malwarebattle.blogspot.com
Malware Battle: Seriously Android Leak Also To Attack On Apps And Websites
http://malwarebattle.blogspot.com/2015/08/seriously-android-leak-also-to-attack.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Saturday, 1 August 2015. Seriously Android Leak Also To Attack On Apps And Websites. This week it was announced that there was a very serious leak. Is present in Android which allows an attacker installed on millions of Android phones malware by only sending a single MMS message. Stage Fright, such as the vulnerability is known, however, is also to attack in other ways, according to the Japanese anti-virus company Trend Micro. Mozilla ...
malwarebattle.blogspot.com
Malware Battle: Hacker Can Now Access Remote BMW And Mercedes
http://malwarebattle.blogspot.com/2015/08/hacker-can-now-access-remote-bmw-and.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Sunday, 16 August 2015. Hacker Can Now Access Remote BMW And Mercedes. The famous hacker Samy Kamkar recently a tool. That he cars from General Motors could open remote start and has expanded its device, which also cars from BMW, Mercedes-Benz and Chrysler are no longer safe. This has Kamkar via Twitter. Like General Motoros other manufacturers offer a smartphone app to locate car, open and start. It involves BMW Remote. Due to legal o...
malwarebattle.blogspot.com
Malware Battle: Disclaimer
http://malwarebattle.blogspot.com/p/disclaimer.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. The owner of this "[ Malware Battle. Blog does not share personal information with third-parties nor does [ malwarebattle.blogspot.com. The owner of this blog reserves the right to edit or delete any comments submitted to this blog without notice due to;. 1 Comments deemed to be spam or questionable spam. 2 Comments including profanity. 3 Comments containing language or concepts that could be deemed offensive. Subscribe to: Posts (Atom).
malwarebattle.blogspot.com
Malware Battle: Apple Patches 232 Vulnerabilities In Mac OS X, iOS, Safari And Server
http://malwarebattle.blogspot.com/2015/08/apple-patches-232-vulnerabilities-in.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Saturday, 15 August 2015. Apple Patches 232 Vulnerabilities In Mac OS X, iOS, Safari And Server. Apple yesterday evening updates for Mac OS X, iOS, Safari and OS X Server released that fix 232 leaks together. Through the vulnerabilities could allow an attacker in the worst case code on the respective platforms. Most of the vulnerabilities patched in Mac OS X. OS X Security Update 2015-006 and Yosemite v10.10.5. Labels: Apple Mac OS X.
malwarebattle.blogspot.com
Malware Battle: Hacker Makes Tool To Unlock GM Cars Remotely
http://malwarebattle.blogspot.com/2015/07/hacker-makes-tool-to-unlock-gm-cars.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Friday, 31 July 2015. Hacker Makes Tool To Unlock GM Cars Remotely. The well-known hacker Samy Kamkar has a tool designed. To cars from manufacturer General Motors (GM) are located remotely open and start. GM offers car owners a service called OnStar. With which the car can be found via a smartphone app, opened and started. Know During the upcoming Def Con conference. Shows already see a short demonstration. The makers of the popular f...
malwarebattle.blogspot.com
Malware Battle: New Android Devices Leak Late Restart Endlessly
http://malwarebattle.blogspot.com/2015/08/new-android-devices-leak-late-restart.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Wednesday, 5 August 2015. New Android Devices Leak Late Restart Endlessly. Researchers have discovered a new vulnerability in Android which could allow an attacker to restart the unit. In the event it is attacked leak via an app, it is possible to restart to endlessly leave the device. The problem is in the media server of Android, which also previously the Stage Fright leak. Was discovered, and a vulnerability that sets almost unusable.
malwarebattle.blogspot.com
Malware Battle: BitTorrent Clients Can Strengthen DoS Attacks
http://malwarebattle.blogspot.com/2015/08/bittorrent-clients-can-strengthen-dos.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Monday, 17 August 2015. BitTorrent Clients Can Strengthen DoS Attacks. Several BitTorrent clients and BitTorrent Sync application to abuse for performing DRDoS attacks, warns researcher Florian Adamsky. From City University London. Reflective DRDoS stands for Distributed Denial of Service. An additional problem is that detect attacks via BitTorrent are difficult due to the dynamic port ranges and encrypted handshake used by the clients...
malwarebattle.blogspot.com
Malware Battle: Kaspersky: Angry Ex-Employees Behind Bogus
http://malwarebattle.blogspot.com/2015/08/kaspersky-angry-ex-employees-behind.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Sunday, 16 August 2015. Kaspersky: Angry Ex-Employees Behind Bogus. Yesterday Reuters with a story. That Russian anti-virus firm Kaspersky Lab competitors like AVG, Avast and Microsoft did years sabotaged, but according to founder Eugene Kaspersky and the anti-virus company is a nonsense story from angry ex-employees. Well carried out the anti-virus company in 2009 and 2010, two experiments in which clean files to VirusTotal were sent ...
malwarebattle.blogspot.com
Malware Battle: Kaspersky Accused Of Sabotage Anti-virus Companies
http://malwarebattle.blogspot.com/2015/08/kaspersky-accused-of-sabotage-anti.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Saturday, 15 August 2015. Kaspersky Accused Of Sabotage Anti-virus Companies. The Russian anti-virus firm Kaspersky Lab would have the virus for years of competing anti-virus companies sabotaged to show to clean files for malware, so important files were deleted or quarantined. Let two former employees facing Reuters. If the malicious file seemed adequate to the original, the virus would clean file as malware can label. Microsoft s...
zeltser.com
Free Automated Malware Analysis Sandboxes and Services
https://zeltser.com/automated-malware-analysis
Free Automated Malware Analysis Sandboxes and Services. In the malware analysis course I teach at SANS Institute, I explain how to reverse-engineer malicious software. Binary Guard True Bare Metal. BitBlaze Malware Analysis Service. Comodo Automated Analysis System. EUREKA Malware Analysis Internet Service. Joe Sandbox Document Analyzer. PDF, RTF and MS Office files). Joe Sandbox File Analyzer. EXE and DLL files). Joe Sandbox APK Analyzer. Static analysis of various file types). Updated May 26, 2016.