Facebook directing users to free antivirus offerings

People are understandably concerned about viruses anywhere online today. People know they can pick up a virus from some of their favorite websites if they aren’t careful. Facebook has now begun directing users who fear their computers might be infected to websites where they can download free antivirus software proactively.

Facebook has opened a Malware Checkpoint for Facebook, and it sends people to one of two places. The checkpoint recommends people sign up for Microsoft Security Essentials or McAfee Scan and Repair. Mac users who hit the Malware Checkpoint are referred to the Apple Security Updates website.

Facebook has been notifying site users for a long time if it detects a possible malware infection on their individual machine. It has been linking users to free antivirus software to clean up suspected infections. The big change here is that Facebook is now opening the Malware Checkpoint to all users, whether or not an infection is detected on their computer.

[via CNET]


Facebook directing users to free antivirus offerings is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Facebook Wants to Keep You Virus-Free [Facebook]

Facebook may be a little lax when it comes to privacy, but it seems to be doubling down on security. The site is now directing users who think their computer might be infected with malware to sites where they can get free antivirus software. More »

DNSChanger: By the Numbers

Over the past week or two, we’ve been following the DNSChanger or “Internet Doomsday” saga as the final day approached – today – and now it’s time to take a head count for what’s actually happened. Despite the name, this doomsday didn’t actually affect very many computers at all. In fact, according the the folks at DCWG and their study of the infection over the last couple of years, we’d just reached the lowest number of infections per DNS Top Level Domain Country Code in the history of the virus.

The number of unique IP addresses DCWG found with the DNSChanger infection was 551,436 back on the 8th of November, 2011. Fast forward to yesterday (the 8th of July, 2012,) and the number had dropped to 210,851. According to country code, the USA returned the most hits for IPs with the infection at 41,557 just yesterday while only Italy, Great Britain, and Germany had over 10,000 racked up.

There will be monitoring of IP addresses that have been affected and subsequently claimed clean, of course, to make sure they aren’t hijacked once more. The DCWG’s job does not end here, but the IP addresses listed at their site: Cleaning Ends will now be monitored by several Service Provider and Security Organizations – that’s what’s included in the future checking to assure no more malicious hijacking.

And in the end, if you’re reading this from your computer connected to the internet, you weren’t infected anyway. So happy day for you! Have a peek at our timeline below to follow the whole saga as it unfolded this summer – and stay tuned for more!


DNSChanger: By the Numbers is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Internet Doomsday simple fix rundown

Believe it or not, this so-called “Internet Doomsday” you’ve heard about over the past week or so is a real situation – but taking care of it on your own computer is not as terrifying as the name of the day suggests. The so-called virus is called DNSChanger, and thought the fear-mongering amongst us would have all collecting water and dry food for the oncoming electrical winter, there’s not actually that much to worry about. In fact, according to several internet service providers across the country, nothing significant has even appeared on their grid as the day has progressed.

What you’re going to want to do is two things if you’re fearful that your computer may have been affected by this web devil. First, if you’re reading this article from your computer, you have not been affected at all: the virus shuts your web off. If you still have internet, you’re fine. Second, you’ll want to check out the following video to get a grip on what this situation is all about – it’s all very simple, really:

That video comes from the post entitled DNSChanger malware for dummies. There you’ll find a bit more of an explanation, but for those of you really looking to read rather than watch, head to our DNSChanger guide to learn how to find it and how to fix it. For those of you reading this outside the country on your smartphone: remind yourself again that it’s much more likely that your computer back home (wherever that may be) is not infected rather than infected.

“Since midnight last night, when the FBI (via the Internet Services Coalition) disconnected the servers associated with this botnet, we’ve only received a miniscule number of calls, but our customer care and security assurance teams are standing by and are ready to help,” – Douglas

Charlie Douglas is the Comcast senior director of corporate communications and has assured MSNBC that there’s nothing to worry about. The same is true of Verizon, AT&T, and COX, also speaking today saying that the effect of this situation is minimal and tiny, having little impact overall.

Check out the timeline below to learn more about DNSChanger and what it’s done so far!


Internet Doomsday simple fix rundown is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


PSA: Evict DNSChanger now or lose the web Monday

Today’s malware has a deadline: get rid of DNSChanger now, or come Monday, July 9, you may find yourself without access to the internet altogether. Hundreds of thousands of computers around the world have been infected by the trojan, which changes DNS settings – among other things – so as to route web traffic through compromised servers. Now, the FBI is preparing to pull the plug on those servers – and many people’s internet connection with them.

Since the FBI and other law enforcement agencies seized control of the botnet behind DNSChanger, a temporary DNS server network has been running in its stead so as to keep infected users online. That network will cease operating on Monday.

“The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in Estonia, New York, and Chicago. The malicious DNS servers would give fake, malicious answers, altering user searches, and promoting fake and dangerous products. Because every web search starts with DNS, the malware showed users an altered version of the Internet” DNSChanger Working Group

The best news is, checking for a DNSChanger infection on your system and, if found, getting rid of it is straightforward. First step is heading to dns-ok.us in your browser: that will tell you whether or not there’s a sign that your computer has been infected. If it’s green, you’re in the clear (though it’s probably still worth forwarding this article on to friends and family – particularly net-confused parents – who might need some assistance checking their own machines).

If it’s red, however, you have a DNSChanger problem. Thankfully there are multiple options to get rid of it: Microsoft has a tool, as do key anti-virus vendors such as McAfee and Norton. There’s a full list of them here, and usually it’s just a case of downloading and running an app to get your computer back on an even keel.


PSA: Evict DNSChanger now or lose the web Monday is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Your Internet Might Shut Off Tomorrow Because of a Virus—Here’s How to Fix It [Video]

Tonight at 12:01 AM EDT Monday July 9th, the Internet is going to become inaccessible for nearly half a million people around the world because of malware called DNS Changer. If your computer is infected with DNS Changer, it won’t be able to get on the Internet anymore. Here’s how to get rid of it and make sure the Internet still works for you. More »

FBI to kill servers supporting DNSChanger virus victims

Hundreds of thousands of people around the world could lose access to the Internet on July 9 when the FBI plans to kill temporary servers servicing victims of a virus. That virus is called DNSChanger, and the FBI plans to shut down the temporary DNS servers that were being used to assist victims of the Internet theft ring. Any computer that still uses the servers won’t be able to go online starting July 9.

Before people with infected systems will be able to get back online, they will have to clear the computer of the DNSChanger virus. The shutdown of the temporary servers is the final move in an FBI operation called Ghost Click that spanned two years and officially ended in November 2011. The virus changed victim’s DNS servers, routing them to websites of the hacker’s choosing.

Some of those websites were fraudulent in nature according to authorities. Six Estonians behind the fraud ring were arrested by the FBI during the course of the investigation. The virus was originally disseminated via traditional channels, including e-mail and malware. The FBI had replaced the hacker’s nefarious servers with “clean” servers to keep PCs infected by the virus online.

[via CBC]


FBI to kill servers supporting DNSChanger virus victims is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


New Mac OS X malware discovered

Kaspersky Labs released a report today about a new malware on the Mac OS X today that spreads itself through zip file attachments. Costin Raiu of Kaspersky Labs said that they were able to “intercept” the new advanced persistent threat or ATP using a new MacOS X backdoor variant targeted at Uyghur activists. Uyghur are a Turkic ethnic group living in Eastern and Central Asia. On Monday this week, a group of Uyghur activists were reportedly beaten up by the Chinese police forces while holding a peaceful demonstration. (more…)

By Ubergizmo. Related articles: Mac OS X trojan attacks websites from your computer, New Trojan infects Mac OS X and Windows,

NICT presents the Daedalus a New Cyber-attack alert system

NICT has developed Daedalus, a cyber-attack alert system.
Daedalus renders attacks on networks visible in real time. The sphere in the center represents the Internet, and the circles moving around it represent networks under observation. The state of an attack is shown using 3D graphics, and can be viewed from any perspective.
“We previously created a system called nicter for observing cyber-attacks. We also built an observation network in Japan, called the Darknet Observation Network, to …