Category Archives: Virus & Worms

Threats android-based smart phone will bring on money transfer services in Kenya

https://i2.wp.com/blog.trendmicro.com/trendlabs-security-intelligence/files/2012/08/Android-Malware-Growth-01.jpgThreat landscape is changing rapidly due to the growth of data services and smart phone market in Kenya. Users are streaming in mobile stores and customer care centers to redeem Bonga points and acquire smart phones . Its a craze sweeping around, walking the streets of Nairobi, I see people flashing trendy and sleek smart phones of all sorts (even kam-china smarphone). As an economist it portrays the growth of Kenya economy; the Government  increased taxes. The marketers are hitting there end month targets and the mobile operators announcing huge growth of profits surpassing another billion mark (even though I believe most of subscribers fore-go a meal to top up with a kabambe kumi at-least) translating to fat cheques to the “Shareholders” smiling all the way to the bank.

Continue reading Threats android-based smart phone will bring on money transfer services in Kenya

Advertisements

“DEXTER MALWARE” A new threat in Kenya banking sector

Even though the malware was discovered in December 2012 (Visa Security Alert, 2012), Dexter is causing havoc for bank and point of sale terminals in South Africa, “Secure Data Africa chief technology officer Wayne Olsen says consumers should still be concerned as it is a “well-known fact” that over the festive season there is a marked increase in malware and virus attacks by criminals seeking financial gain.

South Africa’s banks suffered tens of millions of rand worth in losses due to a major breach of customer card data by criminal syndicates that infected electronic point-of-sale (POS) terminals using a variant of the Trojan horse malicious software called Dexter (techcentral.co.za, 5 November 2013). Continue reading “DEXTER MALWARE” A new threat in Kenya banking sector

The Microsoft Security Intelligence Report (SIR)

I have skimmed through the report and i cant wait to digest it further. It has critical intelligence details about the security architecture aof Microsoft OS, I truly recommend this for ICT security experts.

The report discusses the vulnerabilities discovered in windows in area of adobe applications, java applications, Document parser exploits,HTML and JavaScript exploits in detailed graphs and statistics. The report also touches on malware, Email threats.

For intelligence diggers, the most interesting bit is how the report comprehensively maps about the most affected area, this will help the security admins to determine the level of security required to secure the systems.

Get a copy here! Ket me know your opinion…

About this report
The Microsoft Security Intelligence Report (SIR) focuses on software vulnerabilities, software vulnerability exploits, and malicious and potentially unwanted software. Past reports and related resources are available for download at http://www.microsoft.com/sir. We hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

Continue reading The Microsoft Security Intelligence Report (SIR)

TDL-4 variant spreads click-fraud campaign

A click-fraud campaign – in which attackers redirect users from legitimate ads on major sites, like Facebook and YouTube, to URLs where they can receive money for clicks – has been launched using a new TDL-4 malware variant.

TDL-4 rose to infamy in 2011, when researchers discovered that the malware supported a botnet of more than four million infected computers, which were primarily in the United States. Continue reading TDL-4 variant spreads click-fraud campaign

Kaspersky reports 3 more Flame-related malware variants

Kaspersky Lab has published an update in its investigation of the Flame cyber-espionage campaign, which the security experts discovered in May.

The research, which Kaspersky conducted in partnership with IMPACT, CERT-Bund/BSI and Symantec, identified traces of three previously undiscovered malicious programs.

Specifically, Symantec has highlighted forensic analysis of two of the command-and-control (C&C) servers behind the W32.Flamer attacks that targeted the Middle East earlier this year. Continue reading Kaspersky reports 3 more Flame-related malware variants

How ‘Flame’ virus works!

Earlier , we published about the new virus making headlines ‘The flame’. We already discussed about its ability to leak documents and large amounts of data from the affected system. However, as this piece of malware has been designed to spy on computers located in industrial environments, the attackers expected to that the malware would encounter some restrictions and security policies enforced at the protected network perimeter. Continue reading How ‘Flame’ virus works!

Flame malware makers send ‘suicide’ code

Screenshot of FlameThe creators of the Flame malware have sent a “suicide” command that removes it from some infected computers.

Security firm Symantec caught the command using booby-trapped computers set up to watch Flame’s actions.

Flame came to light after the UN’s telecoms body asked for help with identifying a virus found stealing data from many PCs in the Middle East. Continue reading Flame malware makers send ‘suicide’ code