This mobile Trojan from China fills your phone with porn apps

Malware that secretly installs porn apps on your phone is infecting devices by the millions, becoming the world’s largest mobile Trojan. The malware, called “Hummer,” is a family of Trojans that imitate Android apps before striking, according to Cheetah Mobile, a maker of security and utility apps. The company’s researchers have been tracking Hummer since[…]

FacebookTwitterGoogle+Share

DNC hacker Guccifer 2.0 denies Russian links and mocks security firms

The hacker who claims to have breached the Democratic National Committee’s networks is trying to beat back accusations that he’s linked with the Russian government. The intrusion, which stole confidential files from the DNC, was his “personal project,” hacker Guccifer 2.0 said in a Thursday blog post. Security firms and the DNC may be trying to[…]

Over 100 DDoS botnets built using Linux malware for embedded devices

LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised Internet-of-Things devices. LizardStresser has two components: A client that runs on hacked Linux-based machines and a server used by attackers to control the[…]

IDG Contributor Network: How computer chips can be hacked

Mass implementation of Trojan viruses, introduced in the chip manufacturing process, will be responsible for allowing attackers and others to obtain leaky data and to control processes from IoT devices and beyond, a German security expert says. Christof Parr, who is head of embedded security at Ruhr-Universität Bochum in Germany, has obtained special grant funding[…]

ACLU lawsuit challenges US computer hacking law

The American Civil Liberties Union has filed a lawsuit challenging a 30-year-old hacking-crimes law, with the civil liberties group saying the law inhibits research about online discrimination. The ACLU on Wednesday filed a lawsuit challenging the Computer Fraud and Abuse Act on behalf of a group of academic researchers, computer scientists, and journalists. The CFAA limits online research[…]

Terrorism database of 2.2 million people leaked, a blacklist used by governments, banks

Security researcher Chris Vickery has a knack for finding unprotected databases, but this time it’s an especially explosive discovery as he came across a “terrorism blacklist” which contains the names of 2.2 million “heightened-risk individuals and organizations.” Vickery asked Reddit if he should share a copy of the Thomson Reuters World-Check database from mid-2014. He[…]