The Latest in IT Security

Posts Tagged ‘launcher’

We have seen malware that infects executables operate so that the malicious code runs first, and is then followed by the execution of host file. The malware XDocCrypt takes this a step further. Besides infecting portable executable files, it also infects Microsoft Word and Excel files. In an infected file, the malware body sits at […]

Read more ...

We’ve found Android trojans that attempt to send SMS messages to premium rate SMS numbers. That’s not unusual. What is different though is that these trojans don’t work. The trojans (detected as Trojan:Android/RuFailedSMS.A) use these permissions: And pretend to be installers for a range of applications, with each malicious app offering to download a package […]

Read more ...

A new malware affecting the latest version of Android operating system 2.3, Gingerbread, is now out in the wild and masquerading as an app featuring the “Beauty of the Day” photos. The package I downloaded uses the following permissions: android.permission.READ_PHONE_STATE android.permission.READ_LOGS android.permission.DELETE_CACHE_FILES android.permission.ACCESS_CACHE_FILESYSTEM android.permission.WRITE_SECURE_SETTINGS android.permission.ACCESS_NETWORK_STATE android.permission.INTERNET android.permission.WRITE_EXTERNAL_STORAGE android.permission.MOUNT_UNMOUNT_FILESYSTEMS android.permission.READ_OWNER_DATA android.permission.WRITE_OWNER_DATA android.permission.WRITE_SETTINGS com.android.launcher.permission.INSTALL_SHORTCUT com.android.launcher.permission.UNINSTALL_SHORTCUT android.permission.RECEIVE_BOOT_COMPLETED android.permission.RESTART_PACKAGES […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments