Apr 3 2009

MIT Building Batteries Using Viruses

thefickler writes “Researchers at the Massachusetts Institute of Technology are now using viruses to build cathodes for Lithium-Ion batteries. Three years ago these same researchers found they could build an anode using viruses. Creating both the anode and cathode using viruses will make batteries easy to build. This nanoscale battery technology will allow batteries to be lightweight and to ‘take the shape of their container’ rather than creating containers for the batteries, which could open up new possibilities for car and electronics manufacturers.”

Read more of this story at Slashdot.

Share

Apr 2 2009

Diagnose Conficker With Web-Based Eye Chart

thomsomc writes “Joe Stewart from the Conficker Working Group has created an eye chart that allows for online identification of Conficker B and C infections. Using basic knowledge of the blacklisting that Conficker employs to avoid attempting to infect IPs that belong to popular Anti-Virus and security firms (including Microsoft), the group whipped up this very simple test to see if you can load content from the various pages. If you can see all of the images, you’re more than likely Conficker-free. According to Honeynet, ‘This detection method should be more reliable than network scanning based tests. Happy scanning!'” Related: Tech Fragments notes in passing that nothing much seems to have come of conficker’s dreaded April 1 deadline.

Read more of this story at Slashdot.

Share

Apr 1 2009

April Fools’ May Be No Joke For Computer Users

Computer experts waited early Wednesday to see what impact — if any — the worm known as Conficker.c will have on the world’s computers.”As long as you’ve patched or at least brought your antivirus software up to speed, you should be fine,” said Chris Pirillo, a tech expert for CNN.com.

Share

Mar 31 2009

60 Minutes: The Internet is infected

The Internet is infected. Malicious computer hackers have been creating more and more weapons that they plant on the Internet. They call their weapons viruses and worms – they’re creepy, crawly toxic software that contaminate our computers without our ever knowing it.

Share

Mar 29 2009

HIV Transmission Captured On Video

Technology Review has promising news on the AIDS front: researchers have captured HIV T cell transmission on video. The upshot could be new avenues of treatment. “The resulting images and videos show that, once an infected cell adheres to a healthy cell, the HIV proteins… migrate within minutes to the contact site. At that point, large packets of virus are simultaneously released by the infected cell and internalized by the recipient cell. This efficient mode of transfer is a distinct pathway from the cell-free infection that has been the focus of most prior HIV studies, and reveals another mechanism by which the virus evades immune responses that can neutralize free virus particles within the body.”

Read more of this story at Slashdot.

Share

Mar 28 2009

First email virus turns 10

The email-aware virus is turning just 10 today. Melissa, the first virus of this kind, was estimated to have infected more than one million PCs and caused damage in excess of million.

Share

Mar 27 2009

More IT Pros Could Turn To E-Crime In Poor Economy

snydeq writes to mention that a recent survey by KPMG shows that many people feel that out-of-work IT workers will be much more tempted to turn to criminal activities due to the down economy. This, coupled with an E-crime survey that shows fraud committed by managers, employees, and customers tripled between 2007 and 2008 paints an interesting picture. “In other survey results, 45 percent of respondents who handle critical national infrastructure said they are seeing an increase in the number of attacks on their systems. Fifty-one percent of respondents from the same category said the technical sophistication of those attacks is getting better. Sixty-eight percent said that of all kinds of malicious code they felt Trojan horse programs — ones that are designed to look harmless but can steal data along with other functions — had the most impact on their businesses. Rootkits are the next highest concern, followed by spyware, worms, viruses, mobile malicious code and, finally, adware.”

Read more of this story at Slashdot.

Share

Mar 24 2009

.CA Registrar Trying To Preempt Conficker

clover kicker writes “The CBC reports that the group managing Canada’s .ca internet domain is working to foil an internet worm set to attack starting April Fool’s Day. ‘This is the first virus that’s really focused on domain names as part of propagating the virus itself,’ said Byron Holland, CEO of the Canadian Internet Registration Authority, a non-profit organization that represents those who hold a .ca domain. CIRA’s strategy includes pre-emptively registering and isolating previously unregistered .ca domain names that Conficker C is expected to try and generate, said a news release issued by the group. That would make those names unavailable for anyone to register in order to set up a website to host the worm’s ‘command and control’ file. A list of the names has been predicted by security experts based on the worm’s code. In addition, CIRA is investigating and monitoring activity at names on the list that have already been registered and will ‘take appropriate action if suspicious activity is detected.'”

Read more of this story at Slashdot.

Share

Mar 21 2009

Major Rogue Anti-Virus Program Shut Down

krebsatwpost writes “TrafficConverter.biz, one of the more notorious pay-per-install affiliate programs, was dismantled this week after media attention caused Visa and Mastercard to shut down the group’s payment operations. The action comes just a few days after a report by The Washington Post that showed some affiliates were making more than 0,000 USD a week installing rogue anti-virus software. The credit card industry may have been spurred by the fact that the first version of the Conficker worm told infected systems to download a file from TrafficConverter, although the story posits that this could have been an attempted Joe Job rather than a blatant attempt to drum up more installs.”

Read more of this story at Slashdot.

Share

Mar 15 2009

Your cell phone is dirtier than a toilet. Here’s help!

Cell phones harbor thriving colonies of bacteria and viruses. Researchers say, for example, that cell phones are major carriers of superbugs in hospitals. Now, a new gadget helps you sterilize your phone! (You should also try to use a wireless Bluetooth headset.)

Share