Blog

Malware

In the battle against Internet Scammers, Microsoft opened a new front using the power of a U.S. court to deal a knockout blow to an emerging botnet and taking a provider of free Internet domains offline. Microsoft got the order from the U.S. District Court for the Eastern District of...
Our research team came across a Worm file, which upon execution wriggles its way through the systems using the RDP port. This worm is known as Morto and it is spreading very quickly in the wild. Morto uses the RDP (Remote Desktop protocol) to connect to a remote system and...
The growing popularity of Android and the tendency of users to store important data on their mobile phones are attracting many hackers. They are targeting users of Google Android mobile operating system with a malicious application that harvests personal information, controls the system and sends it to a remote server....
We have received a new Android malware from the Anrdoid market whose icon is like a Google+ app. This app is particularly dangerous as it gathers GPS data, call logs, text messages and even records phone calls before sending the information off to a remote server. After installation it asks...
More than 90,000 websites were found to be infected with an iframe that points to:- willysy(dot)com. The effected websites were found using the osCommerce which is an open source e-commerce package used by small vendors to manage their online shops. An iframe is a line of code inserted into a...
A new infection has been spreading on the Internet targeting Windows users. In fact, it is a Trojan horse that pretends to be a Windows Activation program. Once infected, you will receive a professional looking screen simulating Microsoft Windows Activation which will state that you need to re-activate your Windows...
Recent international news about the hacking of celebrities phones by news reporters from News of the World, a now defunct British tabloid newspaper published by News International, are doing the rounds. The allegations state that the individuals and reporters working for the newspaper are engaged in phone hacking. All this...