One of the more effective ways to counter a malware infection is to make sure that it infects something that can’t have much of an influence on the rest of the system, like a sandboxed virtual machine. However as malware continues to evolve, its creators are now discovering ways to detect whether it is simply wasting its time infecting virtual machines, so it can go after more legitimate targets.
It has always been basic and common advice that smartphone users should not download apps outside of their official app stores. This is because these apps aren’t protected by the same security measures put into place by the likes of Apple or Google, meaning that some of these apps could really be hidden malware.
The number of malware being identified seems to be growing unabated as security outfit Pandalabs claims to have identified more than 20 million new malware samples for the first quarter of 2015.
The majority of these are variants of existing malware rather than new malware, designed to evade detection by software security companies, mimicking what happens with biological viruses.
Experts from Kaspersky Lab say their analysis of the Equation Group's malware confirms its state-sponsored origins, but with an unexpected weakness.
An analysis of the Equation Group malware that Kaspersky Lab revealed earlier this year may be the most advanced malware the company has ever seen, according to one of the lab's top security technology experts.
Messages purporting to be WhatsApp invitations to try out a new voice calling feature are actually nothing more than malware conduits.
WhatsApp, one of the biggest third-party instant messaging app in the world, had 700 million active users sending 30 billion messages per day, as of January 2015, making it a popular target for scammers and hackers. To boot, it has started to roll out the hotly anticipated Free Voice Calling feature—which will add a VoIP capability to make calls, a la Skype and Viber. It’s available for Android, but it’s only invite-only for now.
France's spy agency has been fingered as the likely author of complex reconnaissance malware, researchers say.
The Casper malware is one of a handful with links to the Babar spy program which leaked NSA documents revealed last month to be the handiwork of France's Direction Générale de la Sécurité Extérieure (General Directorate for External Security or DGSE).
Next time you turn off your Android phone, you might want take the battery out just to be certain.
Security vendor AVG has spotted a malicious program that fakes the sequence a user sees when they shut off their phone, giving it freedom to move around on the device and steal data.
L33tdawg: Video of their talk from #HITB2013AMS is available on YouTube.
Products frequently follow a trajectory from customized prototypes to mass-produced goods, and -- when the market matures -- manufacturers typically find ways to lure consumers by allowing efficient customization.