Up to now, mobile malware were certainly growing, but still minor compared to PC malware. Well, this is about to change. We have recently acknowledged a mobile malware getting in our top 10 virus activity, where usually there were only PC malware....
It's everywhere in the news, and I couldn't resist trying to figure out how it works.
I think I roughly found out but we'll have to wait for Karsten Nohl's presentation at BlackHat to see if I was right :)
Getting ciphertexts
Mobile phones are capa...
Story
Around the end of June, I found a new Kelihos binary that was being pushed to all the proxy peers from Kelihos' job servers. At that time, I assumed the binary was just a typical bug fix build. But on July 14th, my Kelihos tracker stopped gett...
Yesterday Oracle released a whopping 89 fixes to many of their products, 27 of which could allow remote code execution.
In Eric Maurice's post (Mr. Maurice is Oracle's Director of Software Security Assurance), he outlines some of the most important...
Popular social media/sharing site Tumblr posted a quick note on their official blog indicating that their iOS app wasn't using SSL to pass login and password details when their users were logging in via the app. An astute reader of popular tech news...
Recently I received this SMS on my mobile phone.
Basically, it tells me I have to call back 018377xxxx to collect a parcel.
As this phone number is not premium and I was indeed waiting for a parcel, I nearly fell in for the trick.
Figure 1. SMS sca...
Patch management is as fundamental to your security posture and health of your network as changing the oil on your car. It's also as easy to overlook until it's too late.
Simply defined, patch management is the process of repairing security flaws an...
Shortly after 10:00am Jun 25th 2013, many government websites from South Korea were not accessible. It was actually caused by the malware performing ddos attack on 2 major DNS servers (ns.gcc.go.kr and ns2.gcc.go.kr).
Original Attack Vector
Dur...
Last month, Symantec blogged about an Android malware named Android.Fakedefender that is the first example of a Ransomware that we have seen on the Android platform.
Fortinet detects this malware as Android/FakeDefend.A!tr
The malware's operation c...
Our previous post details the history of advanced persistent threats (APTs) as well as some of the most significant attacks, their origins and high-profile targets. In this post, we'll break down the stages of an attack, as well as APT attack tools a...
CCIE#19065, Director, AV Engine Development. Leader of generic signature team and malware research team.
The concept behind advanced persistent threats (APTs) isn't new. Cybercriminals have been relying on advanced software to leverage attacks that steal data or disrupt systems since the dawn of the computer age.
But what distinguishes modern APTs from...
Ruchna Nigam is a security researcher at FortiGuard Labs and works with mobile and PC malware. She is also interested in aspects of security like encryption schemes and biometrics and is getting used to referring to herself in third person.