malware

Once again Android Smartphone from China with pre-installed malware

Security Experts at German G Data discovered that a popular Chinese Android Smartphone, Star N9500, comes with a pre-installed spyware.…

10 years ago

Change in App permissions raises privacy and security issues

A review in the organization of app permissions made by Google could allow malicious apps to silently gain further permissions…

10 years ago

Svpeng Android ransomware is impossible to repel after the infection

Experts at Kaspersky Lab are following the evolution of Svpeng Android malware, born as banking trojan and evolved in ransomware…

10 years ago

BKDR_VAWTRAK malware uses Windows feature to defend itself

The malware specialists at Trend Micro noticed that malicious agent BKDR_VAWTRAK is abusing a Windows feature SRP to prevent victims'…

10 years ago

TROJ_POSHCODER A ransomware uses Windows PowerShell features

Malware analysts at Trendmicro have discovered a new Ransomware malware using feature of Windows PowerShell which targeted English language users.…

10 years ago

Soraya PoS Malware, a new start in criminal ecosystem

Security experts at Arbor Networks have discovered a new type of PoS malware called Soraya that implements memory scraping and…

10 years ago

A new way to bypass Secure Boot security mechanism of UEFI

Security Experts discovered a new attack method to defeat Secure Boot security mechanism of the UEFI (Unified Extensible Firmware Interface).…

10 years ago

AV alone is not enough to protect PC from zero-day malware

A recent research conducted by experts at Lastline Labs have demonstrated that AV alone is not enough to protect computers…

10 years ago

Russia and Ukraine cyber dispute analyzed by FireEye

FireEye has issued data which show the intensification of activities in the cyberspace correspondent  to geopolitical tension between Russia and Ukraine.…

10 years ago

Iranian hackers behind most elaborate spying campaign on social media

Experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social media.…

10 years ago

This website uses cookies.