Quantcast
Channel: Securelist - Information about Viruses, Hackers and Spam
Browsing latest articles
Browse All 36 View Live

Image may be NSFW.
Clik here to view.

Financial cyber threats in 2014: things changed

 Download Full Report PDF In 2013 we conducted our first in-depth research into the financial cyber-threat landscape. At that time we registered a sudden surge in the number of attacks targeting users'...

View Article



Image may be NSFW.
Clik here to view.

The Enemy on your Phone

Many people believe that there are no malware programs on smartphones. There was a time when there was some truth in this. A few years ago mobile platform operators originally designed their products...

View Article

Image may be NSFW.
Clik here to view.

Threats to Children Online: The Danger is Real

 Download Full Report PDF The Internet has long ceased to be the preserve of grown-ups. Children today are often far more active Internet users than their parents. But is it safe enough for children to...

View Article

Image may be NSFW.
Clik here to view.

SMS Trojan bypasses CAPTCHA

Late last year, we encountered an SMS Trojan called Trojan-SMS.AndroidOS.Podec which used a very powerful legitimate system to protect itself against analysis and detection. After we removed the...

View Article

Image may be NSFW.
Clik here to view.

'Locked Out'

Today the great majority of malware is created with the aim of enrichment.  One of the tactics often used by evildoers is to encrypt files and demand a ransom for their decryption. Kaspersky Lab...

View Article


Image may be NSFW.
Clik here to view.

Kaspersky Security Bulletin. Spam in 2014

The year in figures According to Kaspersky Lab, in 2014 The proportion of spam in email flows was 66.76%, which is 2.84 percentage points lower than in 2013 74.5% of spam emails were no more than 1 KB...

View Article

Image may be NSFW.
Clik here to view.

IoT Research – Smartbands

Summary Nowadays technology helps the development of hardware and software tools to record and analyze different aspects of our lives. This opens up new ways of staying aware of lifestyle and aiming to...

View Article

Image may be NSFW.
Clik here to view.

The Banking Trojan Emotet: Detailed Analysis

Introduction In the summer of 2014, the company Trend Micro announced the detection of a new threat - the banking Trojan Emotet.  The description indicated that the malware could steal bank account...

View Article


Image may be NSFW.
Clik here to view.

The Chronicles of the Hellsing APT: the Empire Strikes Back

Introduction One of the most active APT groups in Asia, and especially around the South China Sea area is "Naikon". Naikon plays a key part in our story, but the focus of this report is on another...

View Article


Image may be NSFW.
Clik here to view.

How exploit packs are concealed in a Flash object

One of the most important features of a malicious attack is its ability to conceal itself from both protection solutions and victims. The main role in performing a hidden attack is played by exploits...

View Article
Browsing latest articles
Browse All 36 View Live




Latest Images