Malware

Pierluigi Paganini February 04, 2014
Screenlogging malware can log swipe gestures on your mobile

Security researcher Neal Hindocha has developed a Screenlogging malware that logs finger swipes on smart devices in combination with taking screenshots. Pattern lock are not enough to protect our Smartphone because  hackers are able to log swipe gestures with a malware. The news was reported by Forbes, Neal Hindocha, a senior security consultant for Trustwave, has designed a Screenlogging malware that can […]

Pierluigi Paganini February 04, 2014
Hackers use encryption to server a GameOver Zeus banking malware

Security experts at Malcovery firm have detected a new Zeus variant bypassing the security traditional defenses with the usage of encryption. Zeus malware is hard to die, the availability of its source code in the wild caused periodically the born of a new variant, even more resistant  and sophisticated. Over the years, we saw variants […]

Pierluigi Paganini February 02, 2014
Why Facebook Android App needs to read user SMS and MMS?

The last update for the Facebook Android app reads user’s text messages, is it an abuse of privilege or what else? Here you are the truth … maybe A recent update for Facebook Android raised a great concern for user’s privacy because it can read text messages on the smartphone. The climate of suspicion after the […]

Pierluigi Paganini February 01, 2014
Tor-based ChewBacca botnet is infecting POS stealing Credit Card data

Researchers at RSA discovered a new variant of Tor-based malware ‘ChewBacca’, is able to infect Point-of-Sale stealing Credit Card data. The recent data breaches at US retailers Target, Neiman Marcus and Michaels have raised the alert level of malware-based attacks against POS systems. More than one hundred million Americans is victims of scams that mainly used a malware known as BlackPOS or […]

Pierluigi Paganini January 30, 2014
Android Oldboot ,the bootkit already infected more than 500000 devices

Russian company Doctor Web detected Android.Oldboot, an  Android Trojan that resides in the memory of infected devices and starts on OS bootstrapping. The Russian security firm Doctor Web has detected the first mass distributed Android bootkit malware dubbed Android.Oldboot, its principal capability is to re-infect the Smartphone after reboot, even if all its components are […]

Pierluigi Paganini January 25, 2014
Discovered first Win trojan to serve banking Android malware on mobile

Symantec experts recently came across a Windows malicious code that attempts to infect connected Android devices serving an Android malware. Researchers at Symantec antivirus firm have discovered a malicious code that is able to infect Android mobile device with a banking malware during synchronization. The Android malware that was designed to hit Windows user could compromise user’s Smartphone during file […]

Pierluigi Paganini January 23, 2014
Spam campaign advertise WhatsApp for PC-beware it is a Trojan banker

Kaspersky Lab malware expert Dmitry Bestuzhev revealed a large-scale spam email campaign that is advertising the PC version of the mobile WhatsApp app to spread a banking trojan. A large-scale spam email campaign is advertising the PC version of the popular mobile messaging application WhatsApp, it’s a pity that the application does not actually exist […]

Pierluigi Paganini January 22, 2014
The author of BlackPOS malware professes his innocence and good faith

Thanks to efficient investigation conducted by private firms like IntelCrawler, BlackPOS author was identifyed and professes his innocence and good faith. I was within the official source to spot the 23-year-old teenager who developed the BlackPOS malware thanks to the revelations made by Cyber Intelligence firm IntelCrawler. The author of BlackPOS was known as “ree[4]” in […]

Pierluigi Paganini January 22, 2014
Sefnit botnet-Microsoft has silently uprooted Tor Browser from more than 2 Million PC

Microsoft has uprooted Tor Browser from more than 2 Million Systems to eradicate Sefnit botnet. It has done it silently without user agreement. It was August 2013 when security experts noted a spike in Tor traffic network caused by cybercriminals activities, the malware specialists discovered a botnet based on Mevade malware, in mid-August the number […]

Pierluigi Paganini January 21, 2014
SERT Q4 2013 Threat Intelligence Report on threat landscape evolution

Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape, the document is the result of a research conducted over the last three months correlating events across devices […]