Rietspoof Malware Family Increases Activity | Avast
Authored by: Luigino Camastra, Jan Širmer, Adolf St?eda and Lukáš Obrdlík
Authored by: Luigino Camastra, Jan Širmer, Adolf St?eda and Lukáš Obrdlík
Recently, an interesting vulnerability was discovered by French security researcher, Elliot Alderson, in the Android app ES File Explorer (version 4.1.9.7.4 and below). ES File Explorer is a file manager, which has been downloaded more than 100,000,000…
A chain is only as strong as its weakest link. This is also true in the world of security. This year, we tracked a growing threat trend — that when just one device in a home or small business (usually the router) is compromised, then the rest of the de…
Facebook has taken down a scam targeting a large number of users that was designed to spread spam through user accounts. The scam was identified after multiple cartoon-style images portraying stereotypical relationship scenarios were shared in high q…
Written by Adolf St?eda and Jan Neduchal
Phishing is a long-standing social engineering technique used by cybercriminals to trick people into giving up sensitive information such as credit card details and login credentials. It can come in many forms, including telephone phishing, smishing …
In September 2016, Twitter, CNN, Spotify, and many others were knocked offline by the biggest DDoS attack in history. Today we know it by the name Mirai, but no one would have imagined at the time that this attack was coming from a herd of Internet of …
After publishing our story about pre-installed malware on Android devices, we continued to analyze the firmware images of cheap Android devices. It is a rather sad endeavour, as our statistics put pre-installed malware as one of the top infection vecto…
Authors: Martin Hron and David Jursa
Authored by Alena Nohová & Vlad Iliushin