A few days ago, Jon Larimer and Jon Oberheide published a vulnerability for Android platforms < 2.3.6. David Maciejak and I were curious to run it on an Android phone.
Result: it runs perfectly :(
So, what is this to us?
Well, it’s a new...
On 15th november 2011, Google's mobile operating system Android reached 52.5% of the global smartphone market share. And with it an almost sixfold increase in malware threats.
Gartner's share of worldwide 2011 Q2 smartphones sold to end-users by o...
In the AV industry, one of the golden rules is to make sure that, during analysis, we do not in any way help the malware authors and/or propagate their offspring.
This requires special care in the case of malware for mobile phones, because, on the o...
Thank you to everyone who tried to solve our FortiChallenge 2k11!
We've had way more participants than expected, and two winners :
Shirley Chen
Nagy Ferenc László
Shirley and Nagy found the secret sentence, without even using the hints.
A speci...
It's high time the Crypto Girl talks about Crypto, isn't it?
A few days ago, I analyzed a malicious Opera Updater, named SymbOS/OpFake.A!tr.dial, and was surprised to discover it uses a** 91-byte XOR key** to conceal one of its configuration file. 9...
Any progress on our FortiChallenge 2k11? After the first clue, here is the second.
Just a reminder that the first hint is meant to help you to find the good way with hashes.
Don't miss the modification, Crypto Girl hates MD5 for this reason !
By t...