The Latest in IT Security

Posts Tagged ‘creators’

A serious Android vulnerability, set to be disclosed at the Blackhat conference, has now been publicly disclosed. The vulnerability allows attackers to inject malicious code into legitimate apps without invalidating the digital signature.Android applications must be digitally signed. This allows one to ensure the code within the app has not been tampered with and also […]

Read more ...

Command-and-control (C&C) server communication is essential for botnet creators to control zombie computers (or bots). To hide this from security researchers, they often use rootkits and other “tricks”. However, hiding the network traffic – specifically from monitoring outside an infected computer – is not an easy task, but is something that the botnet creators have […]

Read more ...

Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.The file turned out to be a multi-functional Trojan, capable of the following: sending SMS to premium-rate numbers; downloading other malware programs, installing them on […]

Read more ...

Categories

TUESDAY, JULY 17, 2018

Featured

Archives

Latest Comments

Social Networks