Beware of Fake Gift Offers for Father’s Day
A lot of people are counting down the days until they can express their appreciation and love towards their dads by giving them gifts for Father’s Day, which is celebrated on June 16. Last month we...
View ArticleScammers Take Advantage of Dance Grand Prix Europe 2013
Contributor: Vivek KrishnamurthiThe International Dance Competition “Dance Grand Prix Europe” is set to begin June 12 and will be hosted in Spain. The purpose of the competition is to showcase all the...
View ArticlePhishers Now Target Real Madrid Fans
Contributor: Avdhoot PatilIt seems that targeting football clubs, football celebrities, and football events has become a habit for phishers. They continue their uncivilized activities and in particular...
View ArticleLinux Kernel Exploit Ported to Android
Malware authors are notorious for quickly leveraging new exploits in the public domain for nefarious purposes. The recent discovery of a Linux Kernel CVE-2013-2094 Local Privilege Escalation...
View ArticleMicrosoft Patch Tuesday – June 2013
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing five bulletins covering a total of 23 vulnerabilities. Nineteen of this month's issues are rated...
View ArticleBeing a Modern Fan
Friedrich Nietzsche, a German philosopher, once said that, “without music, life would be a mistake.” This resonates with me, as someone with a profound love and appreciation for music. Like many fans,...
View Article419 Scammers Eye ICC Champions Trophy 2013
The International Cricket Council (ICC) Champions Trophy 2013 is currently being held in England and Wales. The group matches are already in progress and the grand finale will be held on June 23. In...
View Article“Sakura” Site App on the Apple App Store
Japanese one-click fraud apps on Google Play made their debut at the beginning of the year and have now become a regular on the market as new variants appear on an almost daily basis. I was curious to...
View ArticleMicrosoft Office CVE-2013-1331 Coverage
The time between discovery of a vulnerability and the emergence of an exploit keeps getting shorter—sometimes a matter of only hours. This increases pressure on IT managers to rapidly patch production...
View ArticleMalware Using Fake Certificate to Evade Detection
Contributor: Hiroshi ShinotsukaMalware authors are always seeking new ways to hone their craft. As cybercriminals are facing a multitude of preventative technologies from Symantec and users are...
View ArticleSpammers Kickoff Sale for United States Independence Day
Independence Day in the United States is a federal holiday, commonly known as the 4th of July. It is traditionally celebrated with various political speeches, ceremonies, fireworks, and parades....
View ArticleThe Java Autorun Worm, Java.Cogyeka (3 of 3)
As I wrote in parts one and two of this series of blogs, Java.Cogyeka uses an autorun.inf file to propagate and download an additional module. I was able to get the downloaded module, based on a Java...
View ArticleAnother Fake Application for Android Found on Google Play
Recently we released a blog talking about the difficulties of keeping app stores free of malicious applications. Today our automated system flagged yet another example of a misleading application that...
View ArticleSpammers Playing in Wimbledon Court
The 127th edition of the Wimbledon Championships, and third Grand Slam event of the year, are coming to an end with the final being played July 7. When it comes to major sporting events we can expect...
View ArticleRise of the Java Remote Access Tools
We recently came across an attack campaign which looked quite unusual compared to the standard attacks normally seen in the wild. This campaign is targeting government agencies by sending phishing...
View ArticleRendering the Web Red with Redkit
On June 26, we observed an exploit kit attack on the Segway website. Symantec has notified Segway about the attack and Segway has since taken steps to ensure their website is no longer compromised....
View ArticleMicrosoft Patch Tuesday – July 2013
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing seven bulletins covering a total of 36 vulnerabilities. 24 of this month's issues are rated...
View ArticleAndroid Vulnerability Allows App Hijacking
A serious Android vulnerability, set to be disclosed at the Blackhat conference, has now been publicly disclosed. The vulnerability allows attackers to inject malicious code into legitimate apps...
View ArticleClose Encounters of the Shadowlock Kind
In the vein of fake computer lockers everywhere, such as the Trojan.Ransomlock, Trojan.Fakeavlock, and Trojan.Winlock families, comes Trojan.Shadowlock. Unlike any of its predecessors however, this...
View ArticleUser Ignorance of Cloud Services Poses a Data Leak Challenge
Cloud-based online services are useful tools for many enterprises, allowing them to coordinate their teams, share information and enable discussions within groups. However, companies should be sharply...
View Article