Get flash to fully experience Pearltrees
Polymorphic malware may be good at evading signature-based scanning engines, but the application of advanced algorithms to terabytes’ worth of malware dumps is enabling one Deakin University PhD student to detect even new strains of malware by assessing their similarity to existing, known malicious code. The approach is a departure from traditional signature-based antivirus approaches, which are easily defeated by the large volume of malware that modifies its structure or behaviour to avoid detection. Yet by feeding a scanning engine with massive volumes of new malware and collating the results in the cloud-based Simseer service , security researcher Silvio Cesare – who presented his research to AusCERT 2013 today – has been able to identify new malware strains by their heritage.
On July 4 TrustGo discovered new malware dubbed Trojan!MMarketPay.A@Android on China Mobile’s Mobile Market .
Kaspersky Lab discovered a new piece of malware that doesn’t create new files when infecting targeted computers, making it hard to detect.
Security software developer Symantec is stating that 13 apps by three developers could be spreading malicious code – Android.Counterclank — among as many as 5 million phones, stealing information from users. But, another security software developer — Lookout Mobile Security — believes it is just “aggressive” advertising. The Guardian has more :
In recent months, I’ve met at least three people who have been the victim of hackers who’ve taken over their Gmail accounts and sent out e-mails to everyone in the address book.
Fake videos with funny or sexual content, have long been used to entice users to download and install malware. The technique is used by hackers to convince users that they need to install additional codecs , or software , in order to play the video.
Network World - The latest social engineering trick to get victims to open malicious email attachments accuses them of being spammers and threatens to sue them if they don't stop.
Hundreds of Go Daddy sites were compromised to point towards a site hosting malware last weekend. The mass hack of around 445 sites involved the injection of hostile code into the .htaccess files of the sites.
In January of this year the security firm Sophos reported that 40% of social network users had encountered malicious attacks. Customized third-party applications used by sites such as Facebook pose additional privacy concerns. Some of these applications can steal your account credentials, post infected links to user walls, grant permissions that allow accelerated access to your profile, share and spam contacts and cause scams to go viral.
Every day that you go on the Internet there is a chance that you could unknowingly come in contact with malware. Malware authors have become quite inventive over the past few years. Using Google image search hacks to spread malware was a very effective campaign that delivered fake anti-virus earlier this month.
We have been hearing a lot of tech news lately about how malware can infect any computer (Mac’s included) because web-based attacks are in. Yesterday, Steven J.
Last week a friend was searching Google images and with just one click on the wrong image, he was redirected to a malicious domain.
Closing the loop February 21, 2011