Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

F-Secure Weblog

by Threatsolutions

January 30, 2012

Amidst my usual adventure with Android malware analysis, I saw this snippet of code while skimming through a particular sample's class modules.

Late last year, I was looking deeper into Portable Network Graphics (PNG) image format, especially about the fields that hold textual information. Upon seeing the code, it immediately triggered my suspicion as to why would the application need to check for the existence of the "tEXt" chunk of a PNG file...

F-Secure Weblog

by Threatsolutions

January 10, 2012

An Android application package (APK) can include multiple modules; one or more of these modules may be an advertisement SDK.

So what happens if the app is clean, but the ad module is fishy? When the user accepts and grants permission for the main app to install (assuming they really understood or care about the permissions requested), the user is also by extension allowing the ad modules to use those same permissions. Sometimes, the permissions are only used by the ad module, not the main application.

F-Secure Weblog

by Threatsolutions

December 28, 2011

Earlier this month, we did a post about a family of premium rate SMS Trojans, which we detected as Trojan:Android/FakeNotify.A. Now we've found that the trojan has been updated, with changes to make analysis and detection more troublesome.

F-Secure Weblog

by Threatsolutions

December 27, 2011

We've found Android trojans that attempt to send SMS messages to premium rate SMS numbers. That's not unusual. What is different though is that these trojans don't work.

F-Secure Weblog

by Threatsolutions

December 23, 2011

There seems to be a growing practice where malware authors boldly use similar package names and icons of popular apps for their malware, and then publish this malware on the official Android Market.

F-Secure Weblog

by Threatsolutions

December 9, 2011

We ran across two Android premium-SMS trojans today, coincidentally both targeted at Russian users.

F-Secure Weblog

by Threatsolutions

November 16, 2011

We found an updated version of Backdoor:OSX/DevilRobber which uses the same technique as its predecessor to disguise itself as a legitimate application, though this time it calls itself PixelMator.

The main point of difference in DevilRobberV3 is that it has a different distribution method - the "traditional" downloader method. The DevilRobberV3 sample that we analyzed is an FTP downloader that will download its backdoor installer package from an FTP Server service provider.

F-Secure Weblog

by Threatsolutions

October 25, 2011

We did a quick post yesterday about a DroidKungfu sample that appeared to use a novel infection vector.

The application we've been analyzing is called com.ps.keepaccount, and a quick check into its content reveals a couple of findings. Once installed, the application would inform the user that an update is available; when the user installs this update, the updated application would then contain extra functionalities, similar to that found in DroidKungFu malware.

F-Secure Weblog

by Threatsolutions

October 19, 2011

There's something new brewing in Mac malware development (again).

Recent analysis has revealed to us that Trojan-Downloader:OSX/Flashback.C disables the automatic updater component of XProtect, Apple's built-in OS X anti-malware application. First, Flashback.C decrypts the paths of XProtectUpdater files that are hardcoded in its body...

F-Secure Weblog

by Threatsolutions

October 12, 2011

One of our analysts has discovered something interesting while debugging the latest version of Flashback, a Mac trojan that attempts to trick people into believing it's an Adobe Flash Player update.

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

[vb-jobs] - STRICTLY MODERATED Visual Basic employment list

Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.


Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Photo Gallery - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options. Dave's Quick Search Deskbar
Reliable Answers.com/virus/news.asp AddThis Social Bookmark Button
Google