Security researchers create undetectable hardware trojans

Tuesday, September 17th, 2013

A team of security researchers from the U.S. and Europe has released a paper showing how integrated circuits used in computers, military equipment and other critical systems can be maliciously compromised during the manufacturing process through virtually undetectable changes at the transistor level. As proof of the effectiveness of the approach, ...

Behold, the world’s most sophisticated Android trojan

Friday, June 7th, 2013

Recently discovered malware targeting Android smartphones exploits previously unknown vulnerabilities in the Google operating system and borrows highly advanced functionality more typical of malicious Windows applications, making it the world's most sophisticated Android Trojan, a security researcher said. The infection, named Backdoor.AndroidOS.Obad.a, isn't very widespread at the moment. The malware gives an ...

AutoIT makes malware “outrageously easy”

Tuesday, May 7th, 2013

Security firm Trend Micro has seen an uptick in AutoIT-based malware thanks to the fact that it’s an easy-to-learn language that allows for quick development. It enables everything from simple scripts that change text files to scripts that perform mass downloads with complex GUIs. One commonly seen nefarious AutoIT tool ...

Stats confirm that trojans spreading, malware being built at record rates

Monday, May 6th, 2013

Trojans continue to dominate the threat landscape, according to Panda Security's latest quarterly report, released Monday. The anti-virus maker's research arm, PandaLabs, found that between January and March of this year, more than 6.5 million new malware strains were built, with trojans comprising 75 percent of those. In total, trojans were ...

Malware-as-a-service allows victim management

Friday, June 22nd, 2012

A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell their tools. It has capabilities that let the attacker spy on the victims with actions like screen capturing, keylogging, password stealing, ...