Tag Archives | malware




China Facing Problems With Android Handsets & Pre-installed Trojans

It seems like the Chinese are always coming up with inventive ways to scam people, this time the people in their own country. Android is of course growing quickly globally and China is no exception with the availability of cheap hardware there the open-source Android OS is a natural choice. The latest scam is some […]

Tags: , , , , , , , , , , , , , , , ,

Posted in: Legal Issues, Malware, Privacy | Add a Comment

Windows Vista & Windows 7 Kernel Bug Can Bypass UAC

Now this is not the first time Windows UAC has hit the news for being flawed, back in February 2009 it was discovered that Windows 7 UAC Vulnerable – User Mode Program Can Disable User Access Control and after that in November 2009 it was demonstrated that Windows 7 UAC (User Access Control) Ineffective Against […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment

TDL AKA Alureon Rootkit Now Infecting 64-Bit Windows 7 Platform

As we’ve come to expect, the malware guys are always at the leading edge of technological development. Now there are rootkits infecting 64-Bit versions of Windows, which have been thought of as fairly safe by most parties. The rootkit in questions is a fairly well known variant (TDL/Alureon) and has been around for several years, […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Malware, Windows Hacking | Add a Comment

Hackers Exploit Unpatched Firefox 0day Using Nobel Peace Prize Website

It’s been a while since Firefox has been in the news, but this is a fairly high profile case involving the Nobel Peace Prize website. It seems there is a race condition vulnerability in the latest versions of Firefox (including 3.6.11) that allows remote exploitation. In this case it was used via an iFrame on […]

Tags: , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Web Hacking | Add a Comment

Malware Pushers Abuse Firefox Warning Page

This is a pretty neat attack from the malware pushes leveraging on the ignorance of the average user – which in all honestly is a safe bet most of the time! You could consider it a Social Engineering attack as it’s taking something that’s familiar and changing it to deliver malware. I’m sure all the […]

Tags: , , , , , , ,

Posted in: Malware, Social Engineering, Spammers & Scammers | Add a Comment

NSDECODER – Automated Website Malware Detection Tool

NSDECODER is a automated website malware detection tool. It can be used to decode and analyze an URL to see if it host to malware. Also, NSDECODER will analyze which vulnerability has been exploited and the original source address of malware. Functions Automated analysis and detection of website malware. Detection for plenty of vulnerabilities. Log […]

Tags: , , , , , , , , ,

Posted in: Countermeasures, Malware, Web Hacking | Add a Comment

Police In UK & US Charge & Arrest Multiple People Over Zeus Trojan E-banking Fraud

Zeus has been around for quite some time, we reported it about it initially back in 2009 when it was noted Zeus could evade anti-virus software. In more recent months it was noted that Zeus has become more focused and variations of Zeus were found to be targeting banks and financial organisations in specific geographic […]

Tags: , , , , , , , , , , , , , ,

Posted in: Legal Issues, Malware, Spammers & Scammers | Add a Comment

Email Worm Spreading Like Wildfire – W32.Imsolk/VBMania Variant

Oh this is a throw back to the 90s, a self-replicating e-mail worm based around a malicious screensaver (.scr) that sends itself to everyone in your address book. It seems this one is spreading fast though with hundreds of thousands of infections. Reminds of the heydays of ILOVEYOU and Anna Kournikova. A fast-moving email worm […]

Tags: , , , , , , , , , , , ,

Posted in: General News, Malware | Add a Comment

Malware Hash Checking Tool – Online & Offline Support

This program intends to detect a malicious file in two ways; online and offline. It calculates the md5 hash of a specified file and searches it in its current hash set (offline) or on VirusTotal site (online) and shows the result. It has http proxy support and update (for hash set) feature. It’s a simple […]

Tags: , , , , , , , , , , ,

Posted in: Countermeasures, Malware, Security Software | Add a Comment

Regional Trojan Threat Targeting Online Banks

Well it was inevitable really, I’ve noticed in the last couple of years Phishing e-mails have started to use targeted lists especially for banking sites and the next up of course is trojans developed for specific regions. A security company Trusteer (who makes Rapport) has done some research on this matter which has pin-pointed certain […]

Tags: , , , , , , , , , , , , , , , , ,

Posted in: Malware, Phishing, Social Engineering, Spammers & Scammers | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·