34% of malware for Android steal users’ personal data

The second half of 2011 was hot at times for cybercriminals attempting to apply the new fraud schemes in respect of mobile users. According to “Kaspersky Lab” Android platform has finally become the most popular among the creators of mobile malware, ahead of other platforms and ‘universal’ viruses based on Java. Apart from sending messages and(…)

Botnet TDL4 entered a new stage in the evolution

Lead researcher David Harley ESET said that over time, while he and his staff watched TDL4, they noted the passage of the botnet to a new stage of evolution. These changes, he said, could be a signal that a team that develops a malicious program has been replaced or that the developers have started to(…)

Doctor Web: BackDoor.Butirat steal information from computers and intercepts traffic browsers

Analysts ‘Doctor Web’ reported an increase in the number of new modifications to the family of Trojans BackDoor.Butirat. These malicious programs are able to download from the Internet and run different files, and transfer information from hackers infected computer and listen to the traffic of installed browsers. BackDoor.Butirat malware families have been known since 2010. Today in(…)

The Trojan spreads in the guise of Android.SmsSend.27 application “Kamasutra for Android”

The company “Doctor Web”, a leading developer of information security, announced that the previously known Trojan Android.SmsSend.27 now distributed under the guise of an application “Kamasutra for Android”. “Dr. Web” has been repeatedly reported malware family Android.SmsSend . Today in the Dr.Web virus database has more than 170 entries for the Trojans Android.SmsSend. Trojan Android.SmsSend.27, which was(…)

The Japanese parliament struck by trojan

Sensitive data belonging to the 480 deputies and other members of parliament, could for over a month to belong to hackers after the computers in the Japanese parliament were infected with malware. Trojan steals information entered on computers used by three members of the Lower House, and possibly the server. Trojan was fixed after the end(…)

Trojan attacks Mac built-in security

Malware developers have created a special trojan for Mac, to attack anti-virus protection built into the operating system AppleMac OS X. Flashback.C Trojan disables the component automatically update antivirus software and XProtect OS X, says security firm F-Secure. By erasing the files, a malicious program prevents further updates, creating greater the likelihood that malicious code entrenched(…)

Gmail users have been targeted for fraudulent password recovery tool

Clients attempting to recover lost or forgotten passwords Gmail, asked not to be used widely circulating Gmail Hacker Pro Software, which promises to restore the password for a fee. Mail fraud recovery passwords are not new. But specifically it can act in different guises, from simple billing fraud was discovered in GFI Labs. Gmail Hacker argues(…)

Banker Trojans learn to cheat out of band security

While financial institutions are taking on new equipment protection, hackers have time to adapt to it. In 2007, researchers found a trojan that can monitor and record key press on the computer, focusing thus on bank sites and steal money from accounts. Following his growing success, the famous Trojan Zeus quickly adapted to many systems of(…)

New Trojan for Mac OS X is hidden inside PDF

Malicious programs to Mac OS X, simply can not compete with the Windows Malicious Software on the prevalence or diversity. But, apparently, malicious programs for OS X can learn from some of the most successful schemes, which are used to trick users Windows-viruses. Researchers presented a sample of the Trojan running in OS X, which disguises(…)

Oracle downplays risk vulnerabilities

Manufacturer of software for computer security AppSec announced that Oracle produces an inadequate assessment of vulnerabilities. According to researchers Application Security (AppSec), Oracle Corporation may enter into mislead consumers about the seriousness of some of the vulnerabilities discovered in its software. “Oracle likes to downplay the risk of vulnerabilities,” – said Alex Rozeker, Director of(…)