Showing posts with tag . Show all posts
New spyware is able to read audio through headphones

The Researchers of cyber threats at the University of Ben-Gurion conducted an experiment examining this newly discovered malware. It turned out that today, in 2016, do you really spy on a person through headphones. a new contagion called "Speake(a) r". It turned out that a similar trick does not even need to invent something complicated from the point of view.

the virus Writers never sleep, and became aware of a very interesting way to spy on users, which allows you to record any sounds even if you have no microphone or it's off. Wiretapping and audio recording are conducted using headphones, though usually this device is not for recording and playback.


Over 1,000,000 users have downloaded an Android Trojan from Google Play

Android.MulDrop.924 distributed through Google Play using the application name "Multiple Accounts: 2 Accounts," which had already downloaded more than 1,000,000 users of Android smartphones and tablets. The program allows you to simultaneously use multiple accounts in games and other SOFTWARE installed on the mobile device. However, this seemingly innocuous and even useful the app hides Trojan functionality, which the developer has forgotten to inform potential victims. The company "Doctor Web" gave Google information about the Trojan, however, at the time of publication of this news Android.MulDrop.The 924 was still available for download.

Virus analysts "Doctor Web" found in Google Play another Trojan. This malware added to the virus database as Android.MulDrop.924, without the knowledge of user downloads of the application and offers to install them. In addition, it shows annoying ads.


Vulnerability found in firmware of Xiaomi smartphones

Information on the official forums of the manufacturer about the app could not be found and the specialist tried himself to learn his destiny. Perform reverse engineering, he found out that the program every 24 hours associated with a vendor's server to check for firmware updates and maybe without participation of the owner in the background to download and install apk files, despite the fact that verifying a digital signature Broenink not found. Although the Xiaomi claim that the apk files are checked.

a Researcher from the Netherlands This Broenink has discovered a vulnerability in smartphones Chinese manufacturer Xiaomi. As the owner of Xiaomi Mi4, he found a strange AnalyticsCore app running in the background.


Discovered by Doctor Web" Android malware can buy the program in Google Play

The Trojan added to the virus database Dr. Web as Android.Slicer.1.origin is installed on mobile devices other malicious applications. It has a characteristic popular service programs and utilities-optimizers functions. In particular, Android.Slicer.1.origin can show information about memory usage and "clean" it by terminating the active processes and allows you to enable and disable wireless modules Wi-Fi and Bluetooth. However, this app does not have its own label in a graphical operating system shell and the user can't run it yourself.

Among the malicious applications for Android OS became widespread Trojans showing Intrusive advertising. Some of them may perform other unwanted actions – for example, to download and install programs and steal confidential information. One of such Trojan which has detected virus analysts the company "Doctor Web" under certain conditions is able to buy and install programs from Google Play.


Malware already disguised as Pokemon Go

Applications that promise to some bun or just posing as Pokemon Go contain Trojans malware and other muck, and some even lure the players in different remote places and robbed them.

the World is going crazy: over pokemon hunted everywhere, and even trying to join the General hysteria in countries where the game is still not available. On this play the crooks who disguise their malicious apps under the currently popular fun Pokemon Go.


Android Nougat will get protection from extortion

In addition to an extensive list of the announced innovations, Android 7.0 contains several of these that are detected independently.


"Doctor Web" found in Google Play Trojan that steals usernames and passwords of users "VKontakte"

Android.PWS.Vk.3 hiding in the Music app from VK, which is distributed by cyber criminals through Google Play on behalf of the developer MixHard. Virus analysts "Doctor Web" has informed Google about this malware, however, at the time of publication, Android.PWS.Vk.3 was still available for download.

the Specialists of "Doctor Web" found in Google Play a new Trojan. This malware, named Android.PWS.Vk.3, steals user logins and passwords from accounts in social network "VKontakte".


Install Windows 10 from USB drive

So, this text is about how to set Windows 10 on the laptop from scratch with no installation disk, because the system was installed by the vendor. In our case, Asus , ultrabook UX31A (Zenbook Prime) . When you buy it installed Windows 7 Home Premium, which later was updated to Windows 10 Home. But what if the system is filled with so thorough, that will save only the reinstallation? To recover the factory Windows 7 , and then again to wait for the update to ten? The folly. But the installation disk is not in the hands, because the sink in question.

Perhaps, in the last two posts here may seem that I like to write about Windows :) In fact, Microsoft is once again pleased with the fact that the company all "for the people", and therefore immediately after solving another riddle MS, I decided to share the instructions with those who might get into a similar situation. Yes, and for myself to be useful, as I suspect that to reinstall Windows I have not the last time in my life.


Android malware from Google Play tricked users to install programs

All applications, which are built in Android.Click.95, are quite primitive crafts. In most cases, they represent a typical programme-a compilation of various tips, horoscopes, horoscopes, jokes and other information for each day, freely available online. Virus analysts "Doctor Web" has discovered more than 190 such applications distributed in Google Play at least six developers: allnidiv, malnu3a, mulache, Lohari, Kisjhka and PolkaPola. Thus, in total, of the Trojan managed to load at least 140,000 users. Google is already aware of this incident, however, at the time of writing many of the identified applications is still available for download.

Directory of digital content Google Play is the most trusted source for smartphones and tablets running the Android OS, but from time to time still found all sorts of malware. Recently experts of company "Doctor Web" found in this directory more than 190 applications, which is Android.Click.95, frightening users that there are problems on mobile devices and forcing them to install advertised programs.


Adware, the Trojan has infiltrated the Android firmware devices and applications of well-known companies

The Trojan, dubbed Android.Gmobi.1, is a specialised software package (SDK-platform), which extends the functionality of Android applications and is used as device manufacturers and software developers. In particular, this module is designed for remote operating system updates, Analytics, display various notifications (including advertising) and mobile payments. However, despite the seeming harmlessness, Android.Gmobi.1 in many respects behaves like a typical Trojan, so it contains the software detected antivirus doctor.Web for Android as malware. At the moment the specialists of "Doctor Web" found this in the SDK preinstalled system ON nearly 40 popular mobile devices and applications Dr TrendMicro.Safety, TrendMicro Dr.Booster and Asus WebStorage, which is available for download in Google Play. All of the affected companies have been notified about the problem and are addressing it. So, the latest official version of Dr programs TrendMicro.Safety and TrendMicro Dr.Booster does not already contain this Trojan.

Many Android Trojans are designed to display annoying ads and install all sorts of software on mobile devices. With their help the writers get a good profit, it is not surprising that the number of such malware is growing. One of these Trojans, were investigated in March the specialists of "Doctor Web" was found in about 40 firmware Android-devices. In addition, it was found and a few apps from well-known companies.


New features of Kaspersky Internet Security for Android – protection management via "smart" watch

The Company "Kaspersky Lab" has announced the release of a new version of Kaspersky Internet Security for Android. The updated product allows you to control protection for the smartphones and tablets with devices running on Android Wear, such as "smart" watches.


Triada Android attacks: experts are sounding the alarm

Specialists of the "Laboratory of Marque" to tell users of Android devices about a very serious danger, which this time was a newly discovered malware Triada.


Android Trojans have learned to infiltrate the system processes

This set consists of three acting together Trojans, which were given the names Android.Loki.1.origin, Android.Loki.2.origin and Android.Loki.3, respectively. The first one is loaded by using the library, apparently detected by anti-virus.Web for Android as Android.Loki.6. This library is implemented in one of the system processes the Trojan Android.Loki.3 — as a result of Android.Loki.1.origin gets a chance to act on the system with privileges of the user system. Android.Loki.1.origin is a service that has a wide range of functions: for example, the Trojan can download from the official Google Play any app using a special link containing a reference to the account of a particular affiliate program, allowing attackers are able to make income. Other features of Android.Loki.1.origin should note the following:

the Architecture of malware for the Android mobile platform is getting more complicated with every year: the first for the Trojans this system was a rather primitive application, the present sometimes not inferior to the complexity of even the most sophisticated Windows Trojan. In February 2016 the specialists of "Doctor Web" has discovered a set of malicious applications for Android that possesses the broadest spectrum of functionality.


Samsung allowed to block ads

Samsung has informed its users long - awaited news- brand browser Samsung Internet the manufacturer has got built-in ad blocker Adblock Fast.


Dozens of games from Google Play Android contains-Trojan

The Writers have built this Trojan horse in more than 60 games, which are then placed in the directory Google Play on behalf of more than 30 developers, in particular Conexagon Studio, Fun Color Games, BILLAPPS and many others. The company "Doctor Web" has already alerted Google about this incident, at the time of publication of the infected games was still in Google Play - not recommended to download games from the catalog in the next few hours on the devices that are not protected by antivirus.

Virus analysts the company "Doctor Web" found in Google Play dozens of game applications, which hides the Trojan Android.Xiny.19.origin. The main purpose of this malware is to download, install, and run programs at the command of attackers. In addition, the Trojan can show obtrusive advertising.


In the smartphone built-in Philips S307 arc detected Trojan

The Specialists of Doctor Web have discovered a new danger in the GUI of the smartphone Philips S307 arc embedded Trojan, the purpose of which is to show annoying ads and also download and install malicious software.


A hazardous Trojan horse that is detected in the firmware of Android-smartphone Philips S307 arc

The First information about Android.Cooee.1 appeared in October 2015, when the malware was detected a few low end Android smartphones from, to put it mildly, not the most well-known brands. New case detection of this Trojan showed that the appetite unknown attackers have been steadily growing threat application has been detected on the mobile device Philips S307 arc. The specialists of "Doctor Web" has informed the incident to the manufacturer, which is currently considering possible solutions to the problem.

Among the major trends of the past year include the emergence of a large number of pre-installed on an Android device malware that invisibly for users can download and install various applications, and often showed the hype. One of these Trojans has become Android.Cooee.1, built-in GUI several budget smartphones in the production of a number of little-known Chinese companies. Apparently, the attackers did not stop there and continued the dangerous practice in the next year: the specialists of "Doctor Web" revealed another case of an Android implementation.Cooee.1 for Android device, and this time the "surprise" expected buyers of smartphones from well-known electronics manufacturer.


The perpetrators of the theft of money from the accounts of the savings Bank arrested

Seven Tomsk hackers were detained on suspicion of organizing and conducting a virus attack on your mobile Android device clients of Sberbank, reports a press-service UMVD of Russia.


Arbor No. 51: 5 serious vulnerabilities Android

Brief description of the most significant "holes" in the operating system from Google that have impacted in the period since last summer.


The game is against the rules: How the IT giants beat the competitors

August 3 social network “VKontakte” stopped to display on their own pages, links to publish to Instagram. Users have linked this decision to the social network with the recent release of Snapster is a mobile application that partially mimic the functions of the popular photo service.