"There's never just one cockroach in the kitchen."
There's a reaction to yesterday's post which suggests we find fault with Google for "not doing their job" by letting malware into Play.No.We didn't take Google to task on the matter of prevention....
View ArticleMulti-platform Backdoor with Intel OS X Binary
Karmina wrote about a malware targeting multiple operating systems on Monday.The Mac OS X sample that time was a PowerPC binary. Yesterday, we received an Intel x86 version in our backend systems...
View ArticleCyber Armament
Over the last 25 years we've seen a massive change in how we think about information.In the 1980s, information was mostly still analogue. It was stored on paper, in binders, on shelves and in...
View ArticleAPTFC
"APT" is a term created by the U.S. Air Force to describe Chinese threat actors. The most common case where term APT is used is a targeted attack. Most of which are done via spoofed email messages....
View ArticleEmails from Iran
Over the weekend, I received a series of emails from Iran. They were sent by a scientist working at the Atomic Energy Organization of Iran (AEOI). The scientist reached out to publish information...
View Article1992
It's time for the annual greetings from Vegas. Yes, it's the week of Black Hat and DEF CON.This time around DEF CON is celebrating it's 20th anniversary. The very first Vegas hacker party organized by...
View ArticleDownload: Mobile Threat Report, Q2 2012
Here comes the Q2 2012 Mobile Threat Report, detailing the threats that F-Secure Labs analyzed between April to June 2012.Download your copy here: Mobile Threat Report, Q2 2012 [PDF]. On 07/08/12 At...
View ArticleGauss: the Latest Event in the Olympic Games
The folks at Kaspersky Lab unveiled their latest "nation state sponsored" discovery yesterday, and they call it… Gauss. It is so named because its "modules have internal names which appear to pay...
View ArticleRecommended: An Insider's View of China and Sina Weibo
Do you want to better understand Chinese hackers? If so, then you really need to better understand China.Context matters.Rui Chenggang is the anchor of "BizChina", a business show on China's CCTV...
View ArticleA ZeuS variant that asks: No sound? No way.
We rely on a good amount of automation and virtualization in our battle against malware. Our opponents, malware authors, know this and they frequently employ new tactics to avoid being processed by...
View ArticleYour Source For More Sophisticated Intel
The amount of malware in the world can be counted in many different ways. Here at F-Secure Labs, we prefer a more conservative approach to enumerate threats. It seems others prefer this method as...
View ArticleSafe Parking
Our blog reader Patrick Borsoi was travelling in Italy during the summer.In San Remo, he spotted this parking meter:Yes, that's F-Secure Antivirus. Blocking malware. On a parking meter.No, we don't...
View ArticleDownload: Threat Report H1 2012
Our summary of notable malware research is now available in our Threat Report for H1 2012, covering January to July. 2012 has seen some very significant milestones. From Mikko's foreword:"Just like...
View ArticleVideo: Mikko @ Hack In Paris
Mikko recently gave a keynote presentation at this year's Hack In Paris. The presentation — Where are we and Where are we Going — is now available for viewing on YouTube.The slides can be downloaded...
View ArticleJava Runtime Environment = Perpetual Vulnerability Machine
Well folks… the perpetual vulnerability machine that is Oracle's Java Runtime Environment (JRE) has yet another highly exploitable vulnerability (CVE-2012-4681). And it's being commoditized at this...
View ArticleBlackhole: Faster Than the Speed of Patch
And before Oracle can release a patch for the new Java zero-day exploit that we wrote about earlier today, Blackhole waltzes onto the scene with an update of its own. So the exploit kit users can now...
View ArticleJava SE 7u7 AND SE 6u35 Released
Oracle has released an update for Java, version 1.7.0_07. Also of note, there's a version 1.6.0_35 that also patches vulnerabilities. You can download the installers from here.From Oracle:"This...
View ArticleThe t2'12 Challenge: Do you have what it takes?
Who is this woman?She (her homepage) is your first lead in cracking this year's t2'12 Challenge.It's set to be released at 10:00 EEST on September 1st. That's 8:00 AM in the U.K. – so get a good...
View ArticleOn the International Law Applicable to Cyber Warfare
The NATO Cooperative Cyber Defence Centre of Excellence (an independent "International Group of Experts") has published a draft of its not so light reading titled: The Tallinn Manual on the...
View ArticleRecommended TEDTalk: Behind the Great Firewall of China
A few weeks ago, we recommended some audio reports on Chinese Microblogging and censorship.Today we discovered this related, and very entertaining, TEDTalk by Michael Anti (aka Jing Zhao):Behind the...
View Article