Showing posts with tag . Show all posts
In Google Play app discovered stealing money from accounts of users

Anti-virus company ESET reported the discovery of a banking Trojan that is distributed in the official Google Play store. He was placed under "Education" under the title of DEFENSOR ID:


The increase in the number of fake banking applications

Anti-virus company ESET warns of rise in the number of fake banking applications, disguised as an official program. Their goal is access to your data and stealing money from the accounts of the users. The company noted that the danger of such fakes is underestimated because of the relative technical simplicity.

According to experts of ESET, the main advantage of such fakes is the ability to reliably copy the official banking applications. As a rule, the user accepts the forgery of a legitimate program, it downloads and begins to use, by providing login credentials in online banking.


"Doctor Web": scammers are spreading Android malware with the help of Instagram

Antivirus company "Doctor Web" reported the discovery of its experts in the Google Play a large number of Trojans of the family Android.HiddenAds designed to display annoying ads. Since the beginning of February it was revealed nearly 40 new modifications of these malicious applications, they have been downloaded about 10 million users. Some of these Trojans scammers spread across Instagram and YouTube. Through advertising in popular social networks and Internet services with an audience of millions the number of potential victims that can install dangerous programs, increases significantly.


ESET: banking Trojan has penetrated in Google Play

Anti-virus company ESET announced the discovery of the 29 banking Trojans disguised as harmless programs in Google Play. It is noted that users of the official app catalog downloaded a total of more than 30,000 times.


Over 1,000,000 users have downloaded an Android Trojan from Google Play

Android.MulDrop.924 distributed through Google Play using the application name "Multiple Accounts: 2 Accounts," which had already downloaded more than 1,000,000 users of Android smartphones and tablets. The program allows you to simultaneously use multiple accounts in games and other SOFTWARE installed on the mobile device. However, this seemingly innocuous and even useful the app hides Trojan functionality, which the developer has forgotten to inform potential victims. The company "Doctor Web" gave Google information about the Trojan, however, at the time of publication of this news Android.MulDrop.The 924 was still available for download.

Virus analysts "Doctor Web" found in Google Play another Trojan. This malware added to the virus database as Android.MulDrop.924, without the knowledge of user downloads of the application and offers to install them. In addition, it shows annoying ads.


Doctor Web: Trojan Android.Xiny learned how to infiltrate the system processes

The Trojans of the family Android.Xiny known in March 2015. Virus writers actively disseminate them through various sites – collections of software for mobile devices and even through the official application directories, such as Google Play and the company "Doctor Web" reported previously.

Virus analysts "Doctor Web" found a new version, Trojans of the family Android.Xiny, which is designed to seamlessly upload and removal of programs. Now these Trojans can infiltrate the process of system application and load the program to exploit various malicious plug-ins.


Discovered by Doctor Web" Android malware can buy the program in Google Play

The Trojan added to the virus database Dr. Web as Android.Slicer.1.origin is installed on mobile devices other malicious applications. It has a characteristic popular service programs and utilities-optimizers functions. In particular, Android.Slicer.1.origin can show information about memory usage and "clean" it by terminating the active processes and allows you to enable and disable wireless modules Wi-Fi and Bluetooth. However, this app does not have its own label in a graphical operating system shell and the user can't run it yourself.

Among the malicious applications for Android OS became widespread Trojans showing Intrusive advertising. Some of them may perform other unwanted actions – for example, to download and install programs and steal confidential information. One of such Trojan which has detected virus analysts the company "Doctor Web" under certain conditions is able to buy and install programs from Google Play.


Malware already disguised as Pokemon Go

Applications that promise to some bun or just posing as Pokemon Go contain Trojans malware and other muck, and some even lure the players in different remote places and robbed them.

the World is going crazy: over pokemon hunted everywhere, and even trying to join the General hysteria in countries where the game is still not available. On this play the crooks who disguise their malicious apps under the currently popular fun Pokemon Go.


Android Nougat will get protection from extortion

In addition to an extensive list of the announced innovations, Android 7.0 contains several of these that are detected independently.


"Doctor Web" found in Google Play Trojan that steals usernames and passwords of users "VKontakte"

Android.PWS.Vk.3 hiding in the app "Music from the VC", which is distributed by cyber criminals through Google Play on behalf of the developer MixHard. Virus analysts "Doctor Web" has informed Google about this malware, however, at the time of publication, Android.PWS.Vk.3 was still available for download.

the Specialists of "Doctor Web" found in Google Play a new Trojan. This malware, named Android.PWS.Vk.3, steals user logins and passwords from accounts in social network "VKontakte".


Banking Trojan attacks lovers hacked mobile games

In the field of view of the enterprising cybercriminals that distribute the banking Trojans as fans of mobile games, which tend to get everything at once, without paying a penny and not spending any efforts. In particular, when users are trying to find in popular search engines information about cheats to facilitate passage of play – for example, possible to obtain infinite gold, crystals and other in-game currency, or just want to download the cracked version of the beloved gaming applications in the search results, potential victims are demonstrated links to numerous fraudulent web-sites created specifically for fans of the infamous "freebie".

Virus analysts "Doctor Web" is constantly fixed cases of distribution of various banking Trojans designed to infect mobile devices running Android. It is no secret that cyber criminals often try to hide such malicious applications for a harmless and useful program. Was no exception and the bunker Android.BankBot.104.origin, which virus writers teaches potential victims how to hack the popular mobile games and also under the guise of programs for cheating.


Install Windows 10 from USB drive

So, this text on how to install Windows 10 on a notebook from scratch without having the installation disk, because before this system was installed by the vendor. In our case, Asus, ultrabook UX31A (Zenbook Prime). When you buy it installed Windows 7 Home Premium, which later was updated to Windows 10 Home. But what if the system is filled with so thorough that you will save a reinstall? To recover on the original Windows 7, and then again to wait for an update to ten? The folly. But the installation disk is not in the hands, because the sink in question.

Perhaps, in the last two posts here may seem that I like to write about Windows :) In fact, Microsoft is once again pleased with the fact that the company all "for the people", and therefore immediately after solving another riddle MS, I decided to share the instructions with those who can get into a similar situation. And for ourselves also useful, as I suspect that to reinstall Windows I have not the last time in my life.


Video Direct from Amazon is a new competitor to YouTube

American IT giant Amazon has got its own hosting. The newly formed service called Direct Video.


Android malware from Google Play tricked users to install programs

All applications, which are built in Android.Click.95, are quite primitive crafts. In most cases, they represent typical program is the compilation of various tips, horoscopes, horoscopes, jokes and other information for each day, freely available online. Virus analysts "Doctor Web" has discovered more than 190 such applications distributed in Google Play at least six developers: allnidiv, malnu3a, mulache, Lohari, Kisjhka and PolkaPola. Thus, in total, of the Trojan managed to load at least 140,000 users. Google is already aware of this incident, however, at the time of writing many of the identified applications is still available for download.

Directory of digital content Google Play is the most trusted source for smartphones and tablets running the Android OS, but from time to time and still found all sorts of malware. Recently the specialists of "Doctor Web" found in this directory more than 190 applications, which is Android.Click.95, frightening users that there are problems on mobile devices and forcing them to install advertised programs.


Adware, the Trojan has infiltrated the Android firmware devices and applications of well-known companies

The Trojan, dubbed Android.Gmobi.1, is a specialised software package (SDK-platform), which extends the functionality of Android application and is used as handset manufacturers and software developers. In particular, this module is designed for remote updates of the operating system, analytical data collection, display various notifications (including advertising) and mobile payments. However, despite the seeming harmlessness, Android.Gmobi.1 in many respects behaves like a typical Trojan, so the containing programs are detected by antivirus products used.Web for Android as malicious. At the moment the specialists of "Doctor Web" found this SDK on preinstalled system ON nearly 40 popular mobile devices and applications TrendMicro Dr.Safety, TrendMicro Dr.Booster and Asus WebStorage, which is available for download on Google Play. All the affected companies were notified of the problem and are addressing it. So, the latest official version of Dr programs TrendMicro.Safety and TrendMicro Dr.Booster do not contain this Trojan.

Many modern Trojans are designed to display Intrusive advertising, as well as installation of various software on mobile devices. With their help the virus makers get good profit, it is not surprising that the number of such malicious programs is increasing. One of those Trojans, which investigated in March the specialists of "Doctor Web" was found in about 40 firmware Android-devices. In addition, it was discovered in multiple applications from well-known companies.


New features of Kaspersky Internet Security for Android – protection management via "smart" watch

The Company "Kaspersky Lab" has announced the release of a new version of the solution Kaspersky Internet Security for Android. The updated product allows you to control protection for the smartphones and tablets with devices running on Android Wear, such as smart watches.


Triada Android attacks: experts are sounding the alarm

Specialists of the "Laboratory Privateer" misleading the users of Android devices about the very serious dangers, which this time was a recently discovered malware Triada.


Android Trojans have learned to infiltrate the system processes

This set consists of three acting in concert the Trojans, which were given the names Android.Loki.1.origin, Android.Loki.2.origin and Android.Loki.3, respectively. The first of them is loaded with a library of, detektorami by Dr. Web for Android as Android.Loki.6. This library is implemented in one of the system processes with Trojan Android.Loki.3 — as a result of Android.Loki.1.origin can act in the system with the privileges of the system user. Android.Loki.1.origin is a service that has a wide range of functions: for example, the Trojan can download from the official Google Play any app using a special link containing a reference to the account of a particular affiliate program, allowing attackers are able to make income. Other features of Android.Loki.1.origin should note the following:

Architecture of malware for the Android mobile platform becomes more and more complicated every year: if the first malicious programs for this system was a fairly primitive application, the current sometimes is not inferior to the complexity of even the most sophisticated Windows Trojans. In February 2016, the specialists of "Doctor Web" has revealed a set of malicious applications for Android that possesses the widest spectrum of functionality.


Dozens of games from Google Play Android contains-Trojan

The virus Writers have built the Trojan in more than 60 games, which are then placed in the directory Google Play on behalf of more than 30 developers, in particular Conexagon Studio, Fun Color Games, BILLAPPS and many others. The company "Doctor Web" has already alerted Google about the incident, at the time of publication of the infected game was still in Play, it is recommended not to download games from the catalog in the next few hours on the devices that are not protected by antivirus.

Virus analysts "Doctor Web" found in Google Play dozens of gaming applications, which hides the Trojan Android.Xiny.19.origin. The main purpose of this malware – download, installation and run programs at the command of attackers. In addition, the Trojan can show obtrusive advertising.


In the smartphone built-in Philips S307 arc detected Trojan

The Specialists of Doctor Web have discovered a new danger: in the graphic shell of the smartphone Philips s307 embedded Trojan, the purpose of which is to demonstrate the hype, as well as download and install malicious software.