New crypto-ransomware hits macOS

Crypto-ransomware has been very popular lately amongst cybercriminals. While most of it targets the Windows desktop, we’ve also seen machines running Linux or macOS being compromised by ransomware in 2016 with, for example, KillDisk affecting Linux and KeRanger attacking OS X. Early last week, we have seen a new ransomware campaign for Mac. This new ransomware, … More New crypto-ransomware hits macOS

Released Android malware source code used to run a banking botnet

The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks. Further investigation of this resurfacing threat has uncovered its code was built using source code that was made public a couple of months ago. The previous version was detected by ESET as Trojan.Android/Spy.Banker.HU (version 1.1 … More Released Android malware source code used to run a banking botnet

Sunny with a chance of stolen credentials: Malicious weather app found on Google Play

See also Released Android malware source code used to run a banking botnet. Android users were the target of new banking malware with screen locking capabilities, which was disguised as a weather forecast app on Google Play. Detected by ESET as Trojan.Android/Spy.Banker.HU, the malware was a trojanized version of the otherwise benign weather forecast application Good … More Sunny with a chance of stolen credentials: Malicious weather app found on Google Play

Android malware: It doesn’t hurt to know about this

The most popular mobile platform in the world is Android. First introduced in 2008, it has gone on to be a major success – today, millions of devices, in over 190 countries, are powered by this mobile operation system. It’s not surprising, as it offers users a lot of benefits, including rapid innovation, a powerful … More Android malware: It doesn’t hurt to know about this

8 things you should know about spyware

Spyware is defined as a “generic term for a range of surreptitious malware such as keyloggers, remote access trojans, and backdoor trojans, especially those that allow remote surveillance of passwords and other sensitive data”. The term can also refer to “more aggressive adware”, which collects user information such as visited websites, installed applications, and other personal … More 8 things you should know about spyware

Next-gen security software: Myths and marketing

The Age of Dinosaurs There is a view of the current security market that is often recycled by the media these days. It assumes a split between ‘first-gen(eration)’ or ‘traditional’ (or even ‘fossil’ or ‘dinosaur’) malware detection technology – which is invariably claimed to rely on reactive signature detection – and (allegedly) superior technologies using … More Next-gen security software: Myths and marketing

Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected?

As of February 13th, 2017, Gmail has started deploying their new restrictive policy on .js file attachments, extending their list of file types blocked for security reasons. After the full release, Gmail users won’t be able to send or receive mail containing .js attachments, even if they’re in a compressed and archived form. Seeing that … More Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected?