Support scammers not lying about a malware infection for a change.
During our work on the development of the VBWeb tests, which will be started soon, we came across an interesting case of an infected website that served not only the Nuclear exploit kit, but also a fake blue screen of death (BSOD) that attempted to trick the user into falling for a support scam.
This Throwback Thursday, we turn the clock back to January 1994, shortly after Cyber Riot had emerged as the first virus capable of infecting the Windows kernel.
Today, malware that affects the Windows kernel is ubiquitous - the majority of sophisticated attacks against Windows users have at least one component executing in the operating system kernel. But in 1993, the Windows kernel remained untouched by malware - and indeed Windows viruses were somewhat cumbersome and technically quite simple. That was until Cyber Riot came along.
The operating system has been patched, but it is unclear whether users will receive those patches.
Researchers at mobile security firm Zimperium have discovered a remote code execution flaw in the Stagefright media library used on Android phones. The vulnerability allegedly means it could, for instance, take one MMS message for an attacker to run code on a targeted device. In some cases, if the device is old, this code could even be run with elevated system privileges.
This Throwback Thursday, we turn the clock back to 1993, when VB asked the key question: could a virus compromise safety at one of Britain's nuclear power plants?
2010 saw the discovery of Stuxnet, which targeted industrial control systems in general, with the specific target of a particular Iranian nuclear facility — but 2010 wasn't the first time VB had reported on a virus infection at a nuclear facility.