AVM Technology In The News

AVM Technology and its professionals have been interviewed as experts by many news and media organizations. Some of these organizations include the BBC, the New York Times, the Washington Post, and others. The section below contains some of these interviews, in particular some of our regular appearances on NBC 12 On Your Side discussing computer security issues of interest to the public in general. As a computer forensics and Information Security company, AVM Technology is honored to take the lead in educating the public regarding these important computer security issues:

  • Ransomware – AVM Technology on NBC12 News

    AVM Technology recently appeared on NBC12 News in Richmond Virginia to discuss ransomware. Ransomware is a type of malware. Its purpose is to extort money from users. After getting infected, the system may become unresponsive and display a screen asking the user to pay a certain amount of money to obtain an “unlock code.” Some variants of the malware may even display an officially looking screen, claiming to be the FBI, the Department of Homeland Security, or just about any other law enforcement or government entity. The video below appeared on NBC News 12. For additional information about ransomware, including suggestions on how to remove it, you may visit AVM Technology’s ransomware post.

    Continue reading →

    AVM Technology recently appeared on NBC12 News in Richmond Virginia to discuss ransomware. Ransomware is a type of malware. Its purpose is to extort money from users. After getting infected, the system may become unresponsive and display a screen asking the user to pay a certain amount of money to obtain an “unlock code.” Some ...
  • Siri: AVM Technology and NBC12

    Recently AVM Technology had the opportunity to discuss computer security and privacy concerns associated with Apple’s digital assistant Siri. The video, as seen on NBC12 can be seen below:

    Continue reading →

    Recently AVM Technology had the opportunity to discuss computer security and privacy concerns associated with Apple’s digital assistant Siri. The video, as seen on NBC12 can be seen below:
  • Analysis of Android Malware: AVM and NBC12

    Due to our recognized expertise in computer forensics and cyber security, we were recently approached by NBC News on the topic of smart phone malware, specifically Android devices.  Android is the most widely used mobile operating software.  However, it is also vulnerable.  We tested some android apps containing malware.  The video below shows an interview of Domingo J. Rivera, VP of AVM Technology LLC discussing the topic of Android malware, specifically SpamSoldier.

     

    Continue reading →

    Due to our recognized expertise in computer forensics and cyber security, we were recently approached by NBC News on the topic of smart phone malware, specifically Android devices.  Android is the most widely used mobile operating software.  However, it is also vulnerable.  We tested some android apps containing malware.  The video below shows an interview ...
  • AVM In the News: Pacemaker Hacking

    For convenience purposes, modern pacemakers are programmed to receive commands wirelessly.  The commands are sent from medical staff through  a computer that is 30-50 feet from the pacemaker’s location.  Domingo Rivera of AVM Technology, LLC, appearing on NBC News 12 in Richmond, discussed a hacker’s ability to gain access to a pacemaker using the device’s serial number and model number, which the attacker can obtain by sending a probe to the pacemaker.  Our article discussing pacemaker hacking can be found here.  You can also watch the video of the TV interview below.

     

    Continue reading →

    For convenience purposes, modern pacemakers are programmed to receive commands wirelessly.  The commands are sent from medical staff through  a computer that is 30-50 feet from the pacemaker’s location.  Domingo Rivera of AVM Technology, LLC, appearing on NBC News 12 in Richmond, discussed a hacker’s ability to gain access to a pacemaker using the device’s ...
  • Algorithm To Track Malware: AVM Technology In The News

    Recently Domingo J. Rivera of AVM Technology appeared on NBC 12 to discuss a new algorithm to track computer malware.  The algorithm appears to be an adaptation of the method use to triangulate a caller’s location using cell phone towers. Triangulation works by figuring out the distance between a phone and three or more towers. Those three distances form the radii of three different circles, which intersect at the call’s origin. The author claims that using the algorithm, “we can find the source of all kinds of things circulating in a network just by ‘listening’ to a limited number of members of that network.”

    You may see the video below for additional details or you may read the blog post explaining the algorithm to track malware in more detail.

    Continue reading →

    Recently Domingo J. Rivera of AVM Technology appeared on NBC 12 to discuss a new algorithm to track computer malware.  The algorithm appears to be an adaptation of the method use to triangulate a caller’s location using cell phone towers. Triangulation works by figuring out the distance between a phone and three or more towers. ...
  • AVM Technology In The News Twitter Malware

    Hackers are now spreading malware through Twitter. It makes perfect sense, many Twitter users are “click happy” and the platform is somewhat more “trustworthy” than links on emails that many now recognize as spam.  There are at least two variations of the tweets: one of them is formatted as @(your username) followed by the question “It’s you on photo?” paired with a link. A second variety is very similar and just as grammatically challenged “It’s about you?” also with the link. What they have in common is that it is not about you.  The script that is executed when the link is clicked redirects to various IP addresses that in turn redirect to .CU (Cuba top-level domain), .CC, .SU (Soviet Union top-level domain even if the Soviet Union no longer exists), or .RU (Russian Top Level Domain. After all the redirects, you are treated to the Blackhole exploit kit.

    AVM Technology recently discussed this with Gray Hall from NBC 12 in Richmond, Virginia.


    You may also read more details in AVM Technology’s Blog Post.

    Continue reading →

    Hackers are now spreading malware through Twitter. It makes perfect sense, many Twitter users are “click happy” and the platform is somewhat more “trustworthy” than links on emails that many now recognize as spam.  There are at least two variations of the tweets: one of them is formatted as @(your username) followed by the question ...
  • AVM Technology In The News: BotNets

    There are a large number of Internet schemes and scams trying to get legitimate users to click on certain links. Many believe that the creators of these scams are after private information stored in your computer. While that may be true, the scenario can be more complicated. When the “payload” contained in a file of Internet website is downloaded to your computer and the malicious software executes, they control (or own) your computer. At that point, your system may become part of a bonnet with the bot master or bot herder in control of your resources.  A botnet is a collection of compromised computers, each of which is known as a ‘bot’, connected to the Internet. The botmaster or bot herder controls these compromised computers.  This may allow a hacker an opportunity to have sufficient resources and bandwidth to perpetrate larger-scale attacks or to further conceal the attacker’s real location.

    AVM Technology recently spoke to Gray Hall of NBC 12 regarding the threat presented by Botnets, see the video below:

    To read more about Botnets, you may visit AVM Technology’s Botnet blog post.

    Continue reading →

    There are a large number of Internet schemes and scams trying to get legitimate users to click on certain links. Many believe that the creators of these scams are after private information stored in your computer. While that may be true, the scenario can be more complicated. When the “payload” contained in a file of ...
  • AVM Technology In The News: “Pizza Order” Malware Scam

    Installing malware in your system is as easy as clicking in an untrusted link.  Hackers can use malware kits to create links that could give them control over your system.  In turn, they may use your computer for criminal activity.  One of these scams is a phishing scam. The person receives an email informing them of a large pizza order and affording them the opportunity to cancel.  If the user tries to cancel, they are treated to an order of malware, courtesy of Phoenix Exploit’s Kit.  We recently had an opportunity to discuss the situation with Gray Hall of NBC 12 in Richmond.  You can see the segment aired on TV below:


     

    You may also read additional information about this computer security threat by visiting AVM Technology’s blog article.

    Continue reading →

    Installing malware in your system is as easy as clicking in an untrusted link.  Hackers can use malware kits to create links that could give them control over your system.  In turn, they may use your computer for criminal activity.  One of these scams is a phishing scam. The person receives an email informing them ...

D.J.Rivera