Posts Tagged ‘Spyware’

Android App Security5 Ways To Secure Your Next Android App

Android security has become a hot button issue among Android users and developers alike. While the Android platform does offer significantly more freedom when compared to iOS, BlackBerry and Microsoft operating systems, this freedom has a trade off; Android devices and applications have often been seen as far less secure than other options. For this reason, Android developers need to take special precautions when securing their applications. (more…)



There are many ways of penetration of spyware on your computer.

You can download them from the Web site on the Internet, receive e-mail, opening the link received via ICQ, installing unlicensed software from piracy drive, etc.

Spyware programs often mask their presence on your computer or just do not show any sign that they at you “on a visit”. (more…)

KeyloggersKeyloggers – are applications that monitor keyboard keystrokes and sends this information to a malicious user.

This can be done by mail or by sending directly to a server located anywhere in the global network. This information can then be used to collect email or other details from unsuspecting users, and perhaps even to obtain source code of programs at vendors. (more…)

spywareThis article is devoted quite relevant in the present time the problem – the problem of malicious code. Until a few years ago, the situation was quite simple – there applications (including the operating system) and computer viruses that programs capable of infecting other applications by implementing them in their native. Recently, however, there was a lot of malicious programs, which can not be considered viruses because they do not have the ability to reproduce. For such programs, there are many categories: Trojan, Backdoor, Trojan-Downloader, MalWare, SpyWare, Adware, Dialer … Classification is often quite controversial – manufacturers of various antivirus software include the exact same program for different categories. This article is an attempt to define a classification of malware and to formulate criteria for the program can be classified as SpyWare and Adware. (more…)

RootkitRootKit term historically come from the world of Unix, where this term is a set of tools that a hacker installs them on a compromised computer after the initial access. This is usually hacking tools (sniffers, scanners) and Trojans, replacing the basic utilities Unix. RootKit allows a hacker to gain a foothold in the compromised system and conceal their activities.

In Windows, a RootKit is considered a program that penetrates into the system and hooks system functions, or shall replace the system libraries. Intercepting and modifying low-level API functions in the first place such a program can effectively hide its presence in the system, protecting it from detection by antivirus software and user. In addition, many RootKit can mask the presence of any system described in its configuration of processes, folders and files on a disk, registry keys. Many RootKit installed in your system drivers and services (which of course, are also “invisible”). (more…)

McAfee logoIn the second quarter of 2012, the company’s specialists McAfee was found on 1.5 million more malware than in the first quarter of 2012, number of malicious programs has grown at a rate of approximately 100 thousand samples per day – such data is presented in the report on threats to McAfee. “This increase in the number of detected malware has not been seen for four years,” – the company said.

“Over the last quarter we have often found good examples of malware threatening ordinary consumers, businesses and critical infrastructure,” – said Vincent Weafer, senior vice president of McAfee Labs. – Some of the biggest attacks using malware in the second quarter of 2012 include Flashback, aimed at device Macintosh, and Flame, the object of which was the energy sector. This is a good illustration of the growing number of threats. ” (more…)

Virus AlertTrojan.Win32.Jorik.Carberp.hb – Spyware is designed to steal confidential user data.

Technical details

Spyware is designed to steal confidential user data. It is a Windows (PE-EXE file). Has a size of 233,867 bytes. Packed with an unknown packer. Unpacked size – about 242 KB. Written in C + +.


After you activate the Trojan takes interceptors installed in System Service Descriptor Table (SSDT).

Further copies its body to the startup folder of the current user Windows:

% Documents and Settings% \% Current User% \ Start Menu \ Programs \ Startup \ igfxtray.exe

Thus, a copy of the Trojan is launched automatically each time the system. (more…)