Some Viruses Come Pre-Installed

Mar 13, 2008 By JORDAN ROBERTSON, AP Technology Writer

(AP) -- From iPods to navigation systems, some of today's hottest gadgets are landing on store shelves with some unwanted extras from the factory - pre-installed viruses that steal passwords, open doors for hackers and make computers spew spam.



Content from The Associated Press expires 15 days after original publication date. For more information about The Associated Press, please visit www.ap.org .

Explore further: Google searches hold key to future market crashes

add to favorites email to friend print save as pdf

Related Stories

Physicists discuss quantum pigeonhole principle

3 hours ago

The pigeonhole principle: "If you put three pigeons in two pigeonholes at least two of the pigeons end up in the same hole." So where's the argument? Physicists say there is an important argument. While the ...

Giant crater in Russia's far north sparks mystery

5 hours ago

A vast crater discovered in a remote region of Siberia known to locals as "the end of the world" is causing a sensation in Russia, with a group of scientists being sent to investigate.

NASA Mars spacecraft prepare for close comet flyby

5 hours ago

NASA is taking steps to protect its Mars orbiters, while preserving opportunities to gather valuable scientific data, as Comet C/2013 A1 Siding Spring heads toward a close flyby of Mars on Oct. 19.

Giant anteaters kill two hunters in Brazil

5 hours ago

Giant anteaters in Brazil have killed two hunters in separate incidents, raising concerns about the animals' loss of habitat and the growing risk of dangerous encounters with people, researchers said.

Recommended for you

Google searches hold key to future market crashes

4 hours ago

A team of researchers from Warwick Business School and Boston University have developed a method to automatically identify topics that people search for on Google before subsequent stock market falls.

Lenovo's smart glasses prototype has battery at neck

6 hours ago

China's PC giant Lenovo last week offered a peek at its Google Glass-competing smart glass prototype, further details of which are to be announced in October. Lenovo's glasses prototype is not an extreme ...

Amazon launches 3D printing store

9 hours ago

Amazon announced Monday the launch of an online store for 3D printed items to allow consumers to customize and personalize items like earrings, pendants, dolls and other objects.

User comments : 6

Adjust slider to filter visible comments by rank

Display comments: newest first

Doug_Huffman
not rated yet Mar 13, 2008
Chinese 'economy,' the gift that keeps on giving. Hmmm, no mention of WalMart, d'ya think they are excepted or censoring the news.

Do not patronize China's client WalMart.
RichManJoe
not rated yet Mar 13, 2008
I have often wondered how easy it would be for a government to plant a sleeper virus in PCs and cell phones for disabling or creating havoc in our communication system upon command.
Argiod
1 / 5 (1) Mar 14, 2008
"It's the digital equivalent of the recent series of tainted products traced to China, including toxic toothpaste, poisonous pet food and toy trains coated in lead paint."

Obviously, China doesn't like us as much as it likes our dollars. This is what you get when you ask your enemies to make stuff for you. Looks like China hasn't forgotten the Opium Wars yet.
superhuman
not rated yet Mar 14, 2008
@RichManJoe:
It would not be that easy, luckily there are quite a few software gurus out there who know theirs computers inside out and they would quickly rise an alarm.
For example theres no way currently to communicate over the internet in a way that can be hidden from someone who is monitoring the network closely enough.

We also have Open Source which is very valuable since it gives you a safe alternative which you can always turn to.
With open source you can compile your own OS (with your own compiler written in assembler if you are paranoid enough ;).
youknowyouloveit
not rated yet Mar 14, 2008
@superhuman:
Surely secure ssh tunnels mean you can communicate without the traffic being readable.

After that a network of proxies and pass-through servers could mean all but the most determined monitoring would not even reveal the fact there was a connection at all?
superhuman
not rated yet Mar 14, 2008
Yes, you wont be able to read the traffic but the fact that the tunnel is/was established will be plainly visible, you just need to log connections which isn't hard. Most firewalls will notify you of an attempt to connect to a remote server and will also log it.