Day: February 3, 2017

Android Ad Malware on Google Play Combines Three Deception Techniques

Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to click on ads in the background without the user’s knowledge. Blog Feature Image:  EB-generic-tablet.jpeg Twitter Card Style:  summary Contributor: Martin Zhang Summary: Three apps on Google Play use delayed attacks, self-naming tricks, and

0Shares
Read More
How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak—a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle. Yet, there is one ally that has emerged in recent years. Artificial intelligence can

0Shares
Read More
Vulnerability in Microsoft SMBv3 protocol crashes Windows PCs

Security experts warn that it may be possible to exploit a vulnerability in a protocol widely used to connect Windows clients and servers to inject and execute malicious code on Windows computers. Computers running fully patched Windows 10, 8.1, Server 2012, or 2016  that try to access an infected server will crash with a Blue

0Shares
Read More