Blog

August 2011

The growing popularity of Android and the tendency of users to store important data on their mobile phones are attracting many hackers. They are targeting users of Google Android mobile operating system with a malicious application that harvests personal information, controls the system and sends it to a remote server....
A new malware affecting the latest version of Android operating system (2.3 – Gingerbread) is now out in the wild and masquerading as an app featuring some “Beauty of the Day” photos. The package I downloaded uses the following permissions: android.permission.READ_PHONE_STATE android.permission.READ_LOGS android.permission.DELETE_CACHE_FILES android.permission.ACCESS_CACHE_FILESYSTEM android.permission.WRITE_SECURE_SETTINGS android.permission.ACCESS_NETWORK_STATE android.permission.INTERNET android.permission.WRITE_EXTERNAL_STORAGE android.permission.MOUNT_UNMOUNT_FILESYSTEMS android.permission.READ_OWNER_DATA...
Some people are not content with being duped once and the worldwide army of fraud practitioners is happy to oblige them with a second opportunity. This second chance comes in the form of compensation to some Indian JOB SEEKERS so that they can start with their own business. This phishing...
Online job frauds just get bigger, smarter and more authentic. With so many people currently looking for jobs, there are more scammers out there than ever. It’s unfortunate that unscrupulous people try to prey on those who are looking for legitimate jobs, but it does happen. Online job boards and...
Many users have been receiving a spammy message via Facebook’s chat functionality which looks something like shown below: The messages spreading via chat are: – bist du das?? aaaaaahahahahaahahaha – hey is this your ex?? lol [LINK] – omg you look so cute [LINK] If a user clicks on the...
We have received a new Android malware from the Anrdoid market whose icon is like a Google+ app. This app is particularly dangerous as it gathers GPS data, call logs, text messages and even records phone calls before sending the information off to a remote server. After installation it asks...
A new spam email pretending to have arrived from FedEx is being discovered in the wild. This spam mail includes a subject line like “FedEX Notifications”. The mail also carries an attachment which contains details about a supposed delivery. The mail asks the user to extract this attachment. Upon extraction...
Microsoft has released two Critical updates: MS11-057 (Internet Explorer): This security update resolves 5 privately reported vulnerabilities and 2 publicly disclosed vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. Microsoft is not...
Adobe have released Bulletins and Advisories for the below products: Adobe Shockwave Player Affected software versions Shockwave Player11.6.0.626 and earlier versions for Windows and Macintosh http://www.adobe.com/support/security/bulletins/apsb11-19.html Adobe Flash Media Server Affected software versions Flash Media Server 4.0.2 and earlier versions for Windows and Linux Flash Media Server 3.5.6 and earlier...
Android allows applications to voluntarily come to the foreground or to become active while user is using another application. However, because Android’s SDK (Software Development Kit) allows apps to be pushed to the foreground, Android allows users to dismiss and override this behaviour be hitting the back button. This Android...