Takeaway: From the “Wow that’s cool, hope it doesn’t happen to me” files comes news that F-Secure has discovered an Android application that will update itself and install malware known as DroidKungFu. The technique used is to install an application free of the trojan, then once installed, immediately notify the…
Mobile malware: A clear and present danger
Takeaway: A group of Berkeley researchers take a long, hard look at mobile malware. What they found should interest you. William Francis — fellow TechRepublic writer/Android investigative partner — and I research Android permissions and Android malware. Every step of the way, we have the support and guidance of experts…
1st Gaddafi malware surfaces
Barely 24 hours after former Libyan strongman Moammar Gaddafi was captured and killed, a malware attack exploiting public curiosity has surfaced. Computer security firm Sophos said the malware poses as photos of Gaddafi’s bloody death, but threatens to bleed a victim’s online bank account dry instead. “Malicious hackers have spammed…
Win32/Olmasco.R, Lampaui Kemampuan Malware Modern
JAKARTA, SENIN – Malware TDL4, alias Win32/Olmarik, ternyata terus berevolusi. Varian terbarunya, Win32/Olmasco.R, bahkan melebihi kemampuan malware modern. Ia bisa memeriksa apakah semua komponen bisa dijalankan di environment virtual di dalam sistem. Win32/Olmasco.R juga mampu mengirimkan informasi yang sudah dicopy dari komputer korban ke CC (Command Control server) selama proses…
Which is the most popular malware propagation tactic?
According to Microsoft’s recently released Security Intelligence Report, that’s socially engineered malware (scareware pop ups; blackhat search engine optimization attacks), or malware requiring user interaction such as campaigns enticing users into downloading and executing a malicious file. More propagation tactics: User Interaction required – 44.8% AutoRun USB – 26% AutoRun:…
How fast fingerprinting of OLE2 files can lead to efficient malware detection
SophosLabs experts present research describing how heuristics can help anti-virus products discern between benign and malicious OLE2 files. View full post on Naked Security – Sophos View full post on National Cyber Security
Malware found on US drone base was gaming keylogger
The malware reported last week to have infected computers used inside the Nevada Air Force base that directs US drone missile attacks has turned out to be a harmless keylogger for stealing gaming passwords. The story recounted to the Associated Press agency will calm fears that the Creech base had…
Sneaky App Masquerades as Netflix in Latest Android Malware Scare
A fake Netflix (Nasdaq: NFLX) app for Android that steals users’ data has popped up in the Android Market, according to Symantec (Nasdaq: SYMC). The security vendor has named it “Android.Fakeneflic.” The app consists of a splash screen followed by a log-in screen, which captures the victim’s information and posts…
Microsoft says most malware is your fault
So, that virus which slowed your computer to a crawl? Yeah, that was probably your fault. Microsoft says nearly half of all computer malware – viruses, worms, trojans, adware, etc. – can’t infect your computer without some sort of user interaction. In the first six months of 2011, 44.8 percent…
Malware Did Not Affect U.S. Air Force Remotely Piloted Aircraft Operations
PETERSON AIR FORCE BASE, Colo. – To correct recent reporting, the malware detected on stand-alone systems on Creech Air Force Base, Nev., in September, has not affected Remotely Piloted Aircraft operations. On 15 September, 24th AF first detected and subsequently notified Creech AFB regarding the malware on their portable hard…