Taking Poika Out on the Town: 2014
Our F-Secure Client Security recently received the AV-TEST Award for Best Protection 2013.And, as the tradition goes, we took our "poika" for a tour of the town. • Best Protection 2012 • Best...
View ArticleHacker (for Facebook) on Google Play
We were recently asked about the numerous "Facebook password hacker" apps available on Google Play. We decided to take a look at one called "Hacker (for Facebook)".It's a liar right out of the gate:...
View ArticleAndroid Malware Charges For Flash Player
Fake (malicious) Flash Player apps for Android are nothing new. It's very typical bait.But recently, we came across a "Flash Installer" whose audacity is off the scale.The so-called installers are...
View ArticleObligatory "Hacker in a Hoodie" Photo
As you may already know (Poika on the Town), our Client Security was recently awarded AV-TEST's Best Protection 2013.2014 marks the third consecutive year we've won an AV-TEST Best Protection Award...
View ArticleCryptoLocker Decryption Service
Bitcoin markets have been experiencing significant ups and downs recently… so we thought we'd check on the current rate at the CryptoLocker Decryption Service. A specific keyword search located (a...
View ArticleQuestions I'd Ask RSA's Coviello
RSA's Executive Chairman, Arthur W. Coviello, gave his RSA Conference 2014 keynote on February 25th.We're at a crossroads, he said.And he called upon the nations of the world to adopt the following...
View ArticleTrustyCon Video
TrustyCon, the first "Trustworthy Technology Conference" was held yesterday in San Francisco. And Google/YouTube volunteered a camera crew. Nice! The full event can be viewed here:Mikko's presentation...
View ArticleTuesday: Threat Report Webinar
We'll be having a discussion about our forthcoming H2 Threat Report tomorrow: Tuesday, March 4th, at 15:00 GMT.The details are available via Google Plus.Including how you can view the live stream...
View ArticleDownload: Threat Report
Our Threat Report covering the second half of 2013 (with some forecasting of 2014) was released last week.You'll find it, and all of our previous reports in the Labs section of f-secure.com. On...
View ArticleHow many Beliebers will blindly click on a link?
Somebody with access to Justin Bieber's Twitter account was "hacked" on March 8th. And for a brief period of time, the attacker was able to publish as Bieber. It's hardly worth mentioning except for...
View ArticleGovernments, The Web and Surveillance
When the web became commonplace, the decision-makers ignored it, considering it irrelevant. As a result, freedom flourished online. People weren't just consuming content; they were creating it.But,...
View ArticleOn NSA Hijacking of IRC Bots
Hijacking a botnet. Is it ethical? No.Not without very careful coordination with law enforcement — and in that case, you want to shut it down.You don't want to hijack it. At least… not if you're...
View ArticleGameover ZeuS Jumps on the Bitcoin Bandwagon
We're always asking our analysts the following question: seen anything interesting? And yesterday, the answer to our query was this: Gameover ZeuS has some additional strings.Very interesting,...
View ArticleVero Phishing Sighted
It's not exactly the perfect timing for tax refunds in Finland, but that did not deter impatient phishers to do it. Earlier today, we received a tip regarding an email that has been going around...
View ArticleGameover ZeuS Targets Monster
Recently, we obtained a current Gameover ZeuS configuration file and we noticed that in addition to CareerBuilder — Gameover now also targets Monster.Here's the legit hiring.monster.com URL:A computer...
View ArticleTargeted Attacks and Ukraine
Lets start by stating that we know this blog post is dated April 1st. However, this is not an April Fools joke.In 2013, a series of attacks against European governments was observed by Kaspersky Lab....
View ArticleCoremex Innovates Search Engine Hijacking
Malware that targets search engine results is nothing new. Malicious browser extensions are also familiar (which typically contribute to stuff such as Facebook scam campaigns). But very recently,...
View ArticleApril 8th: Not Just About XP
April 8th will soon be upon us! And that means…Countdown Clocks…the end of extended support for Windows XP. But not just XP. Office 2003 is also reaching its life.And that's especially important to...
View ArticleDeepGuard 5 vs. Word RTF zero-day CVE-2014-1761
Now that we got our hands on a sample of the latest Word zero-day exploit (CVE-2014-1761), we can finally address a frequently asked question: does F-Secure protect against this threat? To find out...
View Article