Digital Activists are Building an Uncensorable Network
Scientific American's March issue has an intriguing article which explores the efforts of digital activists to circumvent corporate and governmental control over the Internet. The aim of the moment is...
View ArticleWired UK 04.12
Greetings, folks.Here's a weekend reading suggestion for you: the Labs' very own Mikko Hypponen is profiled in Wired UK magazine's April edition in an article titled _THE_DIGITAL_DETECTIVE.An iPad...
View ArticleDownload: Mobile Threat Report, Q4 2011
Yesterday, our Mobile Threat Report, covering the 4th quarter of 2011, was made available for public release — now, we share it with you. Past reports have been produced for internal use, this is our...
View ArticleWhat is the definition of cybercrime?
Two weeks ago, the "Cybersecurity Act of 2012" was introduced in the U.S. Senate.The bill (S.2105) is designed to protect critical infrastructure such as water, energy, and transportation. It directs...
View ArticleAV-TEST Results for Android Malware Protection
AV-TEST published its "Anti-Malware solutions for Android" report today.Out of 41 products tested — we're proud to be in the top tier!Because AV-TEST is still in the process of refining its test...
View ArticleCountdown to March 8th
This is the week! (No… that's not an "iPad 3" reference.)Back in November, the F.B.I. shutdown servers belonging to the DNSChanger botnet, operated by Rove Digital, which was based in Estonia. The...
View ArticleFinns Targeted By Localized Ransomware
Over the past few days we've received reports of Finns being targeted by ransomware which is localized in Finnish language and claims to be from Finnish police.The Ransomware in question is part of a...
View ArticleFound Object: SpyEye Manual
File this in the "we shouldn't be surprised" folder.This morning, one of our analysts, currently researching SpyEye, came across a new component name. And so, he did a Google search for that...
View ArticleMicrosoft's Guidance on CVE-2012-0002
First: Microsoft's Remote Desktop Protocol is disabled on Windows by default. So most computers are unaffected by issues highlighted as a result of the month's "Patch Tuesday". However: If you...
View ArticleMicrosoft's Digital Crimes Unit Targets ZeuS
Microsoft's Digital Crimes Unit expanded its legal arsenal against malicious botnets this past weekend when – in collaboration with financial services industry members – it took out servers belonging...
View ArticleA Tool Exploiting MS12-020 Vulnerabilities
Since the public release of Microsoft's MS12-020 bulletin, there have been plenty of attempts to exploit vulnerabilities in the Remote Desktop Protocol (RDP). Last week, we received a related sample,...
View ArticleWordPress Page is Loading... an Exploit
WordPress.org is being targeted once again, and although this time there isn't much sneaky sophistication, the infection is still prevalent enough for Internet users to be wary.Spam appears to be the...
View ArticleMac Malware at the Moment
It's been a while since we last wrote about Mac malware, so I thought it would be good to give our readers an update on what's been happening during the last few months. Last year we detailed a...
View ArticleSMS Spam About Premium Value Service Circulating in Finland
CERT-FI is warning about SMS messages being sent by GTradeInc which are about subscription confirmation to a premium value service. These messages are apparently being sent to random people who have...
View ArticleIs your bank on SpyEye's Top 40 list?
Variants of the SpyEye trojan target banks using a plugin called webinject.txt. We collected 1,318 samples in our back end that matched those from SpyEye Tracker's RSS Feed. Taking a look inside, we...
View ArticleAre you having a (Mac) Flashback?
On Monday, I provided steps on how to avoid your Mac being compromised by the Flashback trojan. Today I will provide information on how to locate a Flashback infection.To better understand the steps...
View ArticleMore Mac Malware (Word Exploit) Targeting NGOs
Alienvault Labs has discovered more malware that targets human rights focused Non-Governmental Organizations (NGOs). This is in addition to last week's discovery. This time, it's an exploit taking...
View ArticleWired UK: The Digital Detective
Wired UK's Greg Williams' profile of Mikko is now available at wired.co.uk.There's also a very nice online gallery of images used by the iPad/print editions of the article. On 20/03/12 At 12:22 PM
View ArticleJoe's Garage (SMB): Most Likely to be Pwned by RDP
Last week, we advised readers to apply Microsoft update MS12-020 sooner than later. For those of you that have — good work. And if you haven't yet applied the patch — stop delaying.Ever since MS12-020...
View ArticleChina Targets Macs Used by NGOs #Tibet
A new Mac backdoor exploiting CVE-2011-3544 (a Java vulnerability) is being reported. The backdoor appears to be connected to GhostNet. The malware is being used in targeted attacks against...
View Article