Warning On Possible Android Mobile Trojans

Author: Omid Farhang Published: January 13, 2010 Reading Time: 2 min

Google’s Android mobile operating system has been out for a while and is generating more and more interest. Now there has been some buzz about fraudulent applications being posted on the Android Market. See these postings: Both of these apps were written by an anonymous developer known as 09Droid. In fact, he had a whole collection of online banking applications for sale on the Market: ...

Continue Reading Warning On Possible Android Mobile Trojans

OWA-Malware is still being sent

Author: Omid Farhang Published: January 13, 2010 Reading Time: 1 min

The Internet Storm Center reports that malware which claims to be “new Outlook Web Access settings” is still being sent out by cyber criminals. We saw those malware emails in the middle of October already.

Continue Reading OWA-Malware is still being sent

InSysSecure

Author: Omid Farhang Published: January 13, 2010 Reading Time: 1 min

InSysSecure is a rogue security program, designed to rip people off. InSysSecure uses false security warnings, alerts and system scans to frighten people into thinking their computer systems are infected, all the while InSysSecure is the actual infection. if your system is infected with above malware, you should remove it soon, Click Here to learn how to remove it.

Continue Reading InSysSecure

W32/Fame

Author: Omid Farhang Published: January 12, 2010 Reading Time: 1 min

Unlike the first malware authors who wrote viruses seeking fame through destruction, their motivation has changed to financial gain. Nevertheless, there are still the ones out there who share the first authors’ intent. I was analysing a simple Trojan today and saw the following message: It is not uncommon for malware authors to leave messages in their code for Researchers to read. This one did bring a smile to my face, so he was rewarded by it being named BackDoor-EKD which is an increment of one from BackDoor-EKC 😉

Continue Reading W32/Fame

Open season on tax-payers

Author: Omid Farhang Published: January 12, 2010 Reading Time: 2 min

As any reader of this blog knows, cybercriminals can steal your money not just by putting malware on your machine, but by phishing attacks too. Phishing attacks don’t just target online banking and e-payment systems, but almost any site which asks the user to input sensitive data. Sites run by national government agencies are a prime example as they often demand a wealth of personal information which goes far beyond a simple user name or account number + PIN. While filling in a tax return online might seem like a great way to save time and paper, it gives cybercriminals a great opportunity to scoop all your details at once – data which could then be used to steal your identity and/or commit further crimes in your name. ...

Continue Reading Open season on tax-payers

Firefox 4!

Author: Omid Farhang Published: January 12, 2010 Reading Time: 3 min

The third version of Firefox has emerged as the most successful leader in the browser category of all alternatives to Internet Explorer. Since the official launch of its first release in mid 2008 has not only grown in use but also in popularity, although during this time there was a launch of the greatest threat that has known so far, Google Chrome. That is why, people from Mozilla are working hard to beat newcomer in the race to become the most popular browser. It is true that the current “saga” still has to cut fabric, then Firefox 3.6 It is planned for early 2010, and Firefox 3.7 will happen a few months later, respectively including versions 1.9.2 and 1.9.3 Gecko engine. ...

Continue Reading Firefox 4!

SysProtector

Author: Omid Farhang Published: January 12, 2010 Reading Time: 1 min

SysProtector and ApcDefender are two new rogue antispyware programs released in the past 48 hours. SysProtector and APCDefender are potentially very dangerous PC infections. These rogues use fake security alerts and warnings to trick people into thinking their PC is under attack, all the while they drop fake files on the system. These rogues will also prevent other programs from opening, hijack the web browsers and render the PC nearly useless. Below is a screenshot of a hijacked browser, showing fake threat warnings. ...

Continue Reading SysProtector

Cybersitter sues China, others, for $2.2 billion in Green Dam fiasco

Author: Omid Farhang Published: January 6, 2010 Reading Time: 2 min

California software company Cybersitter LLC, has sued the People’s Republic of China and seven computer manufacturers in U.S. Federal court for stealing 3,000 lines of its Internet filter software code and using it in last year’s Green Dam fiasco in China. The suit, “Cybersitter v. the People’s Republic of China,” was filed in U.S. District Court, Central District of California (Los Angeles). It also names Acer, Lenovo, Sony Corp., Toshiba, Asustek Computer Inc., Benq Corp. and Haier Group as defendants. ...

Continue Reading Cybersitter sues China, others, for $2.2 billion in Green Dam fiasco

PCProtectar

Author: Omid Farhang Published: January 6, 2010 Reading Time: 1 min

PCProtectar is the latest rogue security software infecting PC’s across the interwebs. PCProtecter uses false security warnings and system scan results to trick people into buying the software. If your PC has been infected with PCProtectar, don’t fall for the scam. Do not buy this software, it is completely useless and an infection in itself. PCProtectar is a potentially dangerous infection that may cause programs to stop working, web browsers to not open, making it impossible to access the internet. PCProtectar should be removed from infected computer systems immediately. ...

Continue Reading PCProtectar

How to rescue files encrypted by Data Doctor 2010?

Author: Omid Farhang Published: January 6, 2010 Reading Time: 1 min

We have a tool available to do just that. Click Here. How to use dd2010_decrypter.exe to do batch processing: Place the encrypted files in a directory (i.e. c:\encrypted_files\) Copy dd2010_decrypter.exe into another directory and FROM THAT DIRECTORY, run the following command: for %f in (“c:\encrypted_files\.”) do dd2010_decrypter.exe %f %f.decrypted All files in the encrypted_files folder will be processed and the new decrypted files will have the same name but their extension will be “.decrypted.” ...

Continue Reading How to rescue files encrypted by Data Doctor 2010?