With the proliferation of the data we hold on our mobile devices, it’s no wonder Neil Daswani, CTO of Dasient, says around 8% of the apps they tested have been leaking data. In a similar vein, he states, “The number of malware samples on mobile devices has doubled in the past two years.” Google tends
ResearchExpert content, for researchers by researchers
...one Yasuhiro Kawaguchi was arrested yesterday on suspicion of "saving a virus on his computer," though the story suggests distribution of malware too...
2 days ago, the FBI announced a series of raids resulting in arrests of alleged members of the hacking group ‘Anonymous’. Hoping to deal a critical blow to the organization, they swept up more than a few potential members, and a tidy stash of computers to boot. So we’re done with ‘Anonymous’, right? Today, we
Finally scraped up enough money to rent a laptop? Turns out the rental company may be getting a little more of your information than you thought. Seems they have the ability to secretly turn on the webcam and take a look around, especially if they suspect shenanigans on your part, like maybe not returning their
As of 1:20 EST today, The Atlantic Wire reports an FBI official has stated there have been raids and arrests of multiple individuals at multiple locations nationwide. Later reports from CBS/AP pegged the arrest number at 14, and report “FBI agents conducted raids at four New York residences as well as locations in California, New
In this case, we aren’t referencing the group who, as of late, has made headlines for hacking endeavors. A new technology, sort of a modified proxy chain on steroids, seems to be gaining some proof-of-concept notoriety, hoping to offer new levels of anonymity while surfing online. The technology hopes that when users connect, the network
...the scammer doesn't need you to edit the registry to find the CLSID he's looking for. He simply has to persuade you to run the ASSOC command...
...there are (over) 2,095,006,005 Internet users nowadays (due credit to www.internetworldstats.com). Inevitably, some of them are going to have the same name as real celebrities and fictional characters...
In their presentation “Cybercrime in Russia: Trends and issues” at CARO2011 -- one of the best presentations of the workshop, in my unbiased opinion ;-) -- Robert Lipovsky, Aleksandr Matrosov and Dmitry Volkov mentioned the Win32/Hodprot malware family, which seems to be undergoing something of a resurgence.
ESET wishes to apologize to Google and it’s CEO for a recent posting that failed to meet the high standards of professionalism our readers have come to expect from our blogs.
If you don’t remember the Rumble in the Jungle, it was a boxing match between George Foreman and Muhammed Ali. Back in 1974 names like Foreman and Ali were as famous as companies like Google and Facebook are now. Google, like the older Ali, has been taking punches in the early rounds of the social
If you keep up on the subject, FBI has been recently cracking down on ATM card data theft rings, where scammers attach fake hardware to the front of ATM’s and trick users into entering PIN information, then record the data to logging devices which can be retrieved later. In some cases the attackers use Bluetooth
Sitting in an airport you rarely frequent, you grab your laptop and snap out a couple e-mails to send, and look, there’s a free WiFi hotspot. Bang, you connect and send, and are off on your way. What you don’t know is the free WiFi may come with a price: your login credentials and network
Although the “Ready to Ride” group originated in Russia it distributes Win32/Cycbot outside the borders of the Russian Federation. Going by the prices per installation the primary target of the group is the US.
I've stopped maintaining Stuxnet resource pages recently, but occasionally I come across an article that adds something useful to the mix, or simply summarizes aspects of the Stuxnet story neatly and accurately. Besides, its authors must be feeling a little left out with all that fuss about TDL4. ;-) A recent report in Wired gives
The mobile devices of late have more compute power than the full desktop PC of yesteryear, and they fit it your pocket, great news for folks “on the go.” And since you’re so multi-tasked anyway, why not load it up with things to make your life easier, after all, it’s really a phone with a
I’ve been using Google Plus almost as long as it has been around, which is a sneaky way of saying I am a noob to it :) Frankly, at this point I do not see anything particularly novel or sensational. I just haven’t seen the killer feature that will vanquish the Facebook megalith, but perhaps
In the wake of the flood of recent mortgage/housing fraud, a police raid in Colorado resulted in a laptop seizure they feel may contain evidence to help a case. Turns out it’s encrypted. Citing suspicion of nastiness contained therein, the U.S. Government has asked a federal judge to compel the owner, Ramona Fricosu, to enter
This is an impressive looking certificate isn’t it? You might think it means something significant, but then you might be wrong. How hard is it to pass the Internet and Child Safety Advocate certification test? Ask Hanna, a 9 year old (10 this weekend) girl who I met with her father at a local coffee