Quantcast
Channel: F-Secure Antivirus Research Weblog
Browsing all 562 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

USA's Double Standard: Don't Hack Like the USA

Here's a list of companies allegedly hacked by the United States of America:  •  RealTek  •  JMicron  •  C-MediaAnd why did the United States hack three Taiwanese technology companies?To steal digital...

View Article


Image may be NSFW.
Clik here to view.

Low Hanging Fruit: Flash Player

Flash Player version 16.0.0.296 is now available.In Windows, you can check what version you have installed via Flash's Control Panel applet.According to Adobe Security Bulletin APSA15-01, users who...

View Article


Image may be NSFW.
Clik here to view.

Apple iOS 8.1.3 Terms and Conditions

This may already be old news since everybody always reads the terms and conditions of the software they install, but we sometimes don't — and we think this section of iOS 8.1.3's terms to be of...

View Article

The Message: Consent Matters

Go read this: Privacy is non-negotiable: We have the right to cover our arse — or expose itA post by Laura — whom I'm very proud to have as a colleague. On 02/02/15 At 05:15 PM

View Article

Image may be NSFW.
Clik here to view.

CTB-Locker Infections on the Rise

We have recently observed a significant increase in infections from a nasty strain of file-encrypting ransomware called CTB-Locker.Daily CTB-Locker infections in relation to the total number of such...

View Article


Image may be NSFW.
Clik here to view.

The Ear of Sauron

A recent story by The Daily Beast seems to have ignited a real firestorm over Samsung's "smart" television terms and conditions. Which is somewhat surprising to us as we read about it months ago via...

View Article

Image may be NSFW.
Clik here to view.

An Early History of the Crypto Wars

Stanford University's Alumni Association Magazine recently published a very interesting article on the early history, politics, and publication of academic (non-classified) encryption research. The...

View Article

Image may be NSFW.
Clik here to view.

The Equation Group Equals NSA / IRATEMONK

On December 29, 2013, Der Spiegel, a German weekly news magazine, published an article about an internal NSA catalogthat lists technology available to the NSA's Tailored Access Operations (TAO). Among...

View Article


Image may be NSFW.
Clik here to view.

How To Keep Your Smart Home Safe

The Internet of Things (IoT) devices can help you save time and hassle and improve your quality of life. As an example, you can check the contents of your fridge and turn on the oven while at the...

View Article


Image may be NSFW.
Clik here to view.

Malicious DNS Servers Deliver Fareit

Last year we wrote about Fareit being massively spammed.A couple of months later, they added another means of infecting systems - via malicious DNS servers.When the DNS server settings has been...

View Article

Image may be NSFW.
Clik here to view.

Is Babar a Bunny?

Lately there has been a lot of research and publicity around a strange case of Babar, a malware connected to suspected high-level espionage operation called SNOWGLOBE.SNOWGLOBE was first brought to...

View Article

Image may be NSFW.
Clik here to view.

Ransomware Report: The Rise of BandarChor

This week, we have received a number of reports on yet another ransomware, BandarChor.This ransomware is not exactly fresh. The first infections that we've noticed related to this family came in...

View Article

Image may be NSFW.
Clik here to view.

Twitter Now Tracking User IP Addresses

On Monday, I was testing our Freedome VPN for Windows and eventually… I forgot that I was using our London exit node.And then I attempted to log in to Twitter.This was the result:And then I received...

View Article


Image may be NSFW.
Clik here to view.

Nordea Phishing Campaign Continues

Just when we thought this Nordea phishing campaign is over, it reared its ugly head once again. It made its comeback on March 5th.The phishing site looks pretty similar to the actual Nordea Finnish...

View Article

Image may be NSFW.
Clik here to view.

Variants of Ransomware Targeting Video Game Files

"Free" Decryption — but you'll need to pay a ransom first.The image above is from the Web interface of a ransomware scheme that is targeting video game files (among others).Details here and...

View Article


Image may be NSFW.
Clik here to view.

Our VPN Service Takes Your Privacy Seriously

TorrentFreak recently asked "leading [VPN] providers about their logging practices and other privacy sensitive policies."Questions such as:1 — Do you keep ANY logs which would allow you to match an...

View Article

Image may be NSFW.
Clik here to view.

Remote Code Execution Possible Via Dell System Detect

Journalist John Leyden recently contacted us for our opinion on vulnerability research by Tom Forbes. The focus of Forbes' research was Dell's "System Detect" utility and a flaw that allows for remote...

View Article


Image may be NSFW.
Clik here to view.

Video: Terrorist Groups in the Online World

Given recent events, this presentation by Mikko about the possibility of terrorist groups doing online attacks seems timely.YouTube: Terrorist Groups in the Online WorldProtip: don't make yourself an...

View Article

Image may be NSFW.
Clik here to view.

Moving Around

We're reorganizing numerous teams here at F-Secure Labs, and that means moving people around between the second and third floors in our Helsinki HQ.Moving requires moving boxes and this is what the...

View Article

Image may be NSFW.
Clik here to view.

Janicab Hides Behind Undocumented LNK Functionality

Two years ago, we found a malware called Janicab. It targets both Mac and Windows OSes using Python and VBS scripts, respectively.For Windows OS, this malware was delivered via a document that...

View Article
Browsing all 562 articles
Browse latest View live