HackDig : Dig high-quality web security articles for hacker

Yontoo: PUPs with two faces

Author’s Note: We at Malwarebytes continue to do our part in educating our product users and constant blog readers about day-to-day online threats and how they can avoid falling prey to them. “PUP Friday”, our latest attempt at getting users acquainted with files they may need to watch out for in the Wild Web, offers an in-depth look at some interesting and
Publish At:2016-01-29 23:10 | Read:3326 | Comments:0 | Tags:Security Threat adware Malwarebytes Pieter Arntz protection

Trojan.DNSChanger circumvents Powershell restrictions

In recent variants of the infamous DNS-changer adware we have found that the coders use a particularly interesting method to bypass the default restrictions imposed for executing Powershell scripts. Execution restrictions To protect Windows users, Microsoft has chosen not to allow the execution of Powershell scripts by default. The default setting for the E
Publish At:2016-01-23 04:25 | Read:4289 | Comments:0 | Tags:Security Threat adware changer dns Pieter Arntz powershell r

Microsoft to Remove Superfish-Like Programs Starting in March

Microsoft has taken steps to impede the next Superfish from impacting users.Superfish was pre-installed adware found on new Lenovo laptops earlier this year. The software exposes users to man-in-the-middle attacks because of the way it injects advertisements into the browser. It comes with a self-signed root cert that generates certs for HTTPS connections, r
Publish At:2015-12-23 13:50 | Read:2319 | Comments:0 | Tags:Malware Microsoft Privacy Adware Lenovo Superfish SSL interc

FrameFox: Nominated for the Most Aggressive EULA

Author’s Note: We at Malwarebytes continue to do our part in educating our product users and constant blog readers about day-to-day online threats and how they can avoid falling prey to them. “PUP Friday”, our latest attempt at getting users acquainted with files they may need to watch out for in the Wild Web, offers an in-depth look at som
Publish At:2015-11-27 16:10 | Read:3313 | Comments:0 | Tags:Security Threat adware browser hijacker disables incompatibl

Android Malware Uses Social Engineering to Enable Automatic App Installation

Security researchers have spotted a type of malware that uses social engineering to trick users into enabling it to automatically install apps on their Android devices.Michael Bentley, the head of research and response at mobile cybersecurity firm Lookout, has published a blog post in which he explains how a so-called “trojanized adware” known as
Publish At:2015-11-26 09:41 | Read:2145 | Comments:0 | Tags:Latest Security News accessibility service adware Android Lo

Cloudsota Trojan Found Preinstalled on Tens of Thousands of Tablets

A security firm has discovered that tens of thousands of tablets sold on Amazon.com and elsewhere came pre-loaded with the Cloudsota Trojan.Chinese mobile Internet security company Cheetah Mobile has published a post about its findings. In it, it highlights the complaints of many customers regarding these tablets’ poor quality of manufacture, with one
Publish At:2015-11-13 14:40 | Read:4158 | Comments:0 | Tags:Latest Security News adware Amazon Cheetah Mobile Cloudsota

DynamicPricer PUP disables browser updates

Although this one has been around for a while, DynamicPricer deserves some attention because of the different approach it uses compared to other Potentially Unwanted Programs (PUPs). What’s different? Where other adware applications look for sneaky ways to invade your up-to-date browsers or even install their own browser on your system, this one just instal
Publish At:2015-11-11 21:00 | Read:2692 | Comments:0 | Tags:Security Threat adware bundler Dynamic Pricer DynamicPricer

CrossBrowse, another Chromium Project

Author’s Note: We at Malwarebytes continue to do our part in educating our product users and constant blog readers about day-to-day online threats and how they can avoid falling prey to them. “PUP Friday”, our latest attempt at getting users acquainted with files they may need to watch out for in the Wild Web, offers an in-depth look at some interesting and
Publish At:2015-11-06 15:00 | Read:3809 | Comments:0 | Tags:Online Security adware browser chromium crossbrowse crossrid

New type of auto-rooting Android adware is nearly impossible to remove

Researchers have uncovered a new type of Android adware that's virtually impossible to uninstall, exposes phones to potentially dangerous root exploits, and masquerades as one of thousands of different apps from providers such as Twitter, Facebook, and even Okta, a two-factor authentication service.The researchers have found more than 20,000 samples of troja
Publish At:2015-11-05 06:35 | Read:2527 | Comments:0 | Tags:Gear & Gadgets Risk Assessment Technology Lab adware Android

Shuanet Adware Rooting Android Devices Via Trojanized Apps

A new strain of adware buried in repackaged popular Android applications is able to root devices and earn its keepers a tidy $2 per installation.Shuanet behaves more like malware and shares some heritage with two other adware families—Kemoge and Shedun—that also root devices and give their respective payloads system-level persistence. Between the three str
Publish At:2015-11-04 15:50 | Read:2097 | Comments:0 | Tags:Malware Mobile Security Privacy Adware Android Android Secur

Has MacUpdate fallen to the adware plague?

A Twitter user named Ciro Urdaneta made a concerning discovery on Friday: In other words, it seems that MacUpdate, long considered to be one of the only remaining trustworthy download aggregation sites for the Mac, has succumbed to the same plague that has ruined most of the others: adware. Following Mr. Urdaneta’s hints, I sought out the Skype page o
Publish At:2015-11-02 21:00 | Read:3115 | Comments:0 | Tags:Mac Malwarebytes News adware Apple mac os X

How to avoid Efast Browser, the latest adware to hit Chrome

Another day, another malware to tackle. It seems that hackers are churning out new ways to trick us on a weekly basis as security researchers have uncovered the latest threat to Internet users. Despite the likes of Google strengthening its security to combat these attacks, the culprits are continuously changing and adapting, and this latest adware has the p
Publish At:2015-10-30 01:50 | Read:2452 | Comments:0 | Tags:Internet Security Adware browser Cybercrime Google identity

eFast browser deletes and replaces your Chrome Browser

Security researchers have documented the existence of a new strain of malware dubbed eFast browser that deletes and replaces the entire Chrome Browser. Security experts from Malwarebytes have analyzed a new strain of  malware that attempts to delete Chrome and replace it with a bogus version that allows attackers to hijack
Publish At:2015-10-22 04:20 | Read:3257 | Comments:0 | Tags:Breaking News Malware adware browser Chrome eFast browser ma

Kemoge – Malicious Android Adware Infects Devices worldwide

Researchers at FireEye spotted a new malicious adware campaign (Kemoge threat) that has infected Android mobile devices in more than 20 countries. Security researchers at Fireeye have uncovered a malicious adware campaign which relies on a threat dubbed “Kemoge” based on the name of its command and control (C&C) domain aps
Publish At:2015-10-09 21:10 | Read:2478 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile adware Android expl

Android adware wields potent root exploits to gain permanent foothold

Researchers have uncovered yet another Android-based adware campaign targeting people who download what they believe are trusted titles from websites and other third-party app stores.The apps use repackaged icons to disguise themselves as popular titles and are offered for download through pop-up ads on visited websites and in-app promotions, according to a
Publish At:2015-10-08 05:15 | Read:2440 | Comments:0 | Tags:Gear & Gadgets Law & Disorder Risk Assessment Technology Lab

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud