[email protected] +603-2181 3666
Extol Threat Intelligent Notification
Anti-malware Testing Undercover
September 15, 2016

This week Cylance’s Chad Skipper published an article called “Security Testing Houses: Know the Truth!” that all people interested in security solutions testing should read. There are some serious accusations against some testing houses and vendors (without naming them) such as: –          “vendors who pay so that their test results will show 100% efficacy” –          […]

Fooling the ‘Smart City’
September 15, 2016

The concept of a smart city involves bringing together various modern technologies and solutions that can ensure comfortable and convenient provision of services to people, public safety, efficient consumption of resources, etc. However, something that often goes under the radar of enthusiasts championing the smart city concept is the security of smart city components themselves. […]

5 simple tricks to boost your PC security
September 14, 2016

Because we rely on technology to manage every detail of our lives, devices are a natural target for criminals. Why steal your wallet when they can grab your online banking password and empty your account remotely? Keeping your PC and other devices secure is incredibly important. Here are five ways you to avoid becoming a […]

Rooting Pokémons in Google Play Store
September 14, 2016

A few days ago we reported to Google the existence of a new malicious app in the Google Play Store. The Trojan presented itself as the “Guide for Pokémon Go”. According to the Google Play Store it has been downloaded more than 500,000 times. Our data suggests there have been at least 6,000 successful infections, […]

The most recent update to Google’s operating system, the most widely used around the world, is now available for Nexus devices and will soon be out there for users of all other devices, as manufacturers begin to include it. As is often the case, it will be some time before it is universally adopted, though […]

It is this time of the year when children are heading back to school. Not only will they be taking with them their memories from an amazing summer spent chasing Pokemons, and their hopes to have fun while learning more about the world… they’ll also be taking lots of consumer electronics. A recent study by […]

Though it may seem trivial, it is not: the security of your company and of your customers depends largely on the passwords that your employees use. In fact, should any of them make such a serious error as, for example, reusing their login credentials across different services, the consequences could be catastrophic, as Dropbox has […]

In the previous article, we described the mechanisms used by Trojan-Banker.AndroidOS.Gugi.c to bypass a number of new Android 6 security features. In this article, we review the entire Gugi mobile-banking Trojan family in more detail. The use of WebSocket by Gugi The mobile-banking Trojan family, Trojan-Banker.AndroidOS.Gugi is interesting due to its use of the WebSocket […]

1 57 58 59 60 61 157