No Picture

Here's what you should know, and do, about the Yahoo breach

September 23, 2016 Tech Guru 0

Yahoo’s announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale—it’s the largest data breach ever—and the potential security implications for users. That’s because Yahoo, unlike MySpace, LinkedIn and other online services that suffered large breaches in recent years, is an email […]

No Picture

Privacy groups urge US FTC to investigate WhatsApp promises

September 23, 2016 Tech Guru 0

The U.S. Federal Trade Commission should stop mobile messaging service WhatsApp from sharing user data with parent company Facebook in violation of earlier privacy promises, several privacy groups said. The FTC should step in to stop WhatsApp from violating “commitments the company previously made to subscribers,” the 17 groups said in a […]

No Picture

5 tech trends that have Turing Award winners worried

September 23, 2016 Tech Guru 0

Technology has considerable potential to make the world better, but those benefits are far from guaranteed. Plenty of downsides can pop up along the way, and some of them have Turing Award winners especially worried. 1. The internet echo chamber “Technology by itself is not evil, but people can use […]

abstraction_8

The banker that can steal anything

September 20, 2016 IvoryMcCauley 0

In the past, we’ve seen superuser rights exploit advertising applications such as Leech, Guerrilla, Ztorg. This use of root privileges is not typical, however, for banking malware attacks, because money can be stolen in numerous other ways that don’t require exclusive rights. However, in early February 2016, Kaspersky Lab discovered […]

smart_city_pr

Fooling the ‘Smart City’

September 15, 2016 IvoryMcCauley 0

The concept of a smart city involves bringing together various modern technologies and solutions that can ensure comfortable and convenient provision of services to people, public safety, efficient consumption of resources, etc. However, something that often goes under the radar of enthusiasts championing the smart city concept is the security […]

abstraction_9

Rooting Pokémons in Google Play Store

September 14, 2016 IvoryMcCauley 0

A few days ago we reported to Google the existence of a new malicious app in the Google Play Store. The Trojan presented itself as the “Guide for Pokémon Go”. According to the Google Play Store it has been downloaded more than 500,000 times. Our data suggests there have been […]

abstraction_10

Gugi: from an SMS Trojan to a Mobile-Banking Trojan

September 12, 2016 IvoryMcCauley 0

In the previous article, we described the mechanisms used by Trojan-Banker.AndroidOS.Gugi.c to bypass a number of new Android 6 security features. In this article, we review the entire Gugi mobile-banking Trojan family in more detail. The use of WebSocket by Gugi The mobile-banking Trojan family, Trojan-Banker.AndroidOS.Gugi is interesting due to […]

No Picture

UK police listened in to 9 percent more calls last year

September 9, 2016 Tech Guru 0

The U.K. government has published a report on the staggering scale of surveillance in the country last year. The report, compiled by the Interception of Communications Commissioner’s Office (IOCCO), covers the surveillance activities of the U.K.’s three main intelligence agencies (MI5, the Secret Intelligence Service, and GCHQ, the Government Communications […]

abstraction_4-1

A malicious pairing of cryptor and stealer

September 9, 2016 IvoryMcCauley 0

We have already seen some cryptor attacks where malicious programs with different functions have been used in combination. For example, one version of the Shade cryptor checks victim computers for signs of accounting activity; if it finds any, it doesn’t encrypt the files, but instead installs remote control tools in […]

abstraction_2

The Missing Piece – Sophisticated OS X Backdoor Discovered

September 7, 2016 IvoryMcCauley 0

In a nutshell Backdoor.OSX.Mokes.a is the most recently discovered OS X variant of a cross-platform backdoor which is able to operate on all major operating systems (Windows,Linux,OS X). Please see also our analysis on the Windows and Linux variants. This malware family is able to steal various types of data […]

abstraction_4

Banking Trojan, Gugi, evolves to bypass Android 6 protection

September 6, 2016 IvoryMcCauley 0

Almost every Android OS update includes new security features designed to make cybercriminals’ life harder. And, of course, the cybercriminals always try to bypass them. We have found a new modification of the mobile banking Trojan, Trojan-Banker.AndroidOS.Gugi.c that can bypass two new security features added in Android 6: permission-based app […]

No Picture

Suspect arrested in 5-year-old kernel.org breach

September 2, 2016 Tech Guru 0

Five years after a security breach forced the Linux Foundation to take kernel.org offline and to rebuild several of its servers, police have arrested a suspect in the case. Donald Ryan Austin, a 27-year-old computer programmer from El Portal, Florida, was arrested during a traffic stop on Aug. 28 based […]

1 2 3 63