Flesh-Eating Bacteria Kills 2 Persons in Florida


There have been eight Vibrio vulnifucus (flesh-eating bacteria) infections in Florida residents. And up until now two have died from the disease as well, according to Florida Department of Health....

McAfee shows how major Android scamware ticks, prevents us from learning first-hand

McAfee shows how major Android scamware ticks, prevents us from learning firsthand

Most Android malware lives in the margins, away from Google Play and the more reliable app shops. It's nonetheless a good idea to be on the lookout for rogue code, and McAfee has stepped in with thorough explanations of how one of the most common scamware strains, Android.FakeInstaller, works its sinister ways. The bait is typically a search-optimized fake app market or website; the apps themselves not only present a legitimate-looking front but include dynamic code to stymie any reverse engineering. Woe be to anyone who's tricked long enough to finish the installation, as the malware often sends text messages to expensive premium phone numbers or links target devices to botnets. The safeguard? McAfee would like you to sign up for its antivirus suite, but you can also keep a good head on your shoulders -- stick to trustworthy shops and look for dodgy behavior before anything reaches your device.

Filed under: , ,

McAfee shows how major Android scamware ticks, prevents us from learning first-hand originally appeared on Engadget on Sat, 06 Oct 2012 06:19:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceMcAfee  | Email this | Comments

Flame malware extinguishes itself, Microsoft protects against future burns

Flame malware extinguishes itself, Microsoft protects itself from future burns

The folks behind that nasty Flame trojan that burned its way through the Middle East aren't the kind to brag -- the malware's manufacturers apparently started dousing their own fire last week. According to Symantec reports, several compromised machines retrieved a file named browse32.ocx from Flame controlled servers, which promptly removed all traces of the malware from the infected systems. Although the attackers seem spooked, Microsoft isn't taking any chances, and has issued a fix to its Windows Server Update Services to block future attacks. The update hopes to protect networked machines from a similar attack by requiring HTTPS inspection servers to funnel Windows update traffic through an exception rule, bypassing its inspection. The attackers? "They're trying to cover their tracks in any way they can," Victor Thakur, principal security response manager at Symantec told the LA Times, "They know they're being watched." Check out the source link below for the Symantec's run down of the trojan's retreat.

Flame malware extinguishes itself, Microsoft protects against future burns originally appeared on Engadget on Mon, 11 Jun 2012 00:54:00 EDT. Please see our terms for use of feeds.

Permalink LA Times, Electronista, Ars Technica  |  sourceSymantic, Microsoft  | Email this | Comments

Stuxnet pinned on US and Israel as an out-of-control creation

Stuxnet pinned on US and Israel as an outofcontrol creation

Ever since Stuxnet was discovered, most of the accusing fingers have been pointed at the US, Israel or both, whether or not there was any evidence; it was hard to ignore malware that seemed tailor-made for wrecking Iranian centrifuges and slowing down the country's nuclear development. As it turns out, Occam's Razor is in full effect. An exposé from the New York Times matter-of-factly claims that the US and Israel coded Stuxnet as part of a cyberwar op, Olympic Games, and snuck it on to a USB thumb drive that infected computers at the Natanz nuclear facility. The reason we know about the infection at all, insiders say, is that it got out of control: someone modified the code or otherwise got it to spread through an infected PC carried outside, pushing Obama to either double down (which he did) or back off. Despite all its connections, the newspaper couldn't confirm whether or not the new Flame malware attack is another US creation. Tipsters did, however, deny that Flame is part of the Olympic Games push -- raising the possibility that there are other agencies at work.

[Image credit: David Holt, Flickr]

Stuxnet pinned on US and Israel as an out-of-control creation originally appeared on Engadget on Fri, 01 Jun 2012 14:48:00 EDT. Please see our terms for use of feeds.

Permalink Ars Technica  |  sourceNew York Times  | Email this | Comments