Mobile Malware Threats Q3 2013 – F-Secure

As per F-Secure labs, 259 new mobile threat families and variants of existing families were discovered in the third quarter of 2013. The growing concern in Google Play are the apps that violate privacy by over collection of data.  Screenshots from below from F-Secure reports shows the threats.                 […]
Share Button
Continue reading →

L.A. Times Hit By massive Malvertising Campaign

Maladvertisers targeted L.A. Times sending its thousands of users to Blackhole exploit kit and other malicious sites. Security researcher’s from Blue Coat have discovered a set of malicious domains sending traffic to the searcherstypediscksruns dot com/.net/.org family of Blackhole sites, including adhidclick.com, ortclick.com and several other affiliated sites. These sites were registered During December 2012 […]
Share Button
Continue reading →

New Banking Trojan on the wild – Hesperbot discovered by ESET

ESET researchers have spotted a new malware spreading campaign targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom.  It uses phishing campaigns related to trustworthy organizations to infect user machines. Based on Esset analysis, the new banking Trojan Hesperbot with functionality similar to the most notorious Zeus & Spyeye. However […]
Share Button
Continue reading →

Uni-IDM ( IDSpace ) – a new anti-phishing technology tool used for Identity Management

Researchers from London’s Royal Holloway University designed a tool to fight against phishing using a tool called Uni-IDM(IDSpace). This identity management tool has been introduced to improve security and usability for user authentication. At this point in time, password based authentication has been used all over the world for authentication. As per the university research […]
Share Button
Continue reading →

ExecScent a new cyber security tool to sniff malware traffic by identifying network behavior

Researchers from Georgia Institute of Tech developed a prototype tool called ExecScent  to identify Malware traffic connecting to command and control center.  Based on the reports ExecScent discovers hundreds of infected hosts which was not known earlier.  The tool uses intelligence to identify bad traffic over the good traffic. If this tool works and is […]
Share Button
Continue reading →

Google Cloud Messaging Service being exploited by Android Malware

A Researcher at Kaspersky Lab published an article about the malicious Andoird Apps using Google Cloud Platform Messaging Service and leverage it as CnC (Control & Command Server) to carry out attacks. Kaspersky Researchers found 1,000,000 different OpFake installers disguised mostly games. The app sends several commands from both the GCM and its own C&C, […]
Share Button
Continue reading →

Zmap – open-source network scanner could scan the globe in 45 minutes making the internet look tiny

Security researchers from University of Michigan have come up with an amazing tool to scan the internet.  As per the reports, the scanner can scan the entire web in 45 minutes which sounds almost a miracle.  Often security testers used nmap for their scan which took a long time scanning their targets but this research […]
Share Button
Continue reading →

New Fake DHL Notification phishing email with ‘Shipment not delivered’ – goes around on Gmail

                                              DHL fake phishing email has been around for a while. A new set of emails has been going around since last week. Arun from Mobilesecurityrearch received a email from DHL which almost […]
Share Button
Continue reading →

SSL, gone in 30 seconds – A BREACH beyond CRIME,” presented by Angelo Prado and Neal Harris

The new attack plucks secrets from HTTPS-protected pages was demonstrated on Blackhat last Thursday. The well known “HTTPS” which protects millions of sites across the world is prone to attack. The exploit called BREACH bypasses the SSL crypto scheme protecting millions of sites. It decodes encrypted data that online banks and e-commerce sites send in […]
Share Button
Continue reading →

Malware infects from Iphone Charger

Not long ago one of my friend was skeptical of using any airport “quick phone chargers”. It was a scary concept but as technology is turning towards mobile it comes with no surprise that attackers are targeting power points.The bogus chargers which charges the phone also has transformers. The Iphone treats this as a computer […]
Share Button
Continue reading →