Malware RSS Feed
This minitrack focuses on research and automation techniques that can be applied to mobile platforms to ensure that developed software on these devices is secure and does not compromise other system properties. To contribute to the minitrack, visit the HICSS-47 website or send mail to us at email@example.com.
Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.
Over the last few years, we have been monitoring a cyber-espionage campaign that has successfully compromised more than 350 high profile victims in 40 countries. The main tool used by the threat actors during these attacks is NetTraveler, a malicious program used for covert computer surveillance
This blog post describes the risks of using Microsoft Exchange features that use Oracle Outside In and what you can do about it.
We know that the family of malware called Trojan.MSIL.Jumcar and Trojan.Win32.Jumcar was developed in Peru with the primary aim of attacking Peruvian users. We also know that Chilean and Peruvian users have latterly been targeted as well.