Last week we came across a report about a Plankton variant embedded in various apps emerging in the Android Market. One of the samples we inspected is a puzzle game called Sexy Ladies-2.apk, which is detected as ANDROIDOS_PLANKTON.P along with many other apps related to it. Other external reports tell of the millions of app [...]
It’s never too early to get ready for Valentine’s day, it seems, even when it comes to malicious attacks. Recently, I came across a scam in Facebook that leverages the upcoming occasion. The said attack begins with a post on affected users’ wall inviting other users to install a Valentine’s theme into their Facebook [...]
Pete Lindstrom argues that ‘irresponsible’ disclosure of security holes in SCADA systems could put human lives at risk and calls on the security research community to start thinking about the vulnerability problem in different ways.
Read entire article
Throughout 2011, I am sure that you have heard of the compromise of RSA, in which the stolen data regarding RSA’s Secure ID appears to have been used in subsequent attacks and that there were many more victims other than RSA. You’ve probably also head of ShadyRAT, which demonstrated the longevity of command and control infrastructure as [...]
One of Apple’s chief advantages in the personal computing market has been that its Mac computers have been relatively impervious to viruses and malware, at least when compared to Windows-based PCs. But that advantage may have been more difficult to maintain in 2011–at least, according to a new report from security firm Intego.
Read entire [...]