Remote Access Tool Takes Aim with Android APK Binder
In a previous blog, we talked about the rise of remote access tools (RAT) written in Java that are capable of running on multiple operating systems. With the growing popularity of the Android operating...
View ArticlePhishers Pursue More Victims by Urging Users to Spam
Improving effectiveness of phishing bait is always at the top of any phishers’ agenda. They prefer to use bait that reflects enticing subjects in order to catch the attention of as many users as...
View ArticleDon’t Ignore the Warnings
Be honest. Do you really read the warning messages that your browser displays to you? Or do you blindly click the phishing site warnings or the SSL mismatch dialog away? Apparently most users don’t...
View ArticleRansomware Abusing Norton Logo
There are reports in the media of a particular ransomware, a type of malware, using the official Symantec Norton logo to dupe victims into believing the ransomware is verified by Symantec. This is a...
View ArticleBET VIP Concert Ticket Scam Spreading on Twitter
This weekend one of my favorite bands won free concert tickets on Twitter. They tweeted about the message they received from another Twitter user. Figure 1. Sarcastic tweet about free concert tickets...
View ArticleGoogle Glass Still Vulnerable to WiFi Hijacking Despite QR Photobombing Patch
Malicious quick response (QR) codes are not a new idea. Some readers might remember last year when it was found that a popular Android smartphone could be wiped by a malicious USSD code embedded within...
View ArticleHijacking SIM Cards through Over-the-Air Updates
We all know that mobile phones have been the focus of cybercriminals for a while now. But Trojanized mobile applications are only one attack scenario. Some problems lie even deeper in your phone....
View ArticleFirst Widespread Virus Cross-infection
After being in oblivion for a while, the Xpiro family of file infectors is back with a bang—and this time with some notorious capabilities. Not only does the new variant infect 32-bit files, it also...
View ArticleUse of Legit Online Translation Services in Pharmacy Spam
For the last few months, Symantec has been observing pharmacy related spam attacks where spammers are using the legitimate Google Translate service to avoid anti spam filters. Most of the samples...
View ArticleFirst Malicious Use of 'Master Key' Android Vulnerability Discovered
Earlier this month, we discussed the discovery of the Master Key vulnerability that allows attackers to inject malicious code into legitimate Android applications without invalidating the digital...
View ArticleRFID Information Can Be Stolen from Three Feet Away
Security consultant Fran Brown has created a hacking tool that can capture data from RFID badges from up to three feet away—a worrying development considering that up to 80 percent of US companies that...
View Article.pw Hit and Run Spam with Royal Baby Trend
Last month Symantec posted few blogs (here and here) on an increase in spam messages with .pw URLs.Since then the volume of URLs with .pw domains has considerably decreased. At the beginning of May the...
View ArticleBig Poker Player Loses High-Stakes Android Scam Game
Earlier this week, the Chiba Prefectural Police in Japan arrested nine individuals for distributing spam that included emails with links to download Android.Enesoluty - a malware used to collect...
View ArticleInternet Security Threat Report Readership Survey
Symantec’s Internet Security Threat Report (ISTR) is an annual report which provides an overview and in-depth analysis of the online security landscape over the previous year. The report is based on...
View ArticleWhen Car Hacking Turns Your Vehicle into a Video Game
Modern cars contain a lot of nifty electronic gadgets, as well as more than one kilometer of cable wired to all kinds of sensors, processing units, and electronic control units. The cars themselves...
View ArticleThe New Japanese “Not Just One-Click” Fraud on Google Play
Since the beginning of the year, Japanese one-click fraud scammers have continued to pump new apps onto Google Play and the market has struggled to keep itself clean. Though many are removed on the day...
View ArticleYet Another Bunch of Malicious Apps Found on Google Play
In a recent blog entry we covered how scammers continue to publish malicious apps on Google Play and how the Android app market is struggling to keep itself clean.In many cases it is difficult to...
View ArticleHacking Smart Homes
Kashmir Hill, a reporter for Forbes, found out just how easy it is to hack a smart home. By “Googling a very simple phrase,” Hill was presented with a list of homes with automation systems from a...
View ArticleBlackHat: Researcher to Present Details of New Automated Malware Capability...
Companies in our field of business have long wished for a better way of discovering and describing malware capabilities than the current system. Such a system would be of great benefit to everyone who...
View ArticleTor Anonymity Comes Under Attack
On August 4, websites hosted by Freedom Hosting, a service provider that offers anonymous hosting through the Tor network, began to host malicious scripts. This follows media reports from August 3...
View Article