Unlock Your Phone's Hidden Features!... Not.
Yesterday, we stumbled across this ad from an Android-related site:Clicking this led to a malicious Android Market:Samples found here are detected as Trojan:Android/FakeNotify.A. As usual, other...
View ArticleMac Malware Summary 2011 (Q2/Q3/Q4)
Brod, a researcher on our Threat Research team has been tasked with tracking emerging Mac based threats. Microsoft Excel is one of the tools he uses to chart variants. From April to December 2011,...
View ArticleWhat the heck is SOPA?
We're sure that most of you have at least heard of SOPA. Major websites such as Wikipedia have blacked out sections of their content today to raise awareness.In some locations, Google has blacked out...
View ArticlePole Position: Poland Attacked by Anti-ACTA Hackers
There's breaking news coming out of Poland. Hackers, reportedly associated with Anonymous, have been attacking Polish government websites to protest this week's scheduled signing of the...
View ArticleFacebook Spammers Use Amazon's Cloud
Facebook is recently doing a decent job at keeping survey spam posts at bay (all things considered).So, what's an entrepreneurial Facebook spammer to do? Well, some have tweaked their master plan, and...
View ArticleCracking Polish Passwords
Many of the sites that we blogged about on Monday are still offline after being targeted by DDoS attacks. Hackers have promised to continue until the 26th.According to Polskie Radio: "Over a thousand...
View ArticleAndroid malware employs steganography? Not quite...
Amidst my usual adventure with Android malware analysis, I saw this snippet of code while skimming through a particular sample's class modules. Figure 1Late last year, I was looking deeper into...
View ArticleSeems Legit
Here's a clip from a US TV show called "Bones".In it, a computer virus crashes a computer. And sets it on fire. The virus got in via a fractal. Embedded on a bone of a shooting victim.Seems Legit. On...
View ArticleTrojan:Android/OpFake.D still encodes its config file
We've been seeing cases of malware that first debuted on other operating systems being ported over to Android. Here's another trojan that fits the bill.Opfake was first found on Symbian and Windows...
View ArticleLaptop Stickers 2012: Vote!
Several weeks ago, we asked members of our community forums, and our blog readers to submit ideas for a new set of F-Secure Labs Laptop Stickers. Well, we finally find some time to pick the...
View ArticleAnonymous Leaks FBI Conference Call
Breaking: a faction of Anonymous has released an MP3 recording of an FBI conference call which took place on January 17th.During the call, which is currently posted on YouTube, members of the USA's...
View ArticleHow to Explain Man-in-the-Browser Attacks
With a 2-minute video, BBC News program "Click" does a very decent job explaining to the laymen how banking trojans such as ZeuS attempt to avoid detection by antivirus software: Click to watch On...
View ArticleVideo: DarkMarket
Author Misha Glenny was interviewed by broadcast journalist Charlie Rose recently. The majority of discussion was based on Misha's current book, DarkMarket: Cyberthieves, Cybercops and You.The...
View ArticleLaptop Stickers 2012: Last Call
There's only one day left to vote in our laptop sticker poll.Here's a screenshot of the front runners:Given the popularity of Mikko's recent post, we thought "Seems legit" would be at the top…Almost...
View ArticleCryptome hacked
Cryptome.org is a website that has focused on publishing information about freedom of speech, cryptography, spying, and surveillance. In many ways, Cryptome is similar to Wikileaks - except it has...
View ArticleAvi Rubin: All Your Devices Can Be Hacked
Avi Rubin, a Computer Science professor at Johns Hopkins University, recently gave an informative (and quite fun) presentation at TEDxMidAtlantic. Rubin's talk summarized the results of efforts to...
View ArticleMountain Lion's Gatekeeper: More Control For "You"
Yesterday, Apple released Mac OS X Mountain Lion Developer Preview. From a security perspective, its most interesting new feature is Gatekeeper, which restricts installation of downloaded applications...
View ArticleTaking Poika Out on the Town Again
A year ago, we won the AV-Comparatives Product of the Year award. As a result, we blogged about "Taking Poika Out on the Town" where the award found itself in various places around Helsinki.Well,...
View ArticleNetwork Security, Circa 1990
AT&T recently released a film from its archive called "Computer Security: You Make The Difference".While you might chuckle at the 1990's music and production values – the truth is this – many of...
View ArticleNightline Takes "A Trip to The iFactory"
Nightline, a U.S. news program, will air what's being billed as a special episode this evening on the ABC network. In it, Nightline Co-Anchor Bill Weir will tour Foxconn's factory floor. If you...
View Article