Tuesday, September 17th, 2013
A team of security researchers from the U.S. and Europe has released a paper showing how integrated circuits used in computers, military equipment and other critical systems can be maliciously compromised during the manufacturing process through virtually undetectable changes at the transistor level.
As proof of the effectiveness of the approach, ...
Posted in Hardware, Privacy, Security | No Comments
Friday, June 7th, 2013
Recently discovered malware targeting Android smartphones exploits previously unknown vulnerabilities in the Google operating system and borrows highly advanced functionality more typical of malicious Windows applications, making it the world's most sophisticated Android Trojan, a security researcher said.
The infection, named Backdoor.AndroidOS.Obad.a, isn't very widespread at the moment. The malware gives an ...
Posted in Hardware, Privacy, Security, Software | No Comments
Tuesday, May 7th, 2013
Security firm Trend Micro has seen an uptick in AutoIT-based malware thanks to the fact that it’s an easy-to-learn language that allows for quick development. It enables everything from simple scripts that change text files to scripts that perform mass downloads with complex GUIs. One commonly seen nefarious AutoIT tool ...
Posted in Coding, Internet, Security, Software, Windows | No Comments
Monday, May 6th, 2013
Trojans continue to dominate the threat landscape, according to Panda Security's latest quarterly report, released Monday.
The anti-virus maker's research arm, PandaLabs, found that between January and March of this year, more than 6.5 million new malware strains were built, with trojans comprising 75 percent of those. In total, trojans were ...
Posted in Internet, Security, Software | No Comments
Friday, June 22nd, 2012
A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell their tools. It has capabilities that let the attacker spy on the victims with actions like screen capturing, keylogging, password stealing, ...
Posted in Internet, Security | No Comments
Page 6 of 28« First«...45678...20...»Last »