search slide
search slide
pages bottom
Currently Browsing: Results for Tag "trojan"

Android antivirus apps are useless — here’s what to do instead

Android antivirus apps are useless — here’s what to do instead However, Android is by its very nature more secure than a desktop computer, so maybe you don’t need these security apps.The most recent Android malware report comes from Check Point, which says nearly one billion android devices have critical vulnerabilities in the underlying Linux kernel.

Video: Hillary makes ISIS deal - It's not real, says security experts

Video: Hillary makes ISIS deal - It's not real, says security experts Cyber security specialists Symantec is warning internet users about a non-existent video that reportedly features United States presidential hopeful Hillary Clinton exchanging money with ISIS.However, there is no video contained in the email, just malware, Narang says.

Video of Hillary making ISIS deal: It's not real, says security expert

Video of Hillary making ISIS deal: It's not real, says security expert Cyber security specialists Symantec is warning internet users about a non-existent video that reportedly features United States presidential hopeful Hillary Clinton exchanging money with ISIS.However, there is no video contained in the email, just malware, Narang says.

Apple patches critical security flaws used to steal encrypted data

Apple patches critical security flaws used to steal encrypted data Apple products have a reputation for security, especially compared with the systemic security flaws baked into the Android update system (or lack thereof).In the world of device security, however, no one is ever perfect, and the critical flaws that Apple patched today underscore that point.

ESET disvers new Android botnet ntrolled by Twitter

ESET disvers new Android botnet ntrolled by Twitter ESET has discovered the first-ever Twitter-controlled Android botnet.Detected by ESET as Android/Twitoor, it’s the first malicious app using Twitter instead of a traditional command-and-control (C&C) server, the company explains.

Trend Micro shows that Linux systems not so bulletproof against trojans

Trend Micro shows that Linux systems not so bulletproof against trojans It also targets Linux and IoT devices, and also acts as a botnet for DDoS attacks.Mirai targets Linux and IoT devices, particularly DVRs running Linux Firmware.

Unit 42 researchers suspect Ewind adware Trojan is 100% Russian

Unit 42 researchers suspect Ewind adware Trojan is 100% Russian The Android Ewind family has just become a little bigger, after Unit 42 researchers discovered multiple new samples of the family.According to the Unit 42 blog, threat actors are using a simple approach to distribute the adware - they’re downloading legitimate Android apps, recomposing them with malicious routines and then redistributing the apps on their own Russian language-targeted Android Application websites.

Young cybercriminals ‘more motivated by peer respect than financial gain’

Young cybercriminals ‘more motivated by peer respect than financial gain’ An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.In a case outlined by the report, one youngster told officers: “… it made me popular, I enjoyed the feeling … I looked up to those users with the best reputations”.