Showing posts with tag . Show all posts
The vulnerabilities discovered in smartphones from LG

The Research team Check Point Research has discovered two vulnerabilities in pre-installed virtual keyboard flagship smartphones LG (LGEIME). Specialists Check Point confirmed the presence of vulnerabilities by testing the flagship device LG G4, LG G5, LG G6.

It is Reported that the discovered vulnerabilities could be used for remote code execution with elevated privileges on LG mobile devices. With their help it was possible to operate the keyboard, to use a Keylogger (keylogger), thereby to obtain access to confidential user data.


New spyware is able to read audio through headphones

The Researchers of cyber threats at the University of Ben-Gurion conducted an experiment examining this newly discovered malware. It turned out that today, in 2016, do you really spy on a person through headphones. a new contagion called "Speake(a) r". It turned out that a similar trick does not even need to invent something complicated from the point of view.

the virus Writers never sleep, and became aware of a very interesting way to spy on users, which allows you to record any sounds even if you have no microphone or it's off. Wiretapping and audio recording are conducted using headphones, though usually this device is not for recording and playback.


Over 1,000,000 users have downloaded an Android Trojan from Google Play

Android.MulDrop.924 distributed through Google Play using the application name "Multiple Accounts: 2 Accounts," which had already downloaded more than 1,000,000 users of Android smartphones and tablets. The program allows you to simultaneously use multiple accounts in games and other SOFTWARE installed on the mobile device. However, this seemingly innocuous and even useful the app hides Trojan functionality, which the developer has forgotten to inform potential victims. The company "Doctor Web" gave Google information about the Trojan, however, at the time of publication of this news Android.MulDrop.The 924 was still available for download.

Virus analysts "Doctor Web" found in Google Play another Trojan. This malware added to the virus database as Android.MulDrop.924, without the knowledge of user downloads of the application and offers to install them. In addition, it shows annoying ads.


Vulnerability found in firmware of Xiaomi smartphones

Information on the official forums of the manufacturer about the app could not be found and the specialist tried himself to learn his destiny. Perform reverse engineering, he found out that the program every 24 hours associated with a vendor's server to check for firmware updates and maybe without participation of the owner in the background to download and install apk files, despite the fact that verifying a digital signature Broenink not found. Although the Xiaomi claim that the apk files are checked.

a Researcher from the Netherlands This Broenink has discovered a vulnerability in smartphones Chinese manufacturer Xiaomi. As the owner of Xiaomi Mi4, he found a strange AnalyticsCore app running in the background.


Discovered by Doctor Web" Android malware can buy the program in Google Play

The Trojan added to the virus database Dr. Web as Android.Slicer.1.origin is installed on mobile devices other malicious applications. It has a characteristic popular service programs and utilities-optimizers functions. In particular, Android.Slicer.1.origin can show information about memory usage and "clean" it by terminating the active processes and allows you to enable and disable wireless modules Wi-Fi and Bluetooth. However, this app does not have its own label in a graphical operating system shell and the user can't run it yourself.

Among the malicious applications for Android OS became widespread Trojans showing Intrusive advertising. Some of them may perform other unwanted actions – for example, to download and install programs and steal confidential information. One of such Trojan which has detected virus analysts the company "Doctor Web" under certain conditions is able to buy and install programs from Google Play.


Malware already disguised as Pokemon Go

Applications that promise to some bun or just posing as Pokemon Go contain Trojans malware and other muck, and some even lure the players in different remote places and robbed them.

the World is going crazy: over pokemon hunted everywhere, and even trying to join the General hysteria in countries where the game is still not available. On this play the crooks who disguise their malicious apps under the currently popular fun Pokemon Go.


Android Nougat will get protection from extortion

In addition to an extensive list of the announced innovations, Android 7.0 contains several of these that are detected independently.


"Doctor Web" found in Google Play Trojan that steals usernames and passwords of users "VKontakte"

Android.PWS.Vk.3 hiding in the app "Music from the VC", which is distributed by cyber criminals through Google Play on behalf of the developer MixHard. Virus analysts "Doctor Web" has informed Google about this malware, however, at the time of publication, Android.PWS.Vk.3 was still available for download.

the Specialists of "Doctor Web" found in Google Play a new Trojan. This malware, named Android.PWS.Vk.3, steals user logins and passwords from accounts in social network "VKontakte".


Install Windows 10 from USB drive

So, this text on how to install Windows 10 on a notebook from scratch without having the installation disk, because before this system was installed by the vendor. In our case, Asus, ultrabook UX31A (Zenbook Prime). When you buy it installed Windows 7 Home Premium, which later was updated to Windows 10 Home. But what if the system is filled with so thorough that you will save a reinstall? To recover on the original Windows 7, and then again to wait for an update to ten? The folly. But the installation disk is not in the hands, because the sink in question.

Perhaps, in the last two posts here may seem that I like to write about Windows :) In fact, Microsoft is once again pleased with the fact that the company all "for the people", and therefore immediately after solving another riddle MS, I decided to share the instructions with those who can get into a similar situation. And for ourselves also useful, as I suspect that to reinstall Windows I have not the last time in my life.


Android malware from Google Play tricked users to install programs

All applications, which are built in Android.Click.95, are quite primitive crafts. In most cases, they represent typical program is the compilation of various tips, horoscopes, horoscopes, jokes and other information for each day, freely available online. Virus analysts "Doctor Web" has discovered more than 190 such applications distributed in Google Play at least six developers: allnidiv, malnu3a, mulache, Lohari, Kisjhka and PolkaPola. Thus, in total, of the Trojan managed to load at least 140,000 users. Google is already aware of this incident, however, at the time of writing many of the identified applications is still available for download.

Directory of digital content Google Play is the most trusted source for smartphones and tablets running the Android OS, but from time to time and still found all sorts of malware. Recently the specialists of "Doctor Web" found in this directory more than 190 applications, which is Android.Click.95, frightening users that there are problems on mobile devices and forcing them to install advertised programs.


Adware, the Trojan has infiltrated the Android firmware devices and applications of well-known companies

The Trojan, dubbed Android.Gmobi.1, is a specialised software package (SDK-platform), which extends the functionality of Android application and is used as handset manufacturers and software developers. In particular, this module is designed for remote updates of the operating system, analytical data collection, display various notifications (including advertising) and mobile payments. However, despite the seeming harmlessness, Android.Gmobi.1 in many respects behaves like a typical Trojan, so the containing programs are detected by antivirus products used.Web for Android as malicious. At the moment the specialists of "Doctor Web" found this SDK on preinstalled system ON nearly 40 popular mobile devices and applications TrendMicro Dr.Safety, TrendMicro Dr.Booster and Asus WebStorage, which is available for download on Google Play. All the affected companies were notified of the problem and are addressing it. So, the latest official version of Dr programs TrendMicro.Safety and TrendMicro Dr.Booster do not contain this Trojan.

Many modern Trojans are designed to display Intrusive advertising, as well as installation of various software on mobile devices. With their help the virus makers get good profit, it is not surprising that the number of such malicious programs is increasing. One of those Trojans, which investigated in March the specialists of "Doctor Web" was found in about 40 firmware Android-devices. In addition, it was discovered in multiple applications from well-known companies.


New features of Kaspersky Internet Security for Android – protection management via "smart" watch

The Company "Kaspersky Lab" has announced the release of a new version of the solution Kaspersky Internet Security for Android. The updated product allows you to control protection for the smartphones and tablets with devices running on Android Wear, such as smart watches.


Triada Android attacks: experts are sounding the alarm

Specialists of the "Laboratory Privateer" misleading the users of Android devices about the very serious dangers, which this time was a recently discovered malware Triada.


Android Trojans have learned to infiltrate the system processes

This set consists of three acting in concert the Trojans, which were given the names Android.Loki.1.origin, Android.Loki.2.origin and Android.Loki.3, respectively. The first of them is loaded with a library of, detektorami by Dr. Web for Android as Android.Loki.6. This library is implemented in one of the system processes with Trojan Android.Loki.3 — as a result of Android.Loki.1.origin can act in the system with the privileges of the system user. Android.Loki.1.origin is a service that has a wide range of functions: for example, the Trojan can download from the official Google Play any app using a special link containing a reference to the account of a particular affiliate program, allowing attackers are able to make income. Other features of Android.Loki.1.origin should note the following:

Architecture of malware for the Android mobile platform becomes more and more complicated every year: if the first malicious programs for this system was a fairly primitive application, the current sometimes is not inferior to the complexity of even the most sophisticated Windows Trojans. In February 2016, the specialists of "Doctor Web" has revealed a set of malicious applications for Android that possesses the widest spectrum of functionality.


Samsung allowed to block ads

Samsung said its users long - awaited news- brand browser Samsung Internet got built-in Adblock Fast.


Dozens of games from Google Play Android contains-Trojan

The virus Writers have built the Trojan in more than 60 games, which are then placed in the directory Google Play on behalf of more than 30 developers, in particular Conexagon Studio, Fun Color Games, BILLAPPS and many others. The company "Doctor Web" has already alerted Google about the incident, at the time of publication of the infected game was still in Play, it is recommended not to download games from the catalog in the next few hours on the devices that are not protected by antivirus.

Virus analysts "Doctor Web" found in Google Play dozens of gaming applications, which hides the Trojan Android.Xiny.19.origin. The main purpose of this malware – download, installation and run programs at the command of attackers. In addition, the Trojan can show obtrusive advertising.


In the smartphone built-in Philips S307 arc detected Trojan

The Specialists of Doctor Web have discovered a new danger: in the graphic shell of the smartphone Philips s307 embedded Trojan, the purpose of which is to demonstrate the hype, as well as download and install malicious software.


A hazardous Trojan horse that is detected in the firmware of Android-smartphone Philips S307 arc

The First information about the Android.Cooee.1 appeared in October 2015, when the malware was detected at several budget Android smartphones from, to put it mildly, not the most famous brands. New case detection of the malware showed that the unknown attackers appetite is gradually growing: the app has been discovered on a mobile device Philips s307. The specialists of "Doctor Web" has alerted about the incident the manufacturer, which is currently considering possible solutions to the problem.

Among the main trends of the past year may be noted the emergence of a large number of pre-installed Android malware, which are invisible to users could download and install different SOFTWARE, and often showed the hype. One of these Trojans has become Android.Cooee.1, built-in GUI several budget smartphones the production of a number of little-known Chinese companies. Apparently, the attackers decided not to stop and continued unsafe practices in the next year: the specialists of "Doctor Web" revealed another case of the Android implementation.Cooee.1 for Android device, and this time the "surprise" awaited buyers of smartphones from well-known electronics manufacturer.


The perpetrators of the theft of money from the accounts of the savings Bank arrested

Seven of the Tomsk hackers were detained on suspicion of organizing and carrying out virus attacks on the Android mobile device savings Bank customers, reports a press-service UMVD of Russia.


Arbor No. 51: 5 serious vulnerabilities Android

Brief description of the most significant "holes" in the operating system from Google that have affected it during the period since last summer.