Sophisticated Android clickfraud apps pose as iPhone apps and devices

Credit to Author: Chen Yu| Date: Thu, 06 Dec 2018 14:00:54 +0000

A collection of Android apps exhibit novel and innovative advertising fraud capabilities<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/aL1P_42frkM” height=”1″ width=”1″ alt=””/>

Read more

Chalubo botnet wants to DDoS from your server or IoT device

Credit to Author: Tim Easton| Date: Mon, 22 Oct 2018 22:01:38 +0000

Attackers using brute-force SSH attacks have started to distribute a new bot that engages in coordinated denial-of-service attacks<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/gH8Nr4BLEcA” height=”1″ width=”1″ alt=””/>

Read more

Fake Android banking apps target victims in India

Credit to Author: Pankaj Kohli| Date: Mon, 22 Oct 2018 03:30:48 +0000

Deceptive malware may have stolen thousands of Indian subcontinental bank customers’ account data or credit card numbers<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/VjeP8v3qZxE” height=”1″ width=”1″ alt=””/>

Read more

The price of a cheap mobile phone may include your privacy

Credit to Author: Chen Yu| Date: Tue, 02 Oct 2018 15:00:28 +0000

Inexpensive mobile phones may be subject to “supply chain compromise,” with Trojaned third party apps. We look at a phone that shipped with factory-installed malware<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/9yo1mhq-MZc” height=”1″ width=”1″ alt=””/>

Read more

Cryptojacking apps return to Google Play Market

Credit to Author: Pankaj Kohli| Date: Mon, 24 Sep 2018 16:01:30 +0000

At least 25 Android apps on the official Google Play store contain code that mines cryptocurrencies in the background.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/F8aH5rlcN50″ height=”1″ width=”1″ alt=””/>

Read more

Microsoft’s September patches fix a raft of serious bugs

Credit to Author: Andrew Brandt| Date: Wed, 19 Sep 2018 18:00:07 +0000

Updates for Windows and Mac users resolve more than five dozen software vulnerabilities<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/HBOC9eD3Jfo” height=”1″ width=”1″ alt=””/>

Read more

Malicious doc “builders” abandon old exploits wholesale

Credit to Author: Gabor Szappanos| Date: Tue, 11 Sep 2018 16:15:26 +0000

A key piece of the malware ecosystem adopts new vulnerabilities, and scraps old exploits, in record time<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/gKMCGkmvrcQ” height=”1″ width=”1″ alt=””/>

Read more

Intercept X defends against SettingsContent-ms abuse (video)

Credit to Author: Andrew Brandt| Date: Tue, 21 Aug 2018 16:56:34 +0000

Even using an older version of our anti-exploit technology will protect you if you open a malicious document with the CVE-2018-8414 exploit embedded in it<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/qXrxxFkjKfc” height=”1″ width=”1″ alt=””/>

Read more