Over the past few weeks, we have been busy researching the Command and Control infrastructure used by Duqu Read Full Article
Does Android Malware Exist?
I’m often asked about the real danger of Android malware. This is a difficult question as it has many factors to consider, such as your location, your device, how many apps you install, and how reckless you are with the apps that you choose. There are two common factions often at odds with each other. Read Full Article
Choose your preferred Fake AV
In the past we’ve seen Rogue AV websites using fake screenshots made with templates but without any real interaction with the user PC. Now it has been changed. Read Full Article
SMS Trojans: all around the world
In the middle of July I wrote about porn SMS senders which covertly subscribed users to a range of premium-rate services with the promise of raunchy images. Now this problem has evolved to SMS Trojans which target users from a number of European countries and Canada. Yes, these SMS Trojans don’t target either Russian or Chinese smartphone users. Read Full Article
Spam report: October 2011
The amount of spam in email traffic was up 1.4 percentage points compared to September and averaged 79.9%. Read Full Article
Lab Matters – Cyber crime and cyber war in Latin America
Kaspersky Lab malware analyst Dmitry Besthuzhev looks at cybercrime in Latin America and makes a prediction regarding state-sponsored cyber-attacks in the region. Read Full Article
Stealing apps, installing ads
A while back I blogged about “offerwalls” that were collecting leaked user data. But now it seems that not only users are under attack. Recently while browsing Reddit, I found the account of a popular app developer who claims that another developer on the Android Market had stolen his app, added ad spam code to it, and uploaded it under his own account with the same name. After some research I discovered that this was, in fact, the case Read Full Article
Money from the cloud
Not so long ago we wrote about cybercriminals using infected computers to generate virtual money via Bitcoin Read Full Article
Lab Matters – DLP – Can it help limit the damage?
A look at the top five database breaches and the technologies that may have helped limit the damage. Read Full Article
IT Threat Evolution: Q3 2011
A simple message on a Google forum in August sparked an investigation which would eventually bring down the DigiNotar certificate authority. Read Full Article