Posts Tagged ‘malware’

Virus Injected Into DNA and Used to Hack a Computer

Wednesday, August 16th, 2017


Researchers have successfully proven that viruses can be weaponized to infect computers and take them over. And if that’s not the premise of a dystopian sci-fi novel, I don’t know what is.

The University of Washington recently baked malware into a genetic molecule and then infected a system analyzing it. If it sounds like DNA data storage, you’re right; the premise is a natural expansion.

If you can put good code on DNA, then naturally you can put bad code on it – and any system that reads it is going to be at risk of infection. Which begs the question – since scientists have just learned to store data on atoms, will there one day be atomic-level malware?


Why WCry Marks a World Turning Point

Monday, May 29th, 2017


I’m going to say something controversial, so brace yourself—the WCry ransomware was a good thing.

Now make no mistake about it. Ransomware is evil. It’s used to literally hold people’s lives hostage. Just like a tornado, it destroys businesses and lives. But it’s far worse, because people make ransomware…and knowing what it does, deliberately inflict it upon other people.

If you haven’t heard of the WCry ransomware (A.k.a. WannaCry or WannaCrypt), you must have been living under a rock. Just over a week ago, the WCry ransomware worm attacked more than 200,000 computers in 150 countries.

And when it did, something changed.


Invisible Malware Can Now Hide In Banner Pixels with “Stegano”

Thursday, December 22nd, 2016

Stegano can hide in banner pixels

Over the last two months, millions of visitors to mainstream websites have been exposed to a new form of malware embedded in banner pixels. And if you didn’t see it, don’t be surprised.

The new malware, “Stegano”, is nearly invisible to the naked eye. Its code has been embedded in parameters controlling the transparency of pixels used to display banner ads. Since it’s buried in the alpha channel, even watchful ad networks find it difficult to detect.

The malware’s name borrows from the word Steganography; the practice of concealing secret messages inside a larger document. The medium is new, but the practice dates back to at least 440BC.


Amazing Phishing Attempt: A Must See!

Monday, November 14th, 2016

Amazed man at spear phishing attempt

This spam e-mail is so well crafted, it’s both incredible and horrifying. Would your users know this was spam, or would they think it was real?


Does Counter-Phishing Work? Half of People Click Whatever They Are Sent

Monday, October 17th, 2016

Jackie chan's mind is blown by counter-phishing

You know the feeling. A user has done something incredibly dumb. Like opening a strange attachment despite all the counter-phishing training you did last month. And your brain cells all scream at once, just one single word.


It’s said that common sense isn’t common. When it comes to IT, it’s even more true. A recent study found one in two users would click on links sent to them by strange senders via Facebook or E-mail.

And even worse? The same study found even if the subjects knew the risks involved, they still clicked on them.

Given that phishing—and in particular, spear phishing—can cost your company $150,000 or more, it’s a rather big deal. But the big question is this: what in the heck can you actually do about it?


Don’t plug it in! Malware-infected USB sticks in your Mailbox

Monday, October 3rd, 2016

Infected USB drives are making the rounds

It’s like the tale of Pandora’s box. Infected USB sticks are finding their way into people’s mailboxes—and curiosity is making them look inside.

The Australian Police Force is being flooded with phone calls from residents of the Melbourne suburb of Pakenham. Upon connecting the infected USB sticks to thier computers, they’ve been assailed with extremely harmful malware.


Tailoring Backup Practices to Common Security Threats

Friday, February 5th, 2016

tailoring your backup scenarios to security threats

As an IT professional in 2016, security is a big concern. That’s why infosec is becoming a larger and larger part of IT budgets around the world as each year passes. But what you may not be aware of is the vital role that backups can play in protecting against or recovering from some of the most virulent security threats to your IT infrastructure. Ensuring your backup practices are best-practice can be a great defense against a lot of vulnerabilities. Let’s take a look at why that is, and how you can ensure yours are up to the job.


Spear phishing is on the rise – know how to spot it!

Tuesday, June 23rd, 2015

know how to spot spear phishing attacks

Spear Phishing has been on the rise lately, according to a number of recent posts by IT Professionals on Spiceworks. These kinds of targeted attacks can be extremely harmful to businesses if staff aren’t properly prepared, so in this article, we’re going to look at what Spear Phishing is, how your business can defend against it, and the role your server backup software will play in that defense.