date: 2014-05-01 01:00:00 -0700
category: "Security Research"
[
This article originally appeared in Virus Bulletin
](http://www.virusbtn.com/virusbulletin/archive/2014/02/vb201402-Sality)
[
For Part 1 of this article Click Here
](http://blog...
date: 2013-10-14 06:00:00 -0700
category: "Security Research"
Final panel on collateral damage in cyber-warfare
This post is the third in a three part series. Click here for Part 1 and here for Part 2
Fabio Assolini, Andrey Makhnutin - PAC - the...
I had always wanted to look into Firefox OS. It's done. I created my first application. What kind of application does a reverse engineer write as first app? A CrackMe of course. You can try it: the sources are available here. But, honestly, it is r...
Get rid of clichés:
"Most of anti-virus software products detect malware pieces only through simple checksums. This is often the case for the anti-virus engines which are integrated into network gateways."
People mainly believe that th...
I recently tried an amazing browser extension named Datarmine whose goal is to secure social network posts. It works for Facebook, Twitter etc. The idea is that your posts get encrypted, and only people with your secret key can decrypt it. Others see...
As I was following the tweets of IEEE S&P, one of the top academic conferences on security, I saw they had created a special application for the people attending the conference, with the agenda, paper abstracts and a few news.
Figure 1. IE...
We recently had a company contact us regarding an email they received from their bank.
The company's access to its online banking account was blocked by its bank due to fraudulent activity observed through the account.
A screenshot of the email rec...
One of the hottest buzz of the moment certainly is the breaking news about NSA collecting phone records of Verizon subscribers. According to court order, Verizon has been asked to provide NSA daily information for all its phone records between April...
A few days ago I received an interesting email message:
Just your typical phishing email. Normally, I would just dump it into our signature automation processors and move on to the next piece of malicious code. This one was intriguing, though: wit...
Some time ago, I analyzed two similar samples of Android/Smsilence.A!tr.spy, a fake Vertu application that spies on its victim. One of the samples was targeting a Japanese audience, while the other sample was for Korean end-users. I was interested in...
"Is mobile malware really an issue?" is probably among the most frequent questions my friends ask me
regarding my work. I usually like to answer indirectly with a graph as below:
Figure 1. Evolution of malicious Android samples. Light blue curve...
Last week the security world was abuzz with news of a new attack vector for mobile attacks. The malware was sent to the accounts of Tibetan human rights advocates and activists from the hacked account of one of the activists regarding the the World U...
Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches.
Simply having a login name and a password, even a strong password - one that doesn't contain words from the dictionary, and consists of...
Last year, tech giant Yahoo! Inc. fell victim to a cyberattack. But unlike other high-profile attacks, the culprit wasn't an APT or sophisticated threat sourced to a nation state. The weapon of choice was a simple SQL injection. According to reports,...