- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged malware
NSA Targeted TOR Network With Malware
Posted by Brian in Comms, News, Threat Watch on 8/Aug/2013 13:06
From BoingBoing.net:
Initial investigations traced the address to defense contractor SAIC, which provides a wide range of information technology and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) support to the Department of Defense. The geolocation of the IP address corresponds to an SAIC facility in Arlington, Virginia.
Smartphone Malware
Posted by Brian in Comms, Threat Watch on 25/Oct/2012 03:59
The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out e-mail. A link within these advertisements leads to a website that is designed to push Loozfon on the user’s device. The malicious application steals contact details from the user’s address book and the infected device’s phone number.
FBI: Malware Attacking Andriod
Posted by Brian in Comms, Threat Watch on 17/Oct/2012 02:12
Malware Targets Android Smartphones
October 12, 2012
Attention smartphone users: be on guard for various types of malware attacking Android operating systems.
FBI: Smartphone Malware Safety Tips
Posted by Brian in Comms, News, Threat Watch on 13/Oct/2012 03:28
Internet Crime Complaint Center (IC3) | Smartphone Malware Safety Tips
The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims.
Citadel Malware Program
Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money
Aug. 17, 2012
– San Diego
Computer Virus: Reveton Ransomware
Posted by Brian in News, Threat Watch on 13/Aug/2012 13:01
A new Internet virus is holding computers hostage across the United States and beyond.
– FBI, This Week
New Malware Goes After Financial Information
Posted by Brian in Comms, News, Threat Watch on 10/Aug/2012 16:56
CNET reports on the new Gauss malware tool:
Gauss has unique characteristics relative to other malware. Kaspersky said it found Gauss following the discovery of Flame. The International Telecommunications Union has started an effort to identify emerging cyberthreats and mitigate them before they spread.
Latest Internet Scams
Posted by Brian in News, Threat Watch on 10/Aug/2012 02:31
- “Drive-by†malware installs easily, locks computers, and demands payment. Details
New Malware Brings Cyberwar One Step Closer
Posted by Gary in Comms, News, Threat Watch on 21/Oct/2011 03:29
From: MIT
A newly discovered piece of malicious code dubbed Duqu is closely related to the notorious Stuxnet worm that damaged Iran’s nuclear-enrichment centrifuges last year. Although it has no known target or author, it sets the stage for more industrial and cyberwar attacks, experts say.
“This is definitely a troubling development on a number of levels,” says Ronald Deibert, director of Citizen Lab, an Internet think-tank at the University of Toronto who leads research on cyberwarfare, censorship, and espionage. “In the context of the militarization of cyberspace, policymakers around the world should be concerned.”
Indeed, the spread of such code could be destabilizing. The Pentagon’s cyberwar strategy, for example, makes clear that computer attacks on industrial and civilian infrastructure like chemical factories or power grids as well as military networks could be regarded as equivalent to a conventional bombing or other attack, if civilians were endangered.
ZeuS Can Defeat Mobile Phone 2-factor Authentication
It appears now that the criminals have developed malicious software for various mobile smart phones, than can capture these (one-time password)  banking text messages, and forward them to the criminals so that they can  log into the user’s bank account.
In his blog posting, David describes analyzing such a mobile phone malware that was designed for Symbian phones.
He calls this attack, “Man-in-the-mobileâ€.