Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare

Kaspersky Labs preps its own OS to guard industry against cyberwarfare

Kaspersky Labs’ namesake Eugene Kaspersky is worried that widely distributed and potentially state-sponsored malware like Flame and Stuxnet pose dire threats to often lightly protected infrastructure like communication and power plants — whatever your nationality, it’s clearly bad for the civilian population of a given country to suffer even collateral damage from cyberattacks. To minimize future chaos and literally keep the trains running, Kaspersky and his company are expanding their ambitions beyond mere antivirus software to build their own, extra-secure operating system just for large-scale industry. The platform depends on a custom, minimalist core that refuses to run any software that isn’t baked in and has no code outside of its main purposes: there’ll be no water supply shutdowns after the night watch plays Solitaire from an infected drive. Any information shared from one of these systems should be completely trustworthy, Kaspersky says. He doesn’t have details as to when the OS will reach behind-the-scenes hardware, but he stresses that this is definitely not an open-source project: some parts of the OS will always remain confidential to keep ne’er-do-well terrorists (and governments) from undermining the technology we often take for granted.

Filed under:

Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare originally appeared on Engadget on Tue, 16 Oct 2012 13:28:00 EDT. Please see our terms for use of feeds.

Permalink The Next Web  |  sourceEugene Kaspersky, Securelist  | Email this | Comments

Skype users stalked by ransom trojan

Skype has warned users to update to the latest version of the VoIP and video calling app, as well as to check their computer security settings, after a fast-spreading worm was spotted targeting the software. The worm, “Dorkbot,” is being distributed via masked links sent out via Skype’s instant messaging system, Trend Micro reports, co-opting the PC into a botnet and eventually demanding $200 from users in order to unlock their files else see them permanently deleted.

According to the security researchers, various types of social-engineering are being used to encourage Skype IM users to click on the links. Most common appears to be a question along the lines of “lol is this your new profile pic?” which resolves to a file called “Skype_todaysupdate.zip” that downloads the trojan itself.

Trend Micro says that it has observed “upwards of 400 detections in less than 12 hours” from those using its security products, according to TechCrunch, though the actual number is likely to be greater. Both it and Skype point out that users should be wary about clicking links that they’re not expecting and from people that they don’t know.

There’s more information at the Skype forums, and Skype has instructions here on how you can clean your system if you’ve inadvertently been infected.

Skype statement:

“Skype takes the user experience very seriously, particularly when it comes to security. We are aware of this malicious activity and are working quickly to mitigate its impact. We strongly recommend upgrading to the newest Skype version and applying updated security features on your computer. Additionally, following links – even when from your contacts – that look strange or are unexpected is not advisable”


Skype users stalked by ransom trojan is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


FTC slaps scareware distributor with $163 million fine

We’ve all had it happen to us before: we’re browsing the web when we’re greeted with a pop-up alert claiming that our computer is infected and that our immediate action is required. Most tech savvy people wouldn’t be tricked into falling for that, but for a while, these scams had many computer users legitimately scared. A handful of people involved in one of these scareware scams have been ordered by a US District Court to pay out a whopping $163 million FTC fine today, after it was discovered that they scammed more than 1 million people out of money.


Those people, Kristy Ross, Sam Jain, and Daniel Sundin, were hit with the $163 million fine to repay the victims they ripped off throughout the years. In addition, Ross has been banned from selling software that interferes with a user’s computer. Ross and co. were responsible for one of these seemingly endless scareware schemes, alerting Internet-goers to non-existent problems on their computers, and then charging $39.95 and up to “fix” the issues. The scam ran from 2000 to 2008, and in that time, the trio pulled in tens of millions of dollars from confused and scared PC users.

Three other people involved in the case, Marc D’Souza, Maurice D’Souza, and James Reno, settled with the FTC in 2010, and aren’t required to pay back the $168 million. The group operated under the name of Innovative Marketing Inc., which bought space for legitimate-looking ads on major websites. When users would click on the ads, they would be taken to an Innovative Marketing website, where they were told that any number of malicious programs were discovered on their computer and then urged to purchase bogus software to fix the issues.

This is a big step in the right direction for the FTC, but unfortunately, scareware still runs rampant today. It’s a problem that probably won’t ever go away entirely, so users need to stay vigilant when it comes to surfing the Internet and believing those illegitimate alerts. This may not be the last we’ve heard of scareware, but it’s definitely the last we’ve heard of Innovative Marketing Inc.

[via Threat Post]


FTC slaps scareware distributor with $163 million fine is written by Eric Abent & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Verizon intros Mobile Security app for Android, wants to keep you safe

Verizon intros Mobile Security app for Android, wants to keep you safe

McAfee’s been offering mobile protection services on Android for a while now, but Verizon’s taking it a step further and bringing an application tailored specifically for its own customers with help from the Intel-owned outfit. The Mobile Security app — which is also powered by Asurion — aims to assist the Big Red crowd by protecting their devices from many “digital and physical threats,” giving Android (2.1 or later) users the ability to lock, set up alarms, wipe data and locate handsets remotely. As it stands, Verizon’s splitting the Mobile Security utility into three different setups, including a free-of-charge Basic, the Premium for $2 per month and, for those who want to be extra careful, a Premium with Total Equipment Coverage that adds a $1 monthly charge to the current TEC fees. We’ll let your levels of paranoia decide whether or not you actually need any of these — but alas, the link is down below for folks interested in checking out the shielding app.

Continue reading Verizon intros Mobile Security app for Android, wants to keep you safe

Filed under: , ,

Verizon intros Mobile Security app for Android, wants to keep you safe originally appeared on Engadget on Tue, 11 Sep 2012 23:04:00 EDT. Please see our terms for use of feeds.

Permalink The Verge  |  sourceVerizon, Google Play  | Email this | Comments

Google quietly snaps up internet security firm VirusTotal for an undisclosed amount

Google quietly snaps up internet security firm VirusTotal for an undisclosed amount

Having recently wrapped up the Motorola Mobility acquisition, Google’s now moving onto different pastures and spending its cash elsewhere — more specifically on an outfit known as VirusTotal. And, as the internet security company confidently points out, the deal is “great news for you, and bad news for malware generators because Google’s infrastructure will ensure that our tools are always ready, right when you need them.” As for the Android creator, well, let’s just say it, too, is happy to have the VirusTotal team aboard — who, in the process, joins the likes of Sparrow and QuickOffice as part of Mountain View’s most recent purchases. Google’s official response on the matter can be found below, courtesy of The Next Web.

Security is incredibly important to our users and we’ve invested many millions of dollars to help keep them safe online. VirusTotal also has a strong track record in web security, and we’re delighted to be able to provide them with the infrastructure they need to ensure that their service continues to improve.

Filed under: ,

Google quietly snaps up internet security firm VirusTotal for an undisclosed amount originally appeared on Engadget on Fri, 07 Sep 2012 21:22:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceVirusTotal Blog  | Email this | Comments

Deadly Virus Outbreak In California [Virus]

The Center for Disease Control is warning of an unprecedented virus outbreak in California, with two confirmed deaths so far and two more ongoing cases. The virus’ ground zero seems to be in Yosemite Park: More »

Researchers develop Gauss detection tools

Kaspersky Labs discovered a new computer virus recently dubbed Gauss that targeted banking systems and financial information. According to Kaspersky Labs, the virus has infected over 2,500 computers, primarily located in Lebanon, and targets specific banks and financial institutions such as BlomBank and Credit Libanais. Now, web-based tools have been released that allows anyone to check if they’ve been infected by Gauss.

Kaspersky detects the virus by checking systems for a font that’s included when the virus infects a computer. The font, Palida Narrow, could be a play on words of Paladin Arrow, according to one Kaspersky Labs researcher. While the virus is primarily used for gathering financial information, there are parts of the code that obfuscate other abilities.

The information that the virus gathers isn’t limited to sensitive banking details, however, with the malicious software also targeting web browsing histories and passwords. The virus also creates a detailed snapshot of the targeted computer’s hardware, designed to help aid any future attacks. The origins of Gauss aren’t known, but experts believe it could be a state-designed virus due to the specific banking institutions it’s targeting. It could be an attempt to gather the financial activity of a group like Hezbollah or the Iranian government.

Even stranger, after the virus was first discovered by Kaspersky Lab back in July, the remote systems used to control it were abruptly shut down. The makeup of the virus also shares features with other espionage related viruses, further backing up the belief that it’s a state-designed effort. Other security experts, however, believe it could simply be the work of coders and criminals that have copied state designs.

[via The Washington Post]


Researchers develop Gauss detection tools is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Gauss malware eats banking details: Flame just got hotter

A new “cyber-espionage” toolkit that can track browser passwords, online banking credentials, cookies and other personal data has been identified in the wild, security researchers have announced. “Gauss” has until now been targeting users in the Middle-East, Kapersky Lab reports, exploiting previously-unseen loopholes and capable of stealing data from banks including Citibank, PayPal and Bank of Beirut. Somewhat bizarrely – and still unexplained – it also installs a special font on the victim’s machine.

The purpose of that font, called Palida Narrow, is currently unknown, though the trojan’s other abilities are more concerning. Gauss can infect USB drives and monitor browsers, sucking passwords, site history and other credentials and sending them to a remote command machine. It also runs a profile on the infected machine and reports that back, including details on network interfaces, BIOS and what drives are present.

Several Lebanese banks have been specifically targeted, with customers of the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais all apparently susceptible. Gauss has also been seen to target users of Citibank and PayPal.

While it shares features with Stuxnet and Flame, Gauss is said to be more complex in how it can hide on a system. Although it uses similar methods to infect removable drives, it’s also capable of “disinfecting” the drive if need be, at other times using it to store data in a hidden file so that it is not discovered by regular local-drive anti-malware scans.

Approximately 2,500 machines are believed to have been infected – more than three times as many as Flame – since what’s said to have been the first victim in September 2011. It’s unclear how the trojan is communicated, and who is remotely operating it.


Gauss malware eats banking details: Flame just got hotter is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Is There Anyone Stupid Enough to Believe That This Cable Has Anti-Virus Protection? [Wtf]

This “Xbox 360 Elite HDMI cable” should be just like any other HDMI cable in the planet, right? Wrong! According to the box, it’s a “100% Mylar” double shield 1.3c grade cable with anti-virus protection to reduce virus noises and to obtain perfect image transmission.” More »

Malware invades Apple’s App Store for iOS, only harasses Windows users

Malware invades Apple's App Store for iOS, but only affects Windows users

Windows users can’t catch a break with viruses, even when they’re getting software for their Apple device. An app called “Instaquotes Quotes Cards for Instagram” was found to contain a worm called “Worm.VB-900,” which isn’t a threat to iOS itself or any other MacOS platform. However, users who tend to their apps with a Windows machine are susceptible to the baddie — also known affectionately as Mal/CoiDung-A. Any antimalware should detect it since it’s been up to no good since 2009, but Cupertino has already pulled the app and the vendor is working on a virus-free version. Just goes to show — if you’re on a PC, it pays to watch out for worms when you bite into a strange Apple.

Filed under:

Malware invades Apple’s App Store for iOS, only harasses Windows users originally appeared on Engadget on Wed, 25 Jul 2012 10:29:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourceApple forums  | Email this | Comments