 24% of all PCs are unprotected is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Symantec security report reveals attacks up and spam down

Symantec has published its 2013 Internet Security Threat Report, revealing data about the state of the Internet and the threats in it. According to the security report, small and medium businesses have seen the greatest increase in threats, with over all targeted attacks in 2012 jumping to 42-percent, with 31-percent of those attacks being aimed at companies with less than 250 employees.

SYMC-ISTR-webattack-page12

According to the report, those who use social networks, particularly Facebook and Twitter, should be careful, with the instances of phishing websites that spoof popular social networks having jumped a huge 125-percent last year. Not all numbers jumped, however, with the amount of spam sent in 2012 dropping to 69-percent of all email sent during the year.

The number of vulnerabilities found last year clocked in at 5,291, with a fair chunk of them – 415, to be precise – being vulnerabilities with mobile OSs. In line with that is the numbers on data theft, with the report stating that 32-percent of the mobile threats resulted in stolen data. The number of web-based attacks also followed the upward trend, jumping 30-percent.

There were 14 zero-day vulnerabilities last year, as well as some big events, including 600,000 Macs being affected by a virus, and a single waterhole attack hit 500 organizations in one day. Other relevant data is contained in the infograph above, which was made by Symantec. Particularly of note is the increase in the number of web-based attacks that were blocked last year over 2011, jumping from 190,370 to 247,350.

[via Symantec]


Symantec security report reveals attacks up and spam down is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Um, A Vial of a Deadly Virus Went Missing from a Lab

This is completely reassuring, we don’t have to worry. A vial containing a virus that causes hemorrhagic fever has gone missing from a research facility in Texas. Okay, maybe we should worry. More »

New Mac trojan injects ads into web browsers using plugin

Viruses, trojans, and other malicious pieces of software are nothing new on OS X. While the mainstream consensus is that Apple‘s desktop platform is impervious to such malware, that’s actually not the case. In fact, a new piece of adware is making the rounds that injects advertisements into web browsers after installing a disguised plugin.

Screen Shot 2013-03-21 at 11.10.00 AM

The trojan is detected as “Trojan.Yontoo.1” and it was discovered by Russian security firm Doctor Web. Of course, you have to an install a plugin or other piece of software in order for the trojan to activate, but hackers are making it easy for unsuspecting users to take the bait. They’re prompting users to install a plugin before they can watch a mobile trailer, for example.

Of course, we’ve all come across this scenario before, where we don’t have a certain plugin installed in order to view something, so we’re forced to download and install it before continuing. However, it looks like criminals are taking advantage of that tradition by implementing the same kind of system in order to get users to install the trojan.

It’s said that a Windows version of the trojan also exists, but it doesn’t affect Windows 8 users currently. Cross-platform malware isn’t rare most of the time, but this particular one uses its own code to target each specific operating system, as opposed to targeting a universal piece of software like Java, which we’ve heard plenty about recently.

[via The Next Web]


New Mac trojan injects ads into web browsers using plugin is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Multinational cybercrime gang arrested in Spain’s Costa del Sol

A group of ten criminals have recently been arrested in the Costa del Sol area of Spain. These ten are from varying countries and are said to have been running a ransomware scam. The arrests were made by Europol, the European police agency and follow the arrest of the head of the network who was taken into custody last month while in Dubai. The head of the network is reportedly from Russia and this latest round of ten includes two Ukrainians, two Georgians and an additional six from Russia.

sp-Europol-580x333

Regardless of their country of origin though, this group is said to have been running their ransomware scam across Europe and are believed to have taken in millions of euros. These crimes were based on a virus that locks a user’s computer and in turn sends them a message that appeared to be a warning from the police. The key here, these messages were demanding a sum of €100 to unlock the computer.

Rob Wainwright, the director of Europol was noted as saying that this is essentially a mass marketing scam and that “even if only 2 percent fall victim to the scam, it is still a very good pickup rate.” He went on to say that 3 percent of those targeted in this scam were believed to have paid. Wainwright didn’t mention any estimates in terms of dollar amounts, however Francisco Martínez, Spain’s secretary of state for security believes they collected more than €1 million in Spain alone.

Dollar amounts aside, an inspector from Spain that helped in the investigation said this organization “had a very well-structured and complex infrastructure.” In addition to the arrests, police also took several computers as well as more than 200 credit cards and €26,000 in cash. Those arrested were charged with varying crimes including money laundering, fraud and involvement in a criminal organization.

[via The New York Times]


Multinational cybercrime gang arrested in Spain’s Costa del Sol is written by Robert Nelson & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

DroidCleaner Malware Discovered To Mess With Android Devices, PC To Spy On You

DroidCleaner Malware Discovered To Mess With Android Devices, PC To Spy On You

Installing malware on your smartphone devices is something no one wants to do, but it does happen, especially for Android owners. A new Android malware has been uncovered that not only affects your Android device, but it’s also capable of targeting a user’s PC in order to spy on them.

The Android malware is called “DroidCleaner” and poses as an application to help free your Android device’s memory by “cleaning” the device. Researchers at security firm Kaspersky Lab discovered the application and say the malware infects the user’s device and can even infect their computer if they plug the infected device into it.

(more…)

By Ubergizmo. Related articles: Fujitsu Has New File Transfer Method, Huawei Press Conference Live,

Three charged over “Gozi” computer virus

Three men involved in creating and distributing the “Gozi” virus that infected over one million computers worldwide have been officially charged today. The group’s hack allowed them to steal millions of dollars from users over a five-year period, stealing passwords and various banking information, like credit card numbers and bank account information.

1594411528_1512b1aad5_z

The virus was first discovered by US cyber security experts back in 2007, and it’s described as “one of the most financially destructive computer viruses in history.” but the operation actually continued well into 2012. The mastermind behind Gozi, Nikita Kuzmin, was arrested in the US in November 2010 and pled guilty to computer intrusion and fraud charges in May 2011.

As for the two other co-conspirators, Deniss Calovskis and Mihai Ionut Paunescu, Calovskis was arrested in Latvia in November 2012 and Paunescu was arrested in Romania last month. Extradition proceedings for both of them are ongoing as we speak, and they face up to 67 and 60 years in prison, respectively, while Kuzmin faces up to 95 years in the clink.

The Gozivirus infected around 40,000 computers in the US, with 160 of them belonging to NASA, according to court documents. When the virus was discovered in 2007, cyber security expert Don Jackson went undercover in Russian chat rooms to try and obtain a version of the virus for testing purposes. He actually ended up getting several offers for a few thousand dollars each, but ended up severing communication before a deal was made.

[via ABC News]

Image via Flickr


Three charged over “Gozi” computer virus is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Multiple power plant workstations slammed by malware

According to the Homeland Security Department, multiple power plants in the United States were affected by malware during the beginning of October 2012. While details are relatively scarce, it was revealed that one of the power plants had been infected via a USB flash drive. The infection happened during a software update.

USB drive

The power plant infected by the USB drive ended up staying offline for three weeks while the issue was fixed. The malware had been introduced via the USB drive of an outside technician who was performing software updates, and was an identity theft trojan. The malware managed to infect approximately 10 computers.

A second power plant that was also infected had malware on multiple computers, some of which were involved with the plant’s operations. Unlike the other plant, no information was provided on how this malware made its way onto the workstations. The first power plant did not have properly updated antivirus software.

The Industrial Control Systems Cyber Emergency Response Team said this in a report. “ICS-CERT’s onsite discussions with company personnel revealed a handful of machines that likely had contact with the tainted USB drive. These machines were examined immediately and drive images were taken for in-depth analysis. ICS-CERT also…discovered signs of the sophisticated malware on two engineering workstations, both critical to the operation of the control environment.”

[via USA Today]


Multiple power plant workstations slammed by malware is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Larry the Vomiting Robot Spews for Science

The norovirus can be nasty. It causes severe diarrhea and vomiting in humans. It is also extremely contagious. You might remember several cases of outbreaks in cruise ships on the news. This virus is estimated to have caused over 90% of epidemic nonbacterial gastroenteritis in the entire world. So it only makes sense that scientists want to understand the virus better. That’s what Larry the vomiting robot is all about.
larry vomiting robot
At the Health and Safety Laboratory in Derbyshire, northern England, researcher Catherine Makison developed this humanoid simulated vomiting system. Yeah, Larry sounds much nicer. When scientists analyzed his reach, they found that small droplets of sickness can spread over three meters.

You see, vomiting, robots and science are all making great strides every time Larry spews. Larry Spews. That would have been a good name. Or Barf Simpson. Maybe just simply Ralph.

[via Neatorama]

New Money-Destroying Virus Attacks Iran

After the US and Israel cooked up Stuxnet—a potent cyber weapon aimed at Iran’s nuclear facilities—whenever a virus targets Iran, it could be something major. This time around, the web threat wants to erase Iranian banks. More »