Home malware
 

Keywords :   


Tag: malware

New crimeware tool Dendroid makes it easier to create Android malware

2014-03-06 21:28:23| InfoWorld: Top News

A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware. The toolkit is called Dendroid and can be used to create "trojanized" apps -- legitimate applications with malicious code added to them -- that connect back to a command-and-control server over HTTP and allow attackers to perform a variety of malicious actions on devices that have those apps installed.

Tags: create makes tool easier

 

Android-based malware: the good, the bad, and the ugly

2014-03-05 16:18:16| InfoWorld: Top News

When it comes to mobile devices, it's well known that malware writers like to target Android. But a threat report published today by security firm F-Secure puts in perspective why Android malware attacks often flop and why Android itself is no pushover.

Tags: the good bad ugly

 
 

Pre-installed malware turns up on new Android devices

2014-03-05 13:52:35| InfoWorld: Top News

David Jevans, CTO and founder of Marble Security, recently received some bad feedback from a potential customer testing his company's product, which helps organizations manage and secure their mobile devices. "They basically said 'Your stuff doesn't work'," Jevans said. "It thinks Netflix is malicious."

Tags: devices turns malware android

 

Gameover malware tougher to kill with new rootkit component

2014-02-28 21:12:16| InfoWorld: Top News

A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, according to security researchers from Sophos. Gameover is a computer Trojan based on the infamous Zeus banking malware whose source code was leaked on the Internet in 2011. Gameover stands apart from other Zeus-based Trojan programs because it uses peer-to-peer technology for command and control instead of traditional servers, making it more resilient to takedown attempts.

Tags: component kill malware tougher

 

Android malware seen using TOR anonymity network

2014-02-26 13:54:58| InfoWorld: Top News

Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows. TOR, short for The Onion Router, is software that offers users a greater degree of privacy when browsing the Internet by routing encrypted traffic between a user and a website through a network of worldwide servers. TOR can also be used to host websites on a hidden network.

Tags: network tor malware anonymity

 

Sites : [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] next »