Some Viruses Come Pre-Installed

Mar 13, 2008 By JORDAN ROBERTSON, AP Technology Writer

(AP) -- From iPods to navigation systems, some of today's hottest gadgets are landing on store shelves with some unwanted extras from the factory - pre-installed viruses that steal passwords, open doors for hackers and make computers spew spam.



Content from The Associated Press expires 15 days after original publication date. For more information about The Associated Press, please visit www.ap.org .

Explore further: Voice, image give clues in hunt for Foley's killer

add to favorites email to friend print save as pdf

Related Stories

Dinosaur footprints set for public display in Utah

2 hours ago

A dry wash full of 112-million-year-old dinosaur tracks that include an ankylosaurus, dromaeosaurus and a menacing ancestor of the Tyrannosaurus rex, is set to open to the public this fall in Utah.

Fitbit to Schumer: We don't sell personal data

2 hours ago

The maker of a popular line of wearable fitness-tracking devices says it has never sold personal data to advertisers, contrary to concerns raised by U.S. Sen. Charles Schumer.

Dead floppy drive: Kenya recycles global e-waste

2 hours ago

In an industrial area outside Kenya's capital city, workers in hard hats and white masks take shiny new power drills to computer parts. This assembly line is not assembling, though. It is dismantling some ...

Tissue regeneration using anti-inflammatory nanomolecules

2 hours ago

Anyone who has suffered an injury can probably remember the after-effects, including pain, swelling or redness. These are signs that the body is fighting back against the injury. When tissue in the body is damaged, biological ...

Recommended for you

Voice, image give clues in hunt for Foley's killer

Aug 21, 2014

Police and intelligence services are using image analysis and voice-recognition software, studying social media postings and seeking human tips as they scramble to identify the militant recorded on a video ...

Smartphone-loss anxiety disorder

Aug 21, 2014

The smart phone has changed our behavior, sometimes for the better as we are now able to connect and engage with many more people than ever before, sometimes for the worse in that we may have become over-reliant on the connectivity ...

Why conspiracy theorists won't give up on MH17 and MH370

Aug 20, 2014

A huge criminal investigation is underway in the Netherlands, following the downing of flight MH17. Ten Dutch prosecutors and 200 policemen are involved in collecting evidence to present at the International Criminal Court in the Hague. The inv ...

Here's how you find out who shot down MH17

Aug 20, 2014

More than a month has passed since Malaysia Airlines flight MH17 crashed with the loss of all 298 lives on board. But despite the disturbances at the crash site near the small town of Grabovo, near Donetsk ...

Assange talks of leaving embassy, sowing confusion

Aug 18, 2014

WikiLeaks founder Julian Assange sowed confusion Monday with an announcement that appeared to indicate he was leaving his embassy bolt hole, but his spokesman later clarified that that would not happen unless ...

User comments : 6

Adjust slider to filter visible comments by rank

Display comments: newest first

Doug_Huffman
not rated yet Mar 13, 2008
Chinese 'economy,' the gift that keeps on giving. Hmmm, no mention of WalMart, d'ya think they are excepted or censoring the news.

Do not patronize China's client WalMart.
RichManJoe
not rated yet Mar 13, 2008
I have often wondered how easy it would be for a government to plant a sleeper virus in PCs and cell phones for disabling or creating havoc in our communication system upon command.
Argiod
1 / 5 (1) Mar 14, 2008
"It's the digital equivalent of the recent series of tainted products traced to China, including toxic toothpaste, poisonous pet food and toy trains coated in lead paint."

Obviously, China doesn't like us as much as it likes our dollars. This is what you get when you ask your enemies to make stuff for you. Looks like China hasn't forgotten the Opium Wars yet.
superhuman
not rated yet Mar 14, 2008
@RichManJoe:
It would not be that easy, luckily there are quite a few software gurus out there who know theirs computers inside out and they would quickly rise an alarm.
For example theres no way currently to communicate over the internet in a way that can be hidden from someone who is monitoring the network closely enough.

We also have Open Source which is very valuable since it gives you a safe alternative which you can always turn to.
With open source you can compile your own OS (with your own compiler written in assembler if you are paranoid enough ;).
youknowyouloveit
not rated yet Mar 14, 2008
@superhuman:
Surely secure ssh tunnels mean you can communicate without the traffic being readable.

After that a network of proxies and pass-through servers could mean all but the most determined monitoring would not even reveal the fact there was a connection at all?
superhuman
not rated yet Mar 14, 2008
Yes, you wont be able to read the traffic but the fact that the tunnel is/was established will be plainly visible, you just need to log connections which isn't hard. Most firewalls will notify you of an attempt to connect to a remote server and will also log it.