06.25.10

Gemini version available ♊︎

Eye on Security: Latest Windows Malware, Viruses

Posted in Microsoft, Security, Windows at 4:54 pm by Dr. Roy Schestowitz

Mobile phone tower

Summary: Children targeted by sexual predators using Windows crackers; Central Ambulance Service downed by Windows viruses

Sexual assault by Internet

Now, this is different. A computer cracker, Luis Mijangos of Santa Ana, CA has been arrested by the FBI for taking over more than 100 Windows PCs and using what he found on them to extort sexually explicit videos from women and teenage girls by threatening to release their personal data.

Save the Women and Children From That Other OS

A predator distributed malware to PCs through digital music files. He used the malware to gather information and control PCs which escalated to demanding explicit images and video from the ladies.

Malicious code on Lenovo driver download page – Update

The driver download portal of hardware manufacturer Lenovo temporarily deployed malicious code. Various virus scanners issued alerts about a Java-based Trojan downloader or dropper. The iframe injected by attackers points to the volgo-marun.cn server and can still be found on several pages of the download.lenovo.com server.

Anti-Virus Elite 2010 Looking for a Way to Hijack your PC

Be sure not to trust this soft! Remove it as soon as you notice it on your PC! These are just several warnings flying around the web these days.

Cyber criminals have created a new rogueware, named Anti-Virus Elite 2010. Usually installed from malicious websites, or during the process of downloading video codecs or updates for your computer, the fake application starts its activities as soon as it gets to your PC.

BIS helped uncover computer attack on G20 meeting

The Czech counter-intelligence service (BIS), along with other secret services, last year participated in the investigation into the attack on the information systems of the delegates to the G20 summit in Seoul, BIS says in its report for 2009, released on its website.

Last June, the BIS as an intelligence service of the EU presiding country uncovered a “sophisticated attempt at cybernetic espionage.”

According to the BIS annual report, the contact persons at the finance ministries of the participating countries received forged electronic post in the form of an attachment to an e-mail with a special pdf file containing “a harmful code.”

OU Reports Virus, Security Breach

The University of Oklahoma is warning students about a security breach that may put their personal information at risk.

The university said its Information Technology department noticed unusual Internet activity on a laptop computer associated with its network. It said it determined the computer belonged to an employee and was infected with a virus known as Zeus or Z-Bod.

South Central Ambulance Service hit by computer virus

A virus has hit parts of the computer system used by South Central Ambulance Service (SCAS).

The problem first occurred on Tuesday but has not affected the parts used to deal with 999 calls, the trust said.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

4 Comments

  1. Yuhong Bao said,

    June 25, 2010 at 6:34 pm

    Gravatar

    “Children targeted by sexual predators using Windows crackers”
    Note that this was a targeted attack, which are much more common than viruses on UNIX systems in general (not just Linux).

    Dr. Roy Schestowitz Reply:

    Part of it is social engineering.

    Yuhong Bao Reply:

    Which is OS agnostic, of course.

    Dr. Roy Schestowitz Reply:

    On GNU/Linux it would possibly require access to a repository and/or root password. In Windows, an E-mail attachment would do.

DecorWhat Else is New


  1. Proprietary Software is Pollution

    "My daughter asked me about why are we throwing away some bits of technology," Dr. Andy Farnell says. "This is my attempt to put into words for "ordinary" people what I tried to explain to a 6 year old."



  2. Microsoft GitHub Exposé — Part XV — Cover-Up and Defamation

    Defamation of one’s victims might be another offence to add to the long list of offences committed by Microsoft’s Chief Architect of GitHub Copilot, Balabhadra (Alex) Graveley; attempting to discredit the police report is a new low and can get Mr. Graveley even deeper in trouble (Microsoft protecting him only makes matters worse)



  3. [Meme] Alexander Ramsay and Team UPC Inciting Politicians to Break the Law and Violate Constitutions, Based on Misinformation, Fake News, and Deliberate Lies Wrapped up as 'Studies'

    The EPO‘s law-breaking leadership (Benoît Battistelli, António Campinos and their corrupt cronies), helped by liars who don't enjoy diplomatic immunity, are cooperating to undermine courts across the EU, in effect replacing them with EPO puppets who are patent maximalists (Europe’s equivalents of James Rodney Gilstrap and Alan D Albright, a Donald Trump appointee, in the Eastern and Western Districts of Texas, respectively)



  4. Has the Administrative Council Belatedly Realised What Its Job in the European Patent Organisation Really Is?

    The "Mafia" which took over the EPO (the EPO's own workers call it "Mafia") isn't getting its way with a proposal, so it's preventing the states from even voting on it!



  5. [Meme] Team UPC is Celebrating a Pyrrhic Victory

    Pyrrhic victory best describes what's happening at the moment (it’s a lobbying tactic, faking/staging things to help false prophecies be fulfilled, based on hopes and wishes alone), for faking something without bothering to explain the legal basis is going to lead to further escalations and complaints (already impending)



  6. Links 24/1/2022: Scribus 1.5.8 and LXLE Reviewed

    Links for the day



  7. IRC Proceedings: Sunday, January 23, 2022

    IRC logs for Sunday, January 23, 2022



  8. [Meme] Team UPC Congratulating Itself

    The barrage of fake news and misinformation about the UPC deliberately leaves out all the obvious and very important facts; even the EPO‘s António Campinos and Breton (Benoît Battistelli‘s buddy) participated in the lying



  9. Links 24/1/2022: pgBadger 11.7 Released, Catch-up With Patents

    Links for the day



  10. The Demonisation and Stereotyping of Coders Not Working for Big Corporations (or 'The System')

    The war on encrypted communication (or secure communications) carries on despite a lack of evidence that encryption stands in the way of crime investigations (most criminals use none of it)



  11. On the 'Peak Hacker' Series

    Hacker culture, unlike Ludditism, is ultimately a movement for justice, for equality, and for human rights through personal and collective emancipation; Dr. Farnell has done a good job explaining where we stand and his splendid series has come to a close



  12. Links 23/1/2022: First RC of Linux 5.17 and Sway 1.7 Released

    Links for the day



  13. Peak Code — Part III: After Code

    "Surveillance perimeters, smart TVs (Telescreens built to Orwell's original blueprint) watched over our living rooms. Mandatory smart everything kept us 'trustless'. Safe search, safe thoughts. We withdrew. Inside, we went quietly mad."



  14. IRC Proceedings: Saturday, January 22, 2022

    IRC logs for Saturday, January 22, 2022



  15. Links 23/1/2022: MongoDB 5.2, BuddyPress 10.0.0, and GNU Parallel 20220122

    Links for the day



  16. A Parade of Fake News About the UPC Does Not Change the General Consensus or the Simple Facts

    European Patents (EPs) from the EPO are granted in violation of the EPC; Courts are now targeted by António Campinos and the minions he associates with (mostly parasitic litigation firms and monopolists), for they want puppets for “judges” and for invalid patents to be magically rendered “valid” and “enforceable”



  17. Welcome to 2022: Intentional Lies Are 'Benefits' and 'Alternative Facts'

    A crooks-run EPO, together with the patent litigation cabal that we’ve dubbed ‘Team UPC’ (it has nothing to do with science or with innovation), is spreading tons of misinformation; the lies are designed to make the law-breaking seem OK, knowing that Benoît Battistelli and António Campinos are practically above the law, so perjury as well as gross violations of the EPC and constitutions won’t scare them (prosecution as deterrence just isn’t there, which is another inherent problem with the UPC)



  18. From Software Eating the World to the Pentagon Eating All the Software

    “Software is eating the world,” according to Marc Andreessen (co-founder of Netscape), but the Empire Strikes Back (not the movie, the actual empire) by hijacking all code by proxy, via Microsoft, just as it grabbed a lot of the world’s communications via Skype, bypassing the world's many national telecoms; coders need to fight back rather than participate in racist (imperial) shams such as GitHub



  19. Links 22/1/2022: Skrooge 2.27.0 and Ray-Tracing Stuff

    Links for the day



  20. IRC Proceedings: Friday, January 21, 2022

    IRC logs for Friday, January 21, 2022



  21. Peak Code — Part II: Lost Source

    "Debian and Mozilla played along. They were made “Yeoman Freeholders” in return for rewriting their charters to “work closely with the new Ministry in the interests of all stakeholders” – or some-such vacuous spout… because no one remembers… after that it started."



  22. Links 22/1/2022: Ubuntu MATE 21.10 for GPD Pocket 3, MINISFORUM Preloads GNU/Linux

    Links for the day



  23. Computer Users Should be Operators, But Instead They're Being Operated by Vendors and Governments

    Computers have been turned into hostile black boxes (unlike Blackbox) that distrust the person who purchased them; moreover, from a legislative point of view, encryption (i.e. computer security) is perceived and treated by governments like a threat instead of something imperative — a necessity for society’s empowerment (privacy is about control and people in positions of unjust power want total and complete control)



  24. Peak Code — Part I: Before the Wars

    Article/series by Dr. Andy Farnell: "in the period between 1960 and 2060 people had mistaken what they called "The Internet" for a communications system, when it had in fact been an Ideal and a Battleground all along - the site of the 100 years info-war."



  25. Links 21/1/2022: RISC-V Development Board and Rust 1.58.1

    Links for the day



  26. IRC Proceedings: Thursday, January 20, 2022

    IRC logs for Thursday, January 20, 2022



  27. Gemini Lets You Control the Presentation Layer to Suit Your Own Needs

    In Gemini (or the Web as seen through Gemini clients such as Kristall) the user comes first; it's not sites/capsules that tell the user how pages are presented/rendered, as they decide only on structural/semantic aspects



  28. The Future of Techrights

    Futures are difficult to predict, but our general vision for the years ahead revolves around more community involvement and less (none or decreased) reliance on third parties, especially monopolistic corporations, mostly because they oppress the population via the network and via electronic devices



  29. [Meme] UPC for CJEU

    When you do illegal things and knowingly break the law to get started with a “legal” system you know it’ll end up in tears… or the CJEU



  30. Links 20/1/2022: 'Pluton' Pushback and Red Hat Satellite 6.10.2

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts