Monthly Archives: January 2014
Snoop-it tool to assist security assessments and dynamic analysis of iOS Apps
Key generators for several program spreads malware
Fake AV Trojans of family TROJ_GATAK are increasing according to TrendMicro. The malware is masking as key generators for a wildly used programs. Fake antiviruses are programs that simulate an antimalware in order to obtain a compensation for detecting nonexistent
BANLOAD Trojan tweaked to target Banking customers
LiME – Linux Memory Extractor
Microsoft removes vulnerable Tor to protect customers
Microsoft has removed Tor vulnerable program to protect computers from future infections. Everything is done for the benefit of customer computers to make them clean and safe. Vulnerable Tor software installed Sefnit malware. It uses Tor to communicate with the
Microsoft to release 4 patches in January
ZeroAccess web fraud botnet takedown affects TDSS
Microsoft started with law enforcement agencies to take down ZeroAccess botnet one of the very active crimeware at the end of last year and that is hardly to remove without damaging the operating system. This malware can be used to