Quantcast
Channel: Symantec Connect - Security Response - Billets
Browsing all 778 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Remote Access Tool Takes Aim with Android APK Binder

In a previous blog, we talked about the rise of remote access tools (RAT) written in Java that are capable of running on multiple operating systems. With the growing popularity of the Android operating...

View Article


Image may be NSFW.
Clik here to view.

Phishers Pursue More Victims by Urging Users to Spam

Improving effectiveness of phishing bait is always at the top of any phishers’ agenda. They prefer to use bait that reflects enticing subjects in order to catch the attention of as many users as...

View Article


Image may be NSFW.
Clik here to view.

Don’t Ignore the Warnings

Be honest. Do you really read the warning messages that your browser displays to you? Or do you blindly click the phishing site warnings or the SSL mismatch dialog away? Apparently most users don’t...

View Article

Image may be NSFW.
Clik here to view.

Ransomware Abusing Norton Logo

There are reports in the media of a particular ransomware, a type of malware, using the official Symantec Norton logo to dupe victims into believing the ransomware is verified by Symantec. This is a...

View Article

Image may be NSFW.
Clik here to view.

BET VIP Concert Ticket Scam Spreading on Twitter

This weekend one of my favorite bands won free concert tickets on Twitter. They tweeted about the message they received from another Twitter user. Figure 1. Sarcastic tweet about free concert tickets...

View Article


Image may be NSFW.
Clik here to view.

Google Glass Still Vulnerable to WiFi Hijacking Despite QR Photobombing Patch

Malicious quick response (QR) codes are not a new idea. Some readers might remember last year when it was found that a popular Android smartphone could be wiped by a malicious USSD code embedded within...

View Article

Image may be NSFW.
Clik here to view.

Hijacking SIM Cards through Over-the-Air Updates

We all know that mobile phones have been the focus of cybercriminals for a while now. But Trojanized mobile applications are only one attack scenario. Some problems lie even deeper in your phone....

View Article

Image may be NSFW.
Clik here to view.

First Widespread Virus Cross-infection

After being in oblivion for a while, the Xpiro family of file infectors is back with a bang—and this time with some notorious capabilities. Not only does the new variant infect 32-bit files, it also...

View Article


Image may be NSFW.
Clik here to view.

Use of Legit Online Translation Services in Pharmacy Spam

For the last few months, Symantec has been observing pharmacy related spam attacks where spammers are using the legitimate Google Translate service to avoid anti spam filters. Most of the samples...

View Article


Image may be NSFW.
Clik here to view.

First Malicious Use of 'Master Key' Android Vulnerability Discovered

Earlier this month, we discussed the discovery of the Master Key vulnerability that allows attackers to inject malicious code into legitimate Android applications without invalidating the digital...

View Article

Image may be NSFW.
Clik here to view.

RFID Information Can Be Stolen from Three Feet Away

Security consultant Fran Brown has created a hacking tool that can capture data from RFID badges from up to three feet away—a worrying development considering that up to 80 percent of US companies that...

View Article

Image may be NSFW.
Clik here to view.

.pw Hit and Run Spam with Royal Baby Trend

Last month Symantec posted few blogs (here and here) on an increase in spam messages with .pw URLs.Since then the volume of URLs with .pw domains has considerably decreased. At the beginning of May the...

View Article

Image may be NSFW.
Clik here to view.

Big Poker Player Loses High-Stakes Android Scam Game

Earlier this week, the Chiba Prefectural Police in Japan arrested nine individuals for distributing spam that included emails with links to download Android.Enesoluty - a malware used to collect...

View Article


Internet Security Threat Report Readership Survey

Symantec’s Internet Security Threat Report (ISTR) is an annual report which provides an overview and in-depth analysis of the online security landscape over the previous year. The report is based on...

View Article

Image may be NSFW.
Clik here to view.

When Car Hacking Turns Your Vehicle into a Video Game

 Modern cars contain a lot of nifty electronic gadgets, as well as more than one kilometer of cable wired to all kinds of sensors, processing units, and electronic control units. The cars themselves...

View Article


Image may be NSFW.
Clik here to view.

The New Japanese “Not Just One-Click” Fraud on Google Play

Since the beginning of the year, Japanese one-click fraud scammers have continued to pump new apps onto Google Play and the market has struggled to keep itself clean. Though many are removed on the day...

View Article

Image may be NSFW.
Clik here to view.

Yet Another Bunch of Malicious Apps Found on Google Play

 In a recent blog entry we covered how scammers continue to publish malicious apps on Google Play and how the Android app market is struggling to keep itself clean.In many cases it is difficult to...

View Article


Image may be NSFW.
Clik here to view.

Hacking Smart Homes

Kashmir Hill, a reporter for Forbes, found out just how easy it is to hack a smart home. By “Googling a very simple phrase,” Hill was presented with a list of homes with automation systems from a...

View Article

Image may be NSFW.
Clik here to view.

BlackHat: Researcher to Present Details of New Automated Malware Capability...

Companies in our field of business have long wished for a better way of discovering and describing malware capabilities than the current system. Such a system would be of great benefit to everyone who...

View Article

Image may be NSFW.
Clik here to view.

Tor Anonymity Comes Under Attack

On August 4, websites hosted by Freedom Hosting, a service provider that offers anonymous hosting through the Tor network, began to host malicious scripts. This follows media reports from August 3...

View Article
Browsing all 778 articles
Browse latest View live