Quantcast
Channel: F-Secure Antivirus Research Weblog
Browsing all 562 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

On Using Fake Data to Generate Alerts

Here's a tip of Mikko's from September:Tip: Insert unique fake users and customers into your production databases, then set up a Google Alert to notify you if they get leaked.— Mikko Hypponen (@mikko)...

View Article


Image may be NSFW.
Clik here to view.

Cool Exploit Kit is Related to Blackhole

Two months ago, Karmina and Timo wrote about clear similarities between the Cool and Blackhole exploit kits. Blackhole seemed to be copying (or perhaps replicating is a better word) techniques and...

View Article


Image may be NSFW.
Clik here to view.

Versions of Internet Explorer Still Vulnerable

One week ago, it wasn't yet clear if Microsoft would be able to quickly patch Internet Explorer's latest vulnerability.Microsoft Security Advisory (2794220)We now know it isn't part of January's...

View Article

On the Topic of AV Being Useless

I have lately been following and participating in discussions as to whether or not antivirus products are useless and just waste of money. And as I am employed by F-Secure, my position on the matter...

View Article

Image may be NSFW.
Clik here to view.

The Forrester Wave + Software Updater

Our Corporate Security Business team has been making a lot of smart decisions lately (or it seems so to us anyway). And that's reflected in this quarter's The Forrester Wave. Congrats guys!Another...

View Article


Obit: Aaron Swartz

Unfortunately, I didn't know much about Aaron Swartz until after his death.Of the things that I have now read about him, I think The Economist says it best: Remembering Aaron Swartz: Commons manOn...

View Article

Image may be NSFW.
Clik here to view.

Java & IE Patches + Prompts

Microsoft is releasing an out of cycle security update for users of Internet Explorer 6-8.According to Microsoft: "While we have still seen only a limited number of customers affected by the issue,...

View Article

Image may be NSFW.
Clik here to view.

Every Month is Red October

By now, you've probably read the news about "Red October" and you're wondering how worried you should be? Red October is the latest AV industry case study of digital espionage. (Kaspersky Lab's post...

View Article


Image may be NSFW.
Clik here to view.

Protecting Against Attacks Similar to "Red October"

The targeted attack campaign dubbed Red October raises an interesting question for people working on the frontline of corporate security. How to defend one's own organization against such attacks? And...

View Article


Computer Security Circa 1990

Hackers with a cause. They're a danger to your corporate network!This 1990's set of computer security films were originally produced as a wake-up call for the executives at AT&T Bell...

View Article

Image may be NSFW.
Clik here to view.

Year 2038 problem

Today is the 19th of January, 2013. Which means 19th of January, 2038 is now exactly 25 years away from us.Why does it matter? Because at 03:14:07 UTC on 19th of January 2038 we will run into the Year...

View Article

Image may be NSFW.
Clik here to view.

University Courses on Reverse Engineering and Malware Analysis

Today marks the commencement of the first lecture for our spring 2013 semester Reverse Engineering Malware course for the Aalto University (Espoo campus) in Finland.As with the previous courses we've...

View Article

Image may be NSFW.
Clik here to view.

10th Anniversary of the Slammer Worm

This is how January 25th started for us, 10 years ago:Jan 25 05:31:54 kernel: UDP Drop: IN=ppp0 SRC=207.61.242.67 DST=80.142.167.238 TTL=117 ID=30328 PROTO=UDP SPT=2201 DPT=1434 LEN=384The above...

View Article


Image may be NSFW.
Clik here to view.

Universal Plug and Pray

From the files of things that really shouldn't surprise us: Rapid 7 released a white paper today on its research of the global exposure of Universal Plug and Play (UPnP) enabled network devices.The...

View Article

Image may be NSFW.
Clik here to view.

Facebook's Graph Search: Clear Your Searches

I'm testing out Facebook's new Graph Search today.Graph Search: Friends of my friends who are women and live near Helsinki, Finland. Result: More Than 1,000 People (actually 799).Let's try something a...

View Article


Image may be NSFW.
Clik here to view.

New York Times Hit with Targetted Attacks

The New York Times had a major scoop today — on The New York Times. Turns out, they were hacked.In fact, they were hacked for several months. Chinese hackers stole the corporate passwords for every...

View Article

Image may be NSFW.
Clik here to view.

More Facebook Graph Search Suggestions

Yesterday as I was testing Facebook's Graph Search, which is in Beta, I searched for the following: women who live in Helsinki, Finland and who like sushi. (I wanted something that would get lots of...

View Article


Image may be NSFW.
Clik here to view.

What is Java technology and why do I need it?

Why do I need Java?Here's what java.com says:"Java is fast, secure, and reliable."Secure? The U.S. Department of Homeland Security doesn't seem to think so. And neither does Apple, Mozilla and...

View Article

Image may be NSFW.
Clik here to view.

Download: H2 2012 Threat Report

What's been demanding our attention in the second half of 2012? Discover the answer to that question in our H2 2012 Threat Report! It pretty much sums up all the important cases we've seen from July...

View Article

Image may be NSFW.
Clik here to view.

Update: Flash Player Exploit Targeting Macs and Windows

On Monday, we speculated that recent Java exploits may have been used to hack the Macs of Twitter employees. And today there's a Flash Player update, and Adobe reports the patched vulnerabilities are...

View Article
Browsing all 562 articles
Browse latest View live