Internet of Things


492 articles

Malware

Poison Apple? “Kissing” picture spreads Trojan to Mac users

Poison Apple? “Kissing” picture spreads Trojan to Mac users

Malware

Poison Apple? “Kissing” picture spreads Trojan to Mac users

A picture of a smooching couple actually delivers a kiss of death to Mac OS X users - it’s a new Mac Trojan which opens a backdoor on users’ machines. It’s the second piece of Mac malware detected in a week.

Rob Waugh19 Sep 2013


Malware

"More trouble" brewing as mobile threats multiply "exponentially", ex-ISACA chief warns

"More trouble" brewing as mobile threats multiply "exponentially", ex-ISACA chief warns

Malware

"More trouble" brewing as mobile threats multiply "exponentially", ex-ISACA chief warns

Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president of security trade body ISACA has warned.

Rob Waugh18 Sep 2013


Malware

Microsoft rushes out emergency fix for Internet Explorer after “targeted attacks”

Microsoft rushes out emergency fix for Internet Explorer after “targeted attacks”

Malware

Microsoft rushes out emergency fix for Internet Explorer after “targeted attacks”

Microsoft has released an emergency fix for a vulnerability in all versions of Internet Explorer - warning that targeted attacks are already attempting to exploit it.

Rob Waugh18 Sep 2013


Malware

“Chemical Trojans” baked into circuits could offer invisible way to steal secrets

“Chemical Trojans” baked into circuits could offer invisible way to steal secrets

Malware

“Chemical Trojans” baked into circuits could offer invisible way to steal secrets

“Hardware Trojans” could be baked invisibly into circuits by attackers, allowing them to grab secret keys from computer components without fear of detection - even by advanced inspection systems using optical microscopes.

Rob Waugh17 Sep 2013


Malware, Scams

A dream job at a luxury store? Nope - just a clever $1.5 million phishing scam

A dream job at a luxury store? Nope - just a clever $1.5 million phishing scam

Malware, Scams

A dream job at a luxury store? Nope - just a clever $1.5 million phishing scam

Six Nigerian men have gone on trial today in London for an alleged phishing scam where job offers at London’s exclusive Harrods department store were used as “bait”.

Rob Waugh16 Sep 2013


Malware

Tibet-targeting Mac OS malware rears its head again

Tibet-targeting Mac OS malware rears its head again

Malware

Tibet-targeting Mac OS malware rears its head again

A new variant on a family of Mac OS X malware which targets Tibetan activists has been found in the wild and shared on the Virus Total website, where security researchers show off new “finds”.

Rob Waugh13 Sep 2013


Malware

Hesperbot - technical analysis: part 2/2

Hesperbot - technical analysis: part 2/2

Malware

Hesperbot - technical analysis: part 2/2

In this 3rd Hesperbot blog post we’ll look at the most intriguing part of the malware - the way it handles network traffic interception.

Robert Lipovsky09 Sep 2013


Malware

Hesperbot – Technical analysis part 1/2

Hesperbot – Technical analysis part 1/2

Malware

Hesperbot – Technical analysis part 1/2

Win32/Spy.Hesperbot is a new banking trojan that has been targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. For more information about its malware spreading campaigns and victims, refer to our first blog post. In this post we’ll cover the technical details of the malware, including the overall architecture, as well as the mobile component.

Robert Lipovsky06 Sep 2013


Malware

Hesperbot – A New, Advanced Banking Trojan in the Wild

Hesperbot – A New, Advanced Banking Trojan in the Wild

Malware

Hesperbot – A New, Advanced Banking Trojan in the Wild

A new and effective banking trojan has been discovered targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. It uses very credible-looking phishing-like campaigns, related to trustworthy organizations, to lure victims into running the malware.

Robert Lipovsky04 Sep 2013