Since its official debut on the market, nearly a year ago, Windows 10 has become the main discussion topic of the entire computer business. Many reported Microsoft’s inclination to cause troubles or even real damages to users with the company’s new policy about cloud computing, mandatory updates and free offers you cannot refuse, but for me Windows 10 suffers from a fundamental issue that’s even more difficult to ignore. The entire “Windows as a service” concept is utter nonsense, and if Microsoft has taken this path I don’t think I will be able to follow it.
Among the many lies cloud computing providers tell users and companies, the one about reliability and full-time availability is always the first to be proven wrong by facts. Cloud platforms go off-line almost regularly, and it matters little that the infrastructure is needed to manage applications and data in real time or that the affected provider is a hi-tech giant. Sooner or later all the remote servers vanish in a sorrowful cloud, and the user is left with his frustration for having entrusted his own business or digital life to someone who is only interested in turning them into profits.
Before the arrival of Windows 95, the creators of self-replicating malicious code were deeply concerned about the potential consequences of the new OS on the future of their activity. After the historical generation leap from DOS to the windows-based GUI, however, virus writers gained new confidence in their abilities, expanding their horizons and developing inclinations that occasionally turned into true megalomania. Some of the VXers from the Nineties had the god complex, and they didn’t hide it at all.
In April 1994 computing was still young, operating systems worked from the command line and the PC still had to become the universal phenomenon which later turned into a commodity like everything else. Microsoft was about to radically change things by releasing Windows 95, but there was another group of technophiles concerned with the generation leap from the prompt to the windows-based GUI and the consequences that it would have had on how the low-level code ran.
Trend Micro recently discovered a new malware family, classified as PE_VIRLOCK and designed as a combination of two different types of malicious code. The first type is related to a past when we still talked about computer “viruses” and not cyber-crime, while the second one is one of the most successful malware-based businesses of the past years. VIRLOCK is a ransomware which is capable of spreading through file virus techniques, and the worst part is that its evolution isn’t complete yet.
One March many years ago, when the IT industry was rather different compared to the modern one, two computer viruses brought panic because of an out-of-scale media attention. Born out of a time when the “malware” (an unknown term then) creators were largely interested in fame more than money, the viruses ended up making substantial damages valued (in one of the two cases) more than 1 billion dollars.
In an age where malicious code has turned into cyber-crime and ransomware is asking for lot of money to unlock the access to user’s files, a particular class of malware with ancient origins is still able to survive - even though it’s forced to serve the needs of the aforementioned crime. The class I am talking about is the virus or file virus one, a type of digital pathogen that raged in the MS-DOS times and then began to slowly wane when Windows appeared and Internet worms brought their worldwide epidemics.
The CryptoLocker ransomware is still raging on-line and on users and companies computers, while new details about the source of this dangerous file-abducting trojan propagation come out and willing developers are trying to hinder the infection spreading. The criminal gang which created the malware even comes up with new ways to take money from users affected by the threat, even though in doing so it is forced to contradict itself.
A new ransomware for Windows PCs is roaming on-line, it’s called CryptoLocker and brings a very dangerous destructive potential. Security enterprise Sophos warns - via Naked Security - users and system admins about the new threat, its features and the fact that the “prevention is better than a cure” rule is true now more than ever. Curing the damages of a CryptoLocker infection, Sophos warns, is impossible for the time being.
Symantec recently detected a computer threat belonging to the ransomware category, a malware that is dangerous because of the way it attacks PCs based on Windows operating systems even though it isn’t particularly complex to defeat. Trojan.Ransomlock.AF, as the malware is named, targets users of the Chinese Internet with an account on Tencent QQ (or “QQ”), an instant messaging service that is very popular within the Asian country.
Trust in your antivirus software is important, especially if you have willingly paid to purchase and install it on the PC. When the antivirus starts to sell some sort of advertising message shown after an automatic update as security, however, the aforementioned trust begins to leave place to delusion and you ask yourself who is dumber: you paying to be mocked or the genius that decided to turn a protection software into a carrier of cheap marketing.
File sharing platforms abuse by malicious code is a fashionable habit since years now. A malware usually just checks if the infected machine hosts a peer-to-peer software, but the W32.Changeup worm detected by Symantec (among the others) goes beyond and rather than searching for a P2P tool it installs its own “private” eMule copy to replicate itself. The malware is noteworthy for its ability to “assist” downloading and spreading of additional computer threats.
Computer threats are continuously evolving, and there is who would even pretend that they did the leap from the machine to man by infecting RFID microchips installed under the skin. But even though they remain a “simple” IT issue, some malicious codes are a problem difficult to tackle because of their inherent complexity and an intelligent design capable of constantly putting security companies under pressure. A remarkable “intelligent” threat is for instance Sality, the new generation file virus that according to Symantec has practically turned into an “all-in-one” malware incorporating botnet-alike functionalities as well.
The AV-Comparatives Austrian labs have just released their antivirus test for November. Following the usual practice of alternating (during the year) the analysis of the known malware detection rates and that on the antivirus software proactive capabilities, report n.24 follows the previous one related to the malware test-bed collected between January and August 2009 but, contrariwise to this last one, compares the same products to more than 23,000 new samples gathered within the week following the antivirus signatures update.
During the past weeks AV-Comparatives released the results of its latest antivirus software tests. Report n.23 follows the previous one released in May but it tackles, as the Austrian experts usually do, malware detection rates achieved by the antivirus programs when confronting a test bed of known threats.
It’s celebration time for Avira, the German security company headquartered in the little town of Tettnang best known for its renowned antivirus software. AntiVir Personal, the free antivirus offered by Avira to its customers has recently marked its tenth anniversary, and to properly celebrate the occasion the company prepared a special offer for who decided to purchase one of its commercial products within the next few days.
Austrian eighteen years old Peter Kleissner recently become famous for being the author of Stoned, the tool which exploits Master Boot Record rootkits techniques to bypass Microsoft operating systems protections and allow the execution of unauthorized code - be it legit or not. But the popularity the young programmer gained thanks to Stoned caused disagreeing reactions by security market companies.
In the last part of August, the malware known as Induc was the subject of reports and alerts from the main antivirus and security software manufacturers. Kaspersky, the Russian company that claims to have been the first to detect and report it, returns to look more closely at the issue revealing some important details on what seems like a unique case in the recent malicious software landscape.
Trend Micro, a Tokyo-based security enterprise with over 4,000 employees in more than 30 countries, has recently asked the experts from TrendLabs (its global research organization) to make an updated list of the worst computer plagues ever. The resulting list includes 5 noteworthy examples of widespread infections which represented, during their respective period of wider circulation, the most dangerous security threats users and companies could have faced.
File viruses are only a small part of nowadays malicious code diversified landscape, and yet these ancient malware designed to infect legitimate software by parasitizing its executable routines continue, every now and then, to hit the headlines with news worth the attention. The latest couple of examples of this remarkable endurance ability affects an old but still popular development environment and the most known among CAD (Computer Aided Design) programs.