Posts Tagged ‘malware’

postheadericon Banking malware on Google Play targets Polish banks

Besides delivering the promised functionalities, the malicious apps can display fake notifications and login forms seemingly coming from legitimate banking applications, harvest credentials entered into the fake forms, as well as intercept text messages to bypass SMS-based 2-factor authentication.

The post Banking malware on Google Play targets Polish banks appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon ESET malware researchers awarded prize in open-source memory forensics competition

The Volatility Foundation, the non-profit organization behind the Volatility Framework, sponsors the yearly Volatility Plugin Contest to acknowledge the best forensic tools built on the Volatility platform.

The post ESET malware researchers awarded prize in open-source memory forensics competition appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon New campaigns spread banking malware through Google Play

For a user, it can be difficult to figure out whether an app is malicious. First off it is always good only to install applications from the Google Play store, since most malware is still mainly spread through alternative stores.

The post New campaigns spread banking malware through Google Play appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Multi-stage malware sneaks into Google Play

In all the cases we investigated, the final payload was a mobile banking trojan. Once installed, it behaves like a typical malicious app of this kind: it may present the user with fake login forms to steal credentials or credit card details.

The post Multi-stage malware sneaks into Google Play appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Fighting persistent malware with a UEFI scanner, or ‘What’s it all about UEFI?”

The biggest news in malware so far this year has been WannaCryptor a.k.a. WannaCry, and one reason that particular ransomware spread so fast was because it used a “top secret” exploit developed by the NSA, an agency known to have dabbled in UEFI compromise.

The post Fighting persistent malware with a UEFI scanner, or ‘What’s it all about UEFI?” appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Malware in firmware: how to exploit a false sense of security

When thinking about security we generally take risk into account. It is well known that risk is a composition of likelihood and potential impact.

The post Malware in firmware: how to exploit a false sense of security appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Money-making machine: Monero-mining malware

While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.

The post Money-making machine: Monero-mining malware appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Router News Round-Up: Kaspersky Labs, Russian Malware and More

FlashRouters News Round-Up: Kaspersky Labs banned from U.S. Government facilities, Russian malware in Netgear routers, and more.

The post Router News Round-Up: Kaspersky Labs, Russian Malware and More appeared first on FlashRouters Networking & VPN Blog.

FlashRouters Networking & VPN Blog

postheadericon DownAndExec: Banking malware utilizes CDNs in Brazil

Services like Netflix use content delivery networks (CDNs) to maximize bandwidth usage. However, the CDNs might be becoming a new way of spreading malware.

The post DownAndExec: Banking malware utilizes CDNs in Brazil appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Malware coded into synthetic genomes

When I began researching this topic towards the end of 2013, I sensed a certain skepticism from the scientific community, particularly when people with different backgrounds started experimenting between disciplines, which can reveal new vectors of IT security attacks. In late 2015, when I presented my Master’s thesis (in IT security) on “Malware that infects

The post Malware coded into synthetic genomes appeared first on WeLiveSecurity


WeLiveSecurity