Blog Posts Tagged with "F-Secure"
November 06, 2012 Added by:Pierluigi Paganini
The rapid diffusion of Android devices has had the effect of increasing the number of malware developed for the OS. During the third quarter 51,447 unique samples were detected. Google has tried to secure it’s OS with the introduction of an additional security layer named Bouncer...
July 11, 2012 Added by:Headlines
"The JAR file checks if the user's machine is running in Windows, Mac or Linux then downloads the appropriate files... the three different platforms behave the same way. They all connect to 188.8.131.52 to get additional code to execute. The ports are 8080, 8081, and 8082 for OSX, Linux, and Windows respectively..."
June 18, 2012 Added by:J. Oquendo
I would like to believe that most governments have enough of a clue to avoid walking into a house like a Ninja only to bubble wrap their feet. History has shown us that they do. Does this make them innocent with regards to Flame or Stuxnet, not really, but yields more questions that don't quite add up...
May 17, 2012 Added by:Headlines
"The number of malicious Android application package files (APKs) received in Q1 2011 and in Q1 2012 reveals... an increase from 139 to 3063 counts... attributed to malware authors crafting their infected or trojanized applications to defeat anti-virus signature detection..."
April 10, 2012 Added by:Headlines
Last week Doctor Web, found that the Flashback Mac Trojan has infected almost 600,000 systems, and has created an online tool to check to see if your machine is infected. F-Secure has released instructions on how to remove the virus if you are indeed infected...
March 21, 2012 Added by:Headlines
Researchers from F-Secure released a list of the top forty banks targeted by SpyEye, one of the more powerful data-sniffing Trojans ever developed. The release of the SpyEye source code last year meant a dramatic increase in its application became a very real scenario...
December 07, 2011 Added by:Headlines
"This U3D memory corruption vulnerability could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that the vulnerability is being actively exploited in the wild in limited, targeted attacks against Adobe Reader 9.x on Windows..."
August 29, 2011 Added by:Headlines
"We don't see that many internet worms these days. It's mostly just bots and trojans. But we just found a new internet worm, and it's spreading in the wild... It uses a new spreading vector that we haven't seen before: RDP," said F-Secure...
August 26, 2011 Added by:Headlines
"The e-mail was crafted well enough to trick one of the employees to retrieve it from their Junk mail folder, and open the attached Excel file. It was a spreadsheet titled 2011 Recruitment plan.xls," said an April 1 blog posting by RSA's Head of New Technologies, Uri Rivner...
July 20, 2011 Added by:Headlines
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013