Why Motivated Attackers Often Get What They Want
Do you work for a company possessing information which could be of financial value to people outside the organization? Or, perhaps even a foreign state would find it useful to gain access to the...
View ArticleFacebook Name Search Changes
Facebook is changing a privacy setting. Shocking, right? Anyway, the setting is not used by most people and is called: who can look up your timeline by name. Here's the justification from...
View ArticleMicrosoft Security Advisory (2896666) #APT
On Monday, we wrote about motivated attackers. And yesterday, Microsoft issued a Security Advisory about a vulnerability which is being exploited "largely in the Middle East and South Asia."Microsoft...
View ArticleMobile Security Webcast: 8.11 17.00 EET
It's a good thing that I follow @FSecure's Twitter account, because apparently I'm doing a webcast with Mikko on Friday.Mobile security is the topic of discussion.I vaguely remember agreeing to it...
View ArticleF-Secure Corporation's Answer to Bits of Freedom
We received a letter sent by Bits of Freedom and signed by 25 different parties, who were interested in our policy on the use of our software for the purpose of state surveillance. The same letter was...
View ArticleDeepGuard 5 vs. the CVE-2013-3906 Zero-Day Exploit
On Wednesday, we noted a zero-day vulnerability in the Microsoft Graphics component. The vulnerability is being actively exploited in targeted attacks using Word documents.Long story short, here's a...
View ArticleNew Release of Our Free Android Permissions Dashboard
F-Secure App Permissions, our Android permissions dashboard, launched on November 1st. And in just under one week, there are thousands of installs and extremely positive feedback. Thank you! The...
View ArticleDon't do business with these companies
What do Inteqno, Altran Strategies, Deticaconsulting and Nezux have in common?Well, first of all, they are all one and the same. Or actually, none of them are real companies at all. They are phony...
View ArticleCryptoLocker: Better Back Up Your Stuff
If you haven't heard much about "CryptoLocker" yet… you will.Unlike much of the ransomware we've written about in the past, CryptoLocker doesn't attempt to use police themed trickery or other sleight...
View ArticleCryptoLocker: Please Kindly Find Our New PO
Yesterday's CryptoLocker post mentioned that it's spreading via spam. It's actually a spam campaign that installs an intermediary, and then CryptoLocker is installed. But in any case, the first link...
View ArticleCryptoLocker: Pac-Man Fever
Two things about CryptoLocker.1. The price of Bitcoin has been wildly volatile lately. And that type of commodity volatility affects Bitcoin's ability to act as a currency because prices are quickly...
View ArticleCryptoLocker: Your "Order" is Being Processed
Today we uploaded a CryptoLocker encrypted file to its "Decryption Service".We were promptly provided our Order ID:We've read that a public/private key pair match can take up to 24 hours. But ours was...
View ArticleBitcoin Fraud Gets Connected
Bitcoin, and other digital currencies such as Litecoin and Peercoin, will change the way we exchange money. But they come with a major flaw: they can also be used to turn infected computers into...
View ArticleGood Passwords are KEY
Today marks the official launch date of F-Secure KEY. (Our new password assistant application.)But we're guessing that it hardly feels like an especially busy day for product manager Juha Torkkel....
View ArticleOne Decade Ago
If you were running Windows on your computer 10 years ago, you were running Windows XP.In fact, you were most likely running Windows XP SP1 (Service Pack 1).This is important, as Windows XP SP1 did...
View ArticleSharking: High-Rollers in the Crosshairs
We get a lot of samples here at F-Secure Labs, most of them being submitted online. But every now and then, somebody visits one of our labs and brings along their computer for forensics.Earlier this...
View ArticleHoliday Shopping Tip: Replace Windows XP!
Christmas! It's approaching quickly.And something else is looming on the horizon… the end is nigh for Windows XP!Support ends on April 8, 2014.If you're still using XP, please do yourself a big favor...
View ArticleWe're Hiring: Apply Now, Lots of Perks
Today I looked out my 2nd floor window and spied Pekka Usva having lunch in a small ad hoc meeting room.And that reminded me…I read an e-mail of his last week (while home, attempting to recover from...
View ArticleTED Talk, in Your Language
All talks on TED.COM are translated to various languages. And all this work is done by volunteer TED Translators.My talk on NSA Surveillance has now been translated to following...
View ArticleAn Open Letter to the Chiefs of EMC and RSA
23rd of December 2013An Open Letter to:Joseph M. Tucci - Chairman and Chief Executive Officer, EMCArt Coviello - Executive Chairman, RSADear Joseph and Art,I dont expect you to know who I am.Ive...
View Article