malware

Mobile malware grows by 614 percent in last year

Mobile malware creators and smartphone makers seem to be in a neck-and-neck software race, but new data shows that the malware creators could be taking the lead.

Juniper Networks released its third annual Mobile Threat Report on Tuesday and the findings aren't pretty. Mobile malware grew at a rate of 614 percent from March 2012 to March 2013 -- that's equal to 276,259 malicious apps floating around out there. Last year, the increase was a mere 155 percent.

The report is based on an analysis of more than 1.85 million mobile apps and vulnerabilities across major … Read more

Google: Hacked sites far worse than attack sites

Web sites you think are safe but have been compromised to distribute malicious software are far more prevalent than sites that are intentionally dangerous, according to a new Transparency Report from Google released on Tuesday.

The new Safe Browsing section of the report reveals some of the security trends that Google has been seeing. While Google reiterated that its Safe Browsing program flags up to 10,000 sites a day, the report showed that hacked sites remain a major problem -- with about 60 percent hosting malware and 40 percent being used for phishing attacks.

Dedicated attack sites numbered in … Read more

The 404 1,291: Where we paddle out to North Brother island (podcast)

Leaked from today's 404 episode:

- What happens when you install every adware, toolbar, and plug-in offered for download on the Internet?

- Great comments on YouTube for Jeff.

- Cheap vacation: An abandoned island in the middle of NYC.

- You can now buy a spray at Home Depot that makes anything wateproof.

- I usually don't get excited about iPad cases, but this one takes me back.… Read more

ExploitShield becomes Malwarebytes Anti-Exploit

ExploitShield launched in September 2012 (covered previously by Seth Rosenblatt) with an ambitious goal: to close the yawning security gap for zero-day threats, those nasty exploits that arise upon first notice of a security vulnerability in a browser or other application before developers can fix the hole. Today, the ExploitShield technology gained a lot more visibility as it was acquired by security-software publisher Malwarebytes, whose Malwarebytes Anti-Malware software has been a Top 10 product on Download.com for many years.

As a result of the purchase, Malwarebytes has released a new beta version of the software, now called Malwarebytes Anti-Exploit. … Read more

Malware masquerading as Bad Piggies found on Google Play

Heard of the game Bad Pigs? Or is it Bad Piggies?

Some clever hacker decided to create a malicious app deceivingly similar to one of the top games in the Google Play store. And, it was downloaded more than 10,000 times before people took notice.

Security company F-Secure wrote on Wednesday that it had located Bad Pigs -- which had the same artwork and app description as Bad Piggies -- and let Google know. The only apparent differences between the two apps were the names of the app and the developer -- who was "Dan Stokes" rather … Read more

Review: Max Spyware Detector scans your computer for viruses and more

Max Spyware Detector quickly scans your system to find and remove spyware. In addition to being a little expensive, this download is bloated and lacks some high-end performance when it comes to spyware blocking. For as huge as it is, it should be stocked with goodies, but instead it doesn't even offer active protection from viruses.

To call this download big would be an understatement. It checks in at about 182MB, which would take some time to download even on faster connections. It starts scanning automatically once you start the program, though. The download hogs most of your computer'… Read more

Review: 360 Internet Security provides protection all around

360 Internet Security 2013's installer is a light 17MB, and though the overall installation time and duration was relatively fast, it's update process took longer than we had expected. Prior to installation, 360 will automatically prompt you to agree to their license and usage terms, something that's normally an opt-out process. And though it's more or less required to move on, those who are more keen on privacy details or interested in the terms of agreement should keep this in mind before they install the software. Still, the opt-out option might appear a bit suspicious, especially … Read more

Chinese hackers reportedly stole Obama and McCain documents

On the eve of President Barack Obama's high-level meeting with Chinese President Xi Jinping, U.S. intelligence officials have revealed that a slew of documents and e-mails were stolen during the 2008 presidential campaign from both the president and then GOP presidential candidate John McCain. Officials are accusing China's government for the hack.

According to NBC News, officials said that they first detected the major cyberattack in the summer of 2008 and were then able to trace the culprits back to China.

"Based on everything I know, this was a case of political cyberespionage by the Chinese … Read more

Review: F-Secure Mobile Security gets the job done

F-Secure Mobile Security is an all-encompassing service that provides antivirus scanning, parental controls, and anti-theft solutions in an attempt to provide an all-encompassing protection package.

Upon installation, the app will walk you through a series of steps that include accepting some guidelines and allowing permissions, like the ability to wipe your device without warning, check your location, and other sensitive administrative actions. It'll then guide you through an anti-theft setup process, first with Android's stock security and then with F-Secure's own security code. You'll then be asked to add an optional trusted number to send an … Read more

New proof-of-concept malware demonstrates virus for OS X

Security researchers have found a proof-of-concept attack that appears to be the first true viral malware approach for compromising OS X.

The malware is called "Clampzok.A" and is a cross-platform malware package that alters the binary files on an affected system so when executed, the binary will infect neighboring binary files.

The malware is written in assembly code, and was originally released in 2006 for Windows and Linux systems, but was recently updated to affect 32-bit Mach-O binary files in OS X machines.

Unlike Trojan horses, spyware, and adware that hide in one location on the system … Read more