Trojan captures Android.Spy.40.origin Android-smartphones

Domestic company “Doctor Web” reported an outbreak of a new Trojan Android.Spy.40.origin, designed for OS Google Android. So far, he’s seen only in South Korea, but it is unlikely he will be based in this country and beyond. Trojan Android.Spy.40.origin can leak on a smartphone is completely transparent, and even anti-virus system will not sound(…)

Symantec: New Trojan uses SPF-protocol to infect computers

Symantec has detected a new Trojan horse program that shows users fake advertisements when viewing web-pages. Trojan uses an extension of the protocol for sending email SPF (Sender Policy Framework) for instructions from intruders. This technique allows the malware to remain unnoticed by the victim’s computer. The main objective of the Trojan called Spachanel, is(…)

2013: Vulnerabilities in the software will be the main target for cybercriminals

PandaLabs has published a review of trends in computer security that are expected to prevail in 2013. Vulnerabilities in the software will be the main target for cybercriminals in the coming year. Luis Corrons, Technical Director of PandaLabs, said: “Without a doubt, this is the preferred method of infection to undetectable damage to computer systems.”(…)

Sudoku fans have been targeted by hackers

According to Sophos, scammers infect users’ computers with malware which steals sensitive information. Researchers at Sophos found that hackers have infected computers with malware for an amateur game of Sudoku. The virus steals users’  important information. Potential victims receive from intruders a table of Sudoku, which is generated on Excel. Once a user downloads a(…)

Websense: Traditional methods of protecting computer systems no longer apply

Researchers at Websense state that companies need a security system that acts in real time. Researchers from Websense submitted a report which stated the reasons for the large number of security incidents involving theft of data. The main reasons for the theft of confidential information stated by Websense is effective luring by intruders in social(…)

Scammers earn thousands of dollars to “pay the archives”

Dr.Web company reported that the market spread paid archives in recent years has grown considerably. As the manufacturer antivirus software Dr.Web, recently observed a significant increase in the number of so-called “paid archives.”Experts said the company, it is not strange, as to create a “pay-archive” user does not need to be familiar with the programmer, and you(…)

Microsoft uses a malicious software on Android for the promotion of Windows Phone

Microsoft uses the campaign against malicious software to deal with its rival, Android, promising five Windows Phone 7  to users of Android, who would tell the best stories about problems with your phone. “Once again malware for Android! Injured? Share your #droidrage history to win a new #windowsphone. 5 best (worst?) Will win a prize!”(…)

Malicious applications again waded in Android Market

Google’s security team removed at least a dozen games for smartphones with Android Market, after it was discovered that they contained a secret code, for which the owners of phones had to pay dearly for text messages that were sent to premium numbers. Malicious applications that are uploaded to the Google service developer Logastrod, disguised(…)

The number of malware samples exceed 75 million by 2012

According to McAfee, the number of new malware samples exceed 75 million by the end of the year. In the quarterly report on the threats, the company reported that the number of new models over the preliminary assessment and makes the company to change its forecast, increasing performance. Toralv Dyrr, a strategist in the security(…)

IID: malware market is entering an era of maturity

Malware and cyber criminals are increasingly focused on specific types of attacks and methods of operation, according to security firm IID. In its quarterly report on the threats, the company reported that researchers have noticed a trend toward specialization in the space of malicious programs, and many criminals are focused on one particular area of(…)