WHO: Hewlett-PackardWHAT: A batch of USB keys for HP’s line of ProLiant servers have been shipped infected with the worms W32.Fakerecy and W32.SillyFDC. Both can allow attackers to take over a system.WHERE: HP ships USB sticks with malware [CNET] (Thanks to Jimbo!)
Brian found this funny juxtaposition of a news story and a “deal” on a digital photo picture frame on techbargains.com.
The FTC has made a big to-do about fighting spammers and identity thieves, so naturally the underworld’s response has been to release a spoof FTC email into the world that is loaded with bad virus things that will attempt to steal your personal info. The FTC is urging everyone to not open this email. But you already don’t open unfamiliar attachments from people you don’t know, right? If you answered “No,” we have a shrink-wrapped hard drive from Best Buy we’d love to sell to you.
We owe Apple an apology, because it turns out they weren’t kidding when they said that opening the iPhone up to 3rd party software was just asking for trouble. That’s because the iPhone runs every single app as “root,” which is computerese for “more power than Steve Jobs.” It was this root access that made the Safari exploit possible back in July, and it can’t be fixed without a complete redesign of the firmware.
Qwest would like you to know they’ve launched some fancy new “Consumer Internet Protection.”
Ars Technica quotes a recent study by Microsoft that found that 58% of American consumers didn’t even know “online threats” existed. The study also found that of the ones that did know about said threats, 17% of them had fallen for some sort of Internet scam—and 81% of those people said it was their fault for opening suspicious emails or sending information to strange companies because they had a nice logo.
Ever wonder what’s really going on under all of that operating system? Under all the glossy veneer of Windows and the internet, a true battle is being waged: a battle for your computer. Every day you pass through a cloud of worms, viruses, and spyware as you surf the internet and do your daily tasks. Much of the time, you avoid contracting something terrible, but occasionally, you let something in.
When reached for comment, Geek Squad founder Robert Stephens said he knew nothing about 40% tech staff reduction / have-more-repairs-done-remotely-by-techs-in-India memo as described by our tipster. In fact, he said he’d like to see it if we did ever end up getting it. Anyhow, as far as staff reductions go Stephens said, “There has been restructuring since we launched within Best Buy and the most recent was back in Jan/Feb but that’s old news – and quite public.”
Red Tape Chronicles has an interesting series of articles about botnets, groups of hijacked computers that can be controlled remotely to send spam, viruses, conduct break-ins, host phishing sites, and of course, commandeer more computers. If you don’t take adequate steps to protect your computer, it could become some criminal’s slave.
And there you go: that’s how easy it is to completely brick your newly bought PC. Luckily, it’s just as easy to prevent that from happening. So here’s one for the Consumerist Kit: how to protect your computer from viral scumbags without paying a dime. This is only valid for Windows users, the suckers.
When installed on your computer, it immediately hooks itself deep into the bowels of your registry like a tapeworm. If you try to buy something online, it’ll reroute you to a different site, or try to cash in on referral credit. It hijacks pages, logs keystrokes and, from the moment it is installed, calls out over the Internet to other spyware: “There’s a party over here and everyone’s invited!”