Targeted Attacks: Stealing Information Through Google Drive
...vendors and researchers. We have seen malware that have taken advantage of these sites, such as DropBox, Sendspace, and Evernote. We can now include Google Drive to the list of... more…Phishers Improve Scheme With Spoofed Google Drive Site
...Cybercriminals and attackers are leveraging Google Drive site and brand to go under the radar and avoid detection. Just last week, a targeted attack uses Google Drive as a... more…How Trojans manipulate Google Play
...For malware writers, Google Play is the promised land of sorts. Once there, a malicious application gains access to a wide audience, gains the trust of that audience... more…Malware and Winter Olympics
...us reprint an article from 20 years ago. The below analysis was first published in the March 1994 edition of the Virus Bulletin magazine. Enjoy! ————— Olympic GamesVirus Bulletin, March... more…Ztorg: money for infecting your smartphone
...This research started when we discovered an infected Pokémon GO guide in Google Play. It was there for several weeks and was downloaded more than 500,000 times. We... more…What is Google Panda and how to recover after Google Panda effect?
...Before helping you with the Panda recovery tips, it is very important to know what Google Panda is? Since February 2011, Google started using Google Panda which is... more…AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play
...The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes WAP billing... more…MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware After 5 Years of Development
...in the series, with three of them available from Google Play since 2013 and the other from around 2017. Currently, all four apps have been removed from Google Play while... more…My Experience with Google on 2012
...Google is one of the indispensable search engines in the present scenario. It occupies the major role for most of SEO experts. Moreover, it offers great benefits for every person,... more…A360 Drive Abused to Deliver Adwind, Remcos, Netwire RATs
...to raise red flags. It resembled the way Google Drive was misused as a repository of stolen data, for instance. The payloads we saw during our research—remote access tools (RATs)—are... more…Autodesk’s A360 Drive Abused to Deliver Adwind, Remcos, Netwire RATs
...to raise red flags. It resembled the way Google Drive was misused as a repository of stolen data, for instance. The payloads we saw during our research—remote access tools (RATs)—are... more…“Google Dorking” – Waking Up Web Admins Everywhere
...Last July, the US Department of Homeland Security warned of a new kind of criminal attack: “Google dorking“. This refers to asking Google for things they have found via... more…IT threat evolution Q1 2018. Statistics
...(for example, programs integrated in complex installers, encrypted files, etc.). Data in this section is based on analyzing statistics produced by Anti-Virus scans of files on the hard drive at... more…PSA: Get 2GB of free Google Drive storage when you perform an account security checkup
...Admit it: you can always use more cloud storage. Google is offering you an easy way to score more Drive space and get some extra peace of mind... more…A Look at Google Bouncer
...Play), Google introduced a security service with they codenamed Bouncer in February of this year. Bouncer quietly and automatically scans apps (both new and previously uploaded ones) and developer accounts... more…Malware That Pretends To Be Google
...legitimate organization. As of late, it seems the usual organization chosen is Google. What do you think a user will think when they see the following code on their site:... more…Kam dál?
- Stealthy malware Skimer helps hackers easily steal cash from ATMs
- First step in cross-platform Trojan bankers from Brazil done
- Microsoft Visual Studio CVE-2019-0546 Remote Code Execution Vulnerability
- NASA CIO allows HPE contract to expire, refuses to sign-off on authority to operate
- Hackers Steal Details of Verizon Enterprise Customers
- Report: NSA breaks into Yahoo, Google data center links
- Blackhole Exploit Kit creator ‘Paunch’ in custody, Russian police confirm
- 4 security suites that protect all your devices
- Microsoft .NET Core CVE-2018-8292 Information Disclosure Vulnerability
- File Security Evolution: From 5 Years Ago to Today (with a Hint at Tomorrow)