recentpopularlog in


« earlier   
Spionage-Software unter Android erkennen und entfernen | c't | Heise Magazine
Ein An­grei­fer be­nö­tigt Ihr Handy nur für ein paar un­be­ob­ach­te­te Mi­nu­ten, um dar­auf eine Spio­na­ge-App zu ver­ste­cken. Etwas mehr Hand­grif­fe sind von­nö­ten, um die In­fek­ti­on zu er­ken­nen und die Über­wa­chung zu stop­pen.
heise  tips  ct  android  malware 
15 hours ago by torben
Researchers use Intel SGX to put malware beyond the reach of antivirus software | Ars Technica
Processor protects malware from attempts to inspect and analyze it.
Researchers have found a way to run malicious code on systems with Intel processors in such a way that the malware can't be analyzed or identified by antivirus software, using the processor's own features to protect the bad code. As well as making malware in general harder to examine, bad actors could use this protection to, for example, write ransomware applications that never disclose their encryption keys in readable memory, making it substantially harder to recover from attacks.
The research, performed at Graz University of Technology by Michael Schwarz, Samuel Weiser, and Daniel Gruss (one of the researchers behind last year's Spectre attack), uses a feature that Intel introduced with its Skylake processors called SGX ("Software Guard eXtensions"). SGX enables programs to carve out enclaves where both the code and the data the code works with are protected to ensure their confidentiality (nothing else on the system can spy on them) and integrity (any tampering with the code or data can be detected). The contents of an enclave are transparently encrypted every time they're written to RAM and decrypted upon being read. The processor governs access to the enclave memory: any attempt to access the enclave's memory from code outside the enclave is blocked; the decryption and encryption only occurs for the code within the enclave.
security  privacy  chip  firmware  malware  research  RAM 
5 days ago by rgl7194
Android 'Triout' spyware records calls, sends photos and text messages to attackers | CSO Online
Researchers identified new Android spyware with extensive surveillance capabilities being bundled into legitimate apps.
malware  android  mobile  infosec 
6 days ago by emory
Biohackers Encoded Malware in a Strand of DNA
a group of researchers from the University of Washington has shown for the first time that it’s possible to encode malicious software into physical strands of DNA, so that when a gene sequencer analyzes it the resulting data becomes a program that corrupts gene-sequencing software and takes control of the underlying computer.
hacking  DNA  malware  interesting 
9 days ago by flyingcloud
cse-assemblyline / alsvc_apivector — Bitbucket
assembly line service that will pass sample through apiscout and build an apivector of the binary
al  malware  research 
10 days ago by plaxx
Biohackers Encoded Malware in a Strand of DNA | WIRED
When biologists synthesize DNA, they take pains not to create or spread a dangerous stretch of genetic code that could be used to create a toxin or, worse, an infectious disease.
additivism  dna  genetics  hacking  malware  parasitism  science  virus  viruses  stream 
10 days ago by therourke

Copy this bookmark:

to read