Android Fake AV Hosted in Google Code Targets South Koreans
During a final dual years we have celebrated a accelerated find of Android malware by a confidence industry. Malware authors currently mostly emanate and discharge feign “antimalware” apps that copy a...
View ArticleBitcoin Headlines Attract Malware Developers
Bitcoin issues have been front-page news in new months, generally after a startling Apr sell rate. In a latest McAfee Threats Report, for a second entertain of 2013, we plead this topic. The following...
View ArticleMalware Authors Employ Variety to Evade Security Detection
In a McAfee Labs blog we have lonesome many techniques that malware uses to hedge code-based detection. In my prior blog we discussed procedure voluntary and procession addition techniques to hedge...
View ArticleCidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good series of samples generating some engaging network trade by a programmed framework. The HTTP network settlement generated contains a few engaging parameters, names like...
View ArticleHesperus (Evening Star) Shines as Latest ‘Banker’ Trojan
Hesperus, or Hesperbot, is a newly detected landowner malware that steals user information, generally online banking credentials. In duty it is identical to other “bankers” in a wild, generally Zbot....
View ArticleAggressive Ad Module Scans Android Apps
During a slight patrols of renouned marketplaces charity Android applications we recently came opposite some questionable applications hosted on a renouned Google Play. The applications are distributed...
View ArticleAndromeda Botnet Hides Behind AutoIt
Last month, we posted a blog about an boost in a use of AutoIt scripts by malware authors to lift out antagonistic activities. Attackers have used AutoIt scripts for a prolonged time, and they are...
View ArticleVertexnet Botnet Hides Behind AutoIt
Recently we found some new malware samples regulating AutoIt to censor themselves. On serve research we found that those representation go to a Vertexnet botnet. They use mixed layers of obfuscation;...
View ArticleProduct Coverage and Mitigation for CVE-2013-3893
Microsoft Security Advisory (2887505) On Sep 17th, 2013, Microsoft published Security Advisory 2887505, that coverers a remote formula execution disadvantage in all upheld versions of Microsoft...
View ArticleVariety of Android Threats Extends Around a World
As a many renouned mobile platform, Android has grown exponentially in new years, augmenting a marketplace for new developers to uncover their skills with novel applications. However, not all...
View Article
More Pages to Explore .....