ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Fake mobile AV apps offered on Google Play

Fake mobile AV apps offered on Google Play | ICT Security-Sécurité PC et Internet | Scoop.it

Downloading apps from Google Play, the official online Android app market, is not without its dangers.

 

Even though Google has been scanning the offered apps for malware by using "Bouncer" - an automated app scanning service that should, in theory, detect malicious software and developers who keep offering it - there are still instances where they aren't booted out of the market soon enough.

 

Security researchers from AegisLab have recently discovered over 15 fake AV and "free SMS" apps being offered by the same developer ("thasnimola") that has been flagged for selling fake NQ Mobile apps in April.

 

Read more and be aware...

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Flashback botnet decline not as fast as expected

Flashback botnet decline not as fast as expected | ICT Security-Sécurité PC et Internet | Scoop.it

Given the attention that the Flashback Mac malware has received since the discovery of the 600K strong botnet of computers infected with it and the number of tools that various security firms and Apple issued for its removal, it's somewhat disheartening to hear that===> the botnet still counts around 140,000 zombies. <===

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Active fake AV spam campaigns hit Twitter

Active fake AV spam campaigns hit Twitter | ICT Security-Sécurité PC et Internet | Scoop.it

Two distinct malicious spam campaigns are currently targeting Twitter users and taking them to compromised sites serving rogue AV and scareware software, warns GFI.

 

The messages are short ("a must see LINK", "young girls are waiting LINK") and are spewed from bot and compromised accounts. Both contain links to a .tk domain.

 

Read more...

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Flashback botnet shrinks, downloads of Mac AV software rise

Flashback botnet shrinks, downloads of Mac AV software rise | ICT Security-Sécurité PC et Internet | Scoop.it

News that nearly two percent of all Mac users have had their computers infected by the Flashback malware which roped them into a 600K strong botnet has hit the Mac community with the realization that ===> their machines are not as secure as they believed and hoped they are. <===

 

Meanwhile, the Flashback botnet has shrunk in the last few days and as of yesterday, counts less than 270k infected machines.

 

According to Symantec, part of the reason for this dramatic decrease is the fact that a number of security firms have executed sinkholing operations against the botnet, but the biggest reason likely lies in the fact that many Mac users have heard the news and proceeded to scan and disinfect their machines.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Free malware scanning and blacklist monitoring for websites

Free malware scanning and blacklist monitoring for websites | ICT Security-Sécurité PC et Internet | Scoop.it

Comodo released SiteInspector, a free malware scanning and blacklist monitoring for websites. The free service allows website owners to set up recurring, daily checks on any 3 pages of a domain.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Google reveals it is already scanning Android apps for malware

Google reveals it is already scanning Android apps for malware | ICT Security-Sécurité PC et Internet | Scoop.it
Even though most malicious Android apps are served from third-party app markets, cyber crooks occasionally manage to disseminate some via Google's official Android Market.

 

Codenamed "Bouncer", it scans both newly added and old apps in search for potentially malicious software, and analyzes developer accounts in order to prevent repeat-offending developers from returning with new malicious offerings.

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

RedKit exploit kit spotted in the wild

RedKit exploit kit spotted in the wild | ICT Security-Sécurité PC et Internet | Scoop.it

A new exploit kit that Trustwave researchers have spotted being used in the wild is aiming to enter a market that is practically monopolized by the widely famous BlackHole and Phoenix exploit kits.

 

To deliver the malware, RedKit exploits two popular bugs: the Adobe Acrobat and Reader LibTIFF vulnerability (CVE-2010-0188) and the Java AtomicReferenceArray vulnerability (CVE-2012-0507), lately used by the criminals behind the massive Flashback infection.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware disguised as new Instagram Android app

Malware disguised as new Instagram Android app | ICT Security-Sécurité PC et Internet | Scoop.it
Instagram, the popular free photo sharing app for iOS devices, is now available for download for Android users on Google Play and Instagram's website.

 

Unfortunately, a rogue malicious version of it is also being pushed onto Russian Android users, offered from a webpage that mimics the legitimate one:

 

read more...

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

New Mac malware uses Flashback Java exploit

New Mac malware uses Flashback Java exploit | ICT Security-Sécurité PC et Internet | Scoop.it

Apple's decision to push out a Flashback malware removal tool for OS X Lion bundled with a new Java security update has proven to be rather fortunate, as a new Mac OS X threat has been discovered taking advantage of the vulnerability (CVE-2012-0507) exploited by the latest Flashback variants.

 

The security update in question configures the Java web plug-in to disable the automatic execution of Java applets in browsers, a move that should prevent users from inadvertently falling victim to similar drive-by malware attacks in the future.

 

 

In the meantime, those who haven't installed the update are at risk of getting their machines compromised by a newly detected backdoor Trojan that Kaspersky Lab researchers dubbed SabPub.

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Mac Flashfake removal tool

Mac Flashfake removal tool | ICT Security-Sécurité PC et Internet | Scoop.it

In response to the recent discovery of the Flashfake botnet, Kaspersky Lab has announced the availability of its free Flashfake Removal Tool.

No comment yet.
Scooped by Gust MEES
Scoop.it!

The evolution of targeted attacks and exploit kits

The evolution of targeted attacks and exploit kits | ICT Security-Sécurité PC et Internet | Scoop.it
Investigating the Web and email threat trends in the second half of 2011, M86 Security Labs analyzed spam and malware activity, including the current use of exploit kits, fraudulent digital certificates and social networking schemes, and tracked global Internet security trends.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Unwanted apps on Android smartphones

Unwanted apps on Android smartphones | ICT Security-Sécurité PC et Internet | Scoop.it
Shortly put, the original Android application downloaded from a third-party location contains “the real deal” as well as a Trojanized service (usually called “GoogleServicesFrameworkService”), which is launched as soon as the host application is started.
No comment yet.