Quantcast
Channel: F-Secure Antivirus Research Weblog
Browsing all 562 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

"There's never just one cockroach in the kitchen."

There's a reaction to yesterday's post which suggests we find fault with Google for "not doing their job" by letting malware into Play.No.We didn't take Google to task on the matter of prevention....

View Article


Image may be NSFW.
Clik here to view.

Multi-platform Backdoor with Intel OS X Binary

Karmina wrote about a malware targeting multiple operating systems on Monday.The Mac OS X sample that time was a PowerPC binary. Yesterday, we received an Intel x86 version in our backend systems...

View Article


Cyber Armament

Over the last 25 years we've seen a massive change in how we think about information.In the 1980s, information was mostly still analogue. It was stored on paper, in binders, on shelves and in...

View Article

Image may be NSFW.
Clik here to view.

APTFC

"APT" is a term created by the U.S. Air Force to describe Chinese threat actors. The most common case where term APT is used is a targeted attack. Most of which are done via spoofed email messages....

View Article

Image may be NSFW.
Clik here to view.

Emails from Iran

Over the weekend, I received a series of emails from Iran. They were sent by a scientist working at the Atomic Energy Organization of Iran (AEOI). The scientist reached out to publish information...

View Article


Image may be NSFW.
Clik here to view.

1992

It's time for the annual greetings from Vegas. Yes, it's the week of Black Hat and DEF CON.This time around DEF CON is celebrating it's 20th anniversary. The very first Vegas hacker party organized by...

View Article

Image may be NSFW.
Clik here to view.

Download: Mobile Threat Report, Q2 2012

Here comes the Q2 2012 Mobile Threat Report, detailing the threats that F-Secure Labs analyzed between April to June 2012.Download your copy here: Mobile Threat Report, Q2 2012 [PDF]. On 07/08/12 At...

View Article

Image may be NSFW.
Clik here to view.

Gauss: the Latest Event in the Olympic Games

The folks at Kaspersky Lab unveiled their latest "nation state sponsored" discovery yesterday, and they call it… Gauss. It is so named because its "modules have internal names which appear to pay...

View Article


Image may be NSFW.
Clik here to view.

Recommended: An Insider's View of China and Sina Weibo

Do you want to better understand Chinese hackers? If so, then you really need to better understand China.Context matters.Rui Chenggang is the anchor of "BizChina", a business show on China's CCTV...

View Article


Image may be NSFW.
Clik here to view.

A ZeuS variant that asks: No sound? No way.

We rely on a good amount of automation and virtualization in our battle against malware. Our opponents, malware authors, know this and they frequently employ new tactics to avoid being processed by...

View Article

Image may be NSFW.
Clik here to view.

Your Source For More Sophisticated Intel

The amount of malware in the world can be counted in many different ways. Here at F-Secure Labs, we prefer a more conservative approach to enumerate threats. It seems others prefer this method as...

View Article

Image may be NSFW.
Clik here to view.

Safe Parking

Our blog reader Patrick Borsoi was travelling in Italy during the summer.In San Remo, he spotted this parking meter:Yes, that's F-Secure Antivirus. Blocking malware. On a parking meter.No, we don't...

View Article

Image may be NSFW.
Clik here to view.

Download: Threat Report H1 2012

Our summary of notable malware research is now available in our Threat Report for H1 2012, covering January to July. 2012 has seen some very significant milestones. From Mikko's foreword:"Just like...

View Article


Video: Mikko @ Hack In Paris

Mikko recently gave a keynote presentation at this year's Hack In Paris. The presentation — Where are we and Where are we Going — is now available for viewing on YouTube.The slides can be downloaded...

View Article

Image may be NSFW.
Clik here to view.

Java Runtime Environment = Perpetual Vulnerability Machine

Well folks… the perpetual vulnerability machine that is Oracle's Java Runtime Environment (JRE) has yet another highly exploitable vulnerability (CVE-2012-4681). And it's being commoditized at this...

View Article


Image may be NSFW.
Clik here to view.

Blackhole: Faster Than the Speed of Patch

And before Oracle can release a patch for the new Java zero-day exploit that we wrote about earlier today, Blackhole waltzes onto the scene with an update of its own. So the exploit kit users can now...

View Article

Image may be NSFW.
Clik here to view.

Java SE 7u7 AND SE 6u35 Released

Oracle has released an update for Java, version 1.7.0_07. Also of note, there's a version 1.6.0_35 that also patches vulnerabilities. You can download the installers from here.From Oracle:"This...

View Article


Image may be NSFW.
Clik here to view.

The t2'12 Challenge: Do you have what it takes?

Who is this woman?She (her homepage) is your first lead in cracking this year's t2'12 Challenge.It's set to be released at 10:00 EEST on September 1st. That's 8:00 AM in the U.K. – so get a good...

View Article

Image may be NSFW.
Clik here to view.

On the International Law Applicable to Cyber Warfare

The NATO Cooperative Cyber Defence Centre of Excellence (an independent "International Group of Experts") has published a draft of its not so light reading titled: The Tallinn Manual on the...

View Article

Recommended TEDTalk: Behind the Great Firewall of China

A few weeks ago, we recommended some audio reports on Chinese Microblogging and censorship.Today we discovered this related, and very entertaining, TEDTalk by Michael Anti (aka Jing Zhao):Behind the...

View Article
Browsing all 562 articles
Browse latest View live