Mac Spyware Bait: Lebenslauf für Praktitkum
As a follow up to yesterday's Kumar in the Mac post… have you received e-mail attachments such as this?Attachments: • Christmas_Card.app.zip • Content_for_Article.app.zip •...
View ArticleTwitter's 2FA: SMS Double-Duty
Twitter introduced multi-factor login verification on Wednesday. Good news? Well… that depends.Twitter's initial implementation of two-factor authentication (2FA) relies on SMS.But… Twitter also uses...
View ArticleThe Future: No Hiding Place
This week's issue of The Economist has a very interesting article.No hiding place: A plan to assess people's personal characteristics from their Twitter-streamsResearchers at IBM's Almaden Research...
View ArticleF-Secure Globe
A visualization project using some of our customer upstream data: F-Secure GlobeBy Liew Swee Meng — based on The WebGL Globe On 30/05/13 At 12:40 PM
View ArticleCoursera Offers Malware MOOC
"A massive open online course is an online course aimed at large-scale interactive participation and open access via the web." And here's a MOOC we think you'll be interested in…Coursera is offering a...
View ArticleOur Mac Team Wants Beta Users
This is Rasmus.According to his Twitter bio: he's a long-haired over-intoxicated geek from Sweden living in Finland, who likes shiny unixy things.He's a senior software engineer/developer on our Mac...
View ArticleNot the Mobile Antivirus You Were Looking For
While browsing Malaysiakini (a popular Malaysian website) on an Android phone, one of our analysts spotted this advertisement:Clicking on the ad led to an external site displaying the following:Looks...
View ArticleBad Bad Piggies On Google Play
One of these things is not like the others.No, not the "Full Guide"— we're referring to the "Bad Pigs" by Dan Stokes.The app's description:Wow. More than 10,000 installs since May 25, 2013.AppBrain,...
View ArticleFake Antivirus Scan Scam Via Google Play App Ads
Yesterday, we wrote about some very bad piggies: pirated Rovio software being used to push unwanted ads at Google Play users.What kind of ads?Here's an example from an ad-network we've been tracking...
View ArticleRogue Headlines in Google News
A spam campaign is currently abusing Google News.Search Engine Optimization (SEO) black hats are injecting "jailbreak" headlines into an iOS thread.Here's a view of the full coverage:The so-called...
View ArticlePost-PC Attack Site: Only Interested in Smartphones/Tablets
We've discovered a server that only attacks and/or spams smartphones and tablets — and not PCs.A Swedish-based colleague of ours, Johan, was recently using his (Android) phone to search for boat trips...
View ArticleDo you cover up your webcam?
(Web)camjacking is in the news.This morning from BBC News: Webcams taken over by hackers, charity warnsAs part of the report, BBC Radio 5 live interviewed a Finnish hacker who supposedly sells "female...
View ArticleThe Geography of Malware
Yesterday, Google announced on its Online Security Blog that it will now include Safe Browsing statistics in its Transparency Report.The Safe Browsing Malware Dashboard is fascinating.Here's last...
View ArticleBitcoin to Mikko's 50,000th Twitter Follower
I started on Twitter in March 2009.I never would have thought this to happen, but I've gained a remarkable amount of followers since. Thank You. In fact, with almost 50,000 followers, I'm actually one...
View ArticleAndroid Hack-Tool Steals PC Info
Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an Android app that basically turns a mobile device into a...
View ArticleRedux: Metadata Matters
The term "metadata" is nothing new to us. One year ago, we linked to the story of German Green party politician, Malte Spitz.Given current events, a refresher on just what metadata is seems useful....
View ArticleWho won the free Bitcoins?
As mentioned a week ago, I was running a competition where I would give a physical Bitcoin coin to my 50,000th follower on Twitter.Well, it happened last night. My 50,000th follower was an account...
View ArticleSigned Mac Malware Using Right-to-Left Override Trick
Right-to-left override (RLO) is a special character used in bi-directional text encoding system to mark the start of text that are to be displayed from right to left. It is commonly used by Windows...
View ArticleOn "FBI""Ransomware" and Macs
On Monday, Malwarebytes researcher Jerome Segura posted a nice write up (and video) about FBI themed ransom scams targeting users of Apple Mac OS X.The basics are as such: • Segura discovered the...
View ArticleSurveillance Will Soon Be the Lesser of Your Worries
The debate continues regarding the U.S. Government's domestic surveillance programs— which U.S. privacy advocates argue are a violation of Fourth Amendment constitutional protections.Meanwhile in...
View Article