Showing posts with tag . Show all posts
Over 1,000,000 users have downloaded an Android Trojan from Google Play

Android.MulDrop.924 distributed through Google Play using the application name "Multiple Accounts: 2 Accounts," which had already downloaded more than 1,000,000 users of Android smartphones and tablets. The program allows you to simultaneously use multiple accounts in games and other SOFTWARE installed on the mobile device. However, this seemingly innocuous and even useful the app hides Trojan functionality, which the developer has forgotten to inform potential victims. The company "Doctor Web" gave Google information about the Trojan, however, at the time of publication of this news Android.MulDrop.The 924 was still available for download.

Virus analysts "Doctor Web" found in Google Play another Trojan. This malware added to the virus database as Android.MulDrop.924, without the knowledge of user downloads of the application and offers to install them. In addition, it shows annoying ads.

Read more...

Doctor Web: Trojan Android.Xiny learned how to infiltrate the system processes

The Trojans of the family Android.Xiny known in March 2015. Virus writers actively disseminate them through various sites – collections of software for mobile devices and even through the official application directories, such as Google Play and the company "Doctor Web" reported previously.

Virus analysts "Doctor Web" found a new version of Trojans of the family Android.Xiny, which is designed to seamlessly upload and removal of programs. Now these Trojans can infiltrate the process of system application and load the program to exploit various malicious plug-ins.

Read more...

Discovered by Doctor Web" Android malware can buy the program in Google Play

The Trojan added to the virus database Dr. Web as Android.Slicer.1.origin is installed on mobile devices other malicious applications. It has a characteristic popular service programs and utilities-optimizers functions. In particular, Android.Slicer.1.origin can show information about memory usage and "clean" it by terminating the active processes and allows you to enable and disable wireless modules Wi-Fi and Bluetooth. However, this app does not have its own label in a graphical operating system shell and the user can't run it yourself.

Among the malicious applications for Android OS became widespread Trojans showing Intrusive advertising. Some of them may perform other unwanted actions – for example, to download and install programs and steal confidential information. One of such Trojan which has detected virus analysts the company "Doctor Web" under certain conditions is able to buy and install programs from Google Play.

Read more...

Malware already disguised as Pokemon Go

Applications that promise to some bun or just posing as Pokemon Go contain Trojans malware and other muck, and some even lure the players in different remote places and robbed them.

the World is going crazy: over pokemon hunted everywhere, and even trying to join the General hysteria in countries where the game is still not available. On this play the crooks who disguise their malicious apps under the currently popular fun Pokemon Go.

Read more...

Android Nougat will get protection from extortion

In addition to an extensive list of the announced innovations, Android 7.0 contains several of these that are detected independently.

Read more...

"Doctor Web" found in Google Play Trojan that steals usernames and passwords of users "VKontakte"

Android.PWS.Vk.3 hiding in the Music app from VK, which is distributed by cyber criminals through Google Play on behalf of the developer MixHard. Virus analysts "Doctor Web" has informed Google about this malware, however, at the time of publication, Android.PWS.Vk.3 was still available for download.

the Specialists of "Doctor Web" found in Google Play a new Trojan. This malware, named Android.PWS.Vk.3, steals user logins and passwords from accounts in social network "VKontakte".

Read more...

Banking Trojan attacks lovers hacked mobile games

In the field of view of the enterprising cybercriminals that distribute the banking Trojans as fans of mobile games, which tend to get everything at once, without paying a penny and not spending any efforts. In particular, when users are trying to find in popular search engines information about cheats to facilitate passage of play – for example, possible to obtain infinite gold, crystals and other in-game currency, or just want to download the cracked version of the beloved gaming applications in the search results, potential victims are demonstrated links to numerous fraudulent web-sites created specifically for fans of the infamous "freebie".

Virus analysts "Doctor Web" permanently fix the cases of distribution of various banking Trojans that are designed to infect mobile devices running Android. It is no secret that cyber criminals often try to hide such malicious applications for a harmless and useful program. Was no exception and bunker Android.BankBot.104.origin, which virus writers teaches potential victims how to hack the popular mobile games and also under the guise of programs for cheating.

Read more...

Install Windows 10 from USB drive

So, this text is about how to set Windows 10 on the laptop from scratch with no installation disk, because the system was installed by the vendor. In our case, Asus , ultrabook UX31A (Zenbook Prime) . When you buy it installed Windows 7 Home Premium, which later was updated to Windows 10 Home. But what if the system is filled with so thorough, that will save only the reinstallation? To recover the factory Windows 7 , and then again to wait for the update to ten? The folly. But the installation disk is not in the hands, because the sink in question.

Perhaps, in the last two posts here may seem that I like to write about Windows :) In fact, Microsoft is once again pleased with the fact that the company all "for the people", and therefore immediately after solving another riddle MS, I decided to share the instructions with those who might get into a similar situation. Yes, and for myself to be useful, as I suspect that to reinstall Windows I have not the last time in my life.

Read more...

Video Direct from Amazon is a new competitor to YouTube

American IT giant Amazon has got its own hosting. Newly-made service has been called Direct Video.

Read more...

Android malware from Google Play tricked users to install programs

All applications, which are built in Android.Click.95, are quite primitive crafts. In most cases, they represent a typical programme-a compilation of various tips, horoscopes, horoscopes, jokes and other information for each day, freely available online. Virus analysts "Doctor Web" has discovered more than 190 such applications distributed in Google Play at least six developers: allnidiv, malnu3a, mulache, Lohari, Kisjhka and PolkaPola. Thus, in total, of the Trojan managed to load at least 140,000 users. Google is already aware of this incident, however, at the time of writing many of the identified applications is still available for download.

Directory of digital content Google Play is the most trusted source for smartphones and tablets running the Android OS, but from time to time still found all sorts of malware. Recently experts of company "Doctor Web" found in this directory more than 190 applications, which is Android.Click.95, frightening users that there are problems on mobile devices and forcing them to install advertised programs.

Read more...

Adware, the Trojan has infiltrated the Android firmware devices and applications of well-known companies

The Trojan, dubbed Android.Gmobi.1, is a specialised software package (SDK-platform), which extends the functionality of Android applications and is used as device manufacturers and software developers. In particular, this module is designed for remote operating system updates, Analytics, display various notifications (including advertising) and mobile payments. However, despite the seeming harmlessness, Android.Gmobi.1 in many respects behaves like a typical Trojan, so it contains the software detected antivirus doctor.Web for Android as malware. At the moment the specialists of "Doctor Web" found this in the SDK preinstalled system ON nearly 40 popular mobile devices and applications Dr TrendMicro.Safety, TrendMicro Dr.Booster and Asus WebStorage, which is available for download in Google Play. All of the affected companies have been notified about the problem and are addressing it. So, the latest official version of Dr programs TrendMicro.Safety and TrendMicro Dr.Booster does not already contain this Trojan.

Many Android Trojans are designed to display annoying ads and install all sorts of software on mobile devices. With their help the writers get a good profit, it is not surprising that the number of such malware is growing. One of these Trojans, were investigated in March the specialists of "Doctor Web" was found in about 40 firmware Android-devices. In addition, it was found and a few apps from well-known companies.

Read more...

New features of Kaspersky Internet Security for Android – protection management via "smart" watch

The Company "Kaspersky Lab" has announced the release of a new version of Kaspersky Internet Security for Android. The updated product allows you to control protection for the smartphones and tablets with devices running on Android Wear, such as "smart" watches.

Read more...

Triada Android attacks: experts are sounding the alarm

Specialists of the "Laboratory of Marque" to tell users of Android devices about a very serious danger, which this time was a newly discovered malware Triada.

Read more...

Android Trojans have learned to infiltrate the system processes

This set consists of three acting together Trojans, which were given the names Android.Loki.1.origin, Android.Loki.2.origin and Android.Loki.3, respectively. The first one is loaded by using the library liblokih.so, apparently detected by anti-virus.Web for Android as Android.Loki.6. This library is implemented in one of the system processes the Trojan Android.Loki.3 — as a result of Android.Loki.1.origin gets a chance to act on the system with privileges of the user system. Android.Loki.1.origin is a service that has a wide range of functions: for example, the Trojan can download from the official Google Play any app using a special link containing a reference to the account of a particular affiliate program, allowing attackers are able to make income. Other features of Android.Loki.1.origin should note the following:

the Architecture of malware for the Android mobile platform is getting more complicated with every year: the first for the Trojans this system was a rather primitive application, the present sometimes not inferior to the complexity of even the most sophisticated Windows Trojan. In February 2016 the specialists of "Doctor Web" has discovered a set of malicious applications for Android that possesses the broadest spectrum of functionality.

Read more...

Dozens of games from Google Play Android contains-Trojan

The Writers have built this Trojan horse in more than 60 games, which are then placed in the directory Google Play on behalf of more than 30 developers, in particular Conexagon Studio, Fun Color Games, BILLAPPS and many others. The company "Doctor Web" has already alerted Google about this incident, at the time of publication of the infected games was still in Google Play - not recommended to download games from the catalog in the next few hours on the devices that are not protected by antivirus.

Virus analysts the company "Doctor Web" found in Google Play dozens of game applications, which hides the Trojan Android.Xiny.19.origin. The main purpose of this malware is to download, install, and run programs at the command of attackers. In addition, the Trojan can show obtrusive advertising.

Read more...

In the smartphone built-in Philips S307 arc detected Trojan

The Specialists of Doctor Web have discovered a new danger in the GUI of the smartphone Philips S307 arc embedded Trojan, the purpose of which is to show annoying ads and also download and install malicious software.

Read more...

A hazardous Trojan horse that is detected in the firmware of Android-smartphone Philips S307 arc

The First information about Android.Cooee.1 appeared in October 2015, when the malware was detected a few low end Android smartphones from, to put it mildly, not the most well-known brands. New case detection of this Trojan showed that the appetite unknown attackers have been steadily growing threat application has been detected on the mobile device Philips S307 arc. The specialists of "Doctor Web" has informed the incident to the manufacturer, which is currently considering possible solutions to the problem.

Among the major trends of the past year include the emergence of a large number of pre-installed on an Android device malware that invisibly for users can download and install various applications, and often showed the hype. One of these Trojans has become Android.Cooee.1, built-in GUI several budget smartphones in the production of a number of little-known Chinese companies. Apparently, the attackers did not stop there and continued the dangerous practice in the next year: the specialists of "Doctor Web" revealed another case of an Android implementation.Cooee.1 for Android device, and this time the "surprise" expected buyers of smartphones from well-known electronics manufacturer.

Read more...

Kaspersky lab has detected a new Trojan

The Specialists of "Kaspersky Lab has detected a new Trojan on the Android platform, which successfully disguised as the Google Play app and Google Wallet.

Read more...

Arrested the author of the virus, stealing the money of clients of Sberbank

A few days ago we reported about a new virus for Android smartphones, which killed tens of thousands of Russians, clients of Sberbank. The message on the website of the Ministry of interior will soothe many - developer of the virus and its accomplices arrested and already give grateful evidences, having agreed to cooperate with the investigation.

Read more...

Android customers of the savings Bank became victims of scams

Tens of thousands of Russian Android smartphone users who have linked to their phone numbers on the card of Sberbank, were victims of a newly discovered Trojan, which was written off from the account of Bank clients money, without their knowledge, of course.

Read more...