Skip to main content

Zeus Malware Has End-User Agreement

Probably the last thing you expect from people selling malware is an end-user agreement, that legal device to preserve copyright. But researchers at Symantec,to their astonishment, have spotted one on copies of Zeus malware.   According to the company, the conditions that are imposed include one stating that it "cannot be used for purposes otherthan which it was bought for" and another where buyers "commit to give the seller a fee for any update to the product that is not connected with errors in the work, as well as for addingadditional functionality."   Of course, you can’t enforce an end-user agreement on malware. But it’s a sign that those behind it want at least the gloss of respectability.According to Symantec’s Liam O’Murchu,   "It is hard enough to enforce your copyright in the real world, not to mention trying to enforce them in the underground. Did the authorreally think this ploy was going to work? Despite the clear licensing agreement and associated warnings, this package still ended up being traded freely in underground forums shortly after it wasreleased. It just goes to show that you can’t trust anyone in the underground these days."   But the people behind Zeus do have a sting in the tail. Where someone flouts the agreement, theywarn that they’ll end tech support and send the binary part of the software to security companies for blocking.  

Digital Trends Staff
Digital Trends has a simple mission: to help readers easily understand how tech affects the way they live. We are your…
LG unveils a monster 5K ‘bendable’ OLED gaming monitor
An UltraGear curved monitor on a desk in front of a window.

Ahead of CES 2025, LG has announced new extra-large additions to its line of UltraGear GX9 OLED gaming monitors: one being a massive, 45-inch display with a bendable panel, and the other, a 39-inch "smart" gaming monitor with webOS built-in.

Let's start with the big boy, though, because it has an impressive "world's first" designation behind it. It's the first 5K OLED monitor on the market, featuring a resolution of 5120 x 2160 -- also known as 5K2K. Not only is it the first OLED monitor in general to have a 5K resolution but it's also the first gaming monitor to launch with this higher resolution, normally reserved for high-end creator monitors like the Apple Studio Display.

Read more
Intel quietly opens preorders on new Arrow Lake CPUs
Fingers holding an Intel 285K.

With CES 2025 right around the corner, most of us expect the big announcements to arrive in a week -- but some companies are already teasing new products. In Intel's case, the manufacturer plans to add more CPUs that might compete against some of the best processors. To that end, Intel has now announced preorders for new Arrow Lake CPUs, but most of us can't get our hands on them yet.

As spotted by VideoCardz, Intel China announced that preorders for the Core Ultra 200 non-K CPUs are opening today, with availability planned for January 13. These CPUs will presumably just be non-overclockable versions of existing Arrow Lake chips, such as the Core Ultra 9 285K. In its announcement, Intel teases "new architecture" and "better power consumption."

Read more
It was a horrible year for data breaches. These were the 5 worst in 2024
Person typing on a computer keyboard.

This was a historically awful year in data breaches. We saw some record-breaking breaches this year that got the attention of the public, involving hackers accessing some very sensitive information, including Social Security numbers, credit card numbers, and more.

Let's look back at the worst cybersecurity incidents of the year and let them encourage all of us to be as prudent as we can with our activity online.
National Public Data, where hackers claim to steal 2.9 billion personal records
Background check company National Public Data, also known as Jerico Pictures, suffered one of the worst data breaches when hackers allegedly stole 2.9 billion personal records. The class action lawsuit claimed that hackers leaked critical data such as full names, addresses, and relative information to the dark web.

Read more