Millions of Smartphones are Vulnerable to inject Backdoor via open Ports

A Recent Research Revealed by University of Michigan  Research team, Open Ports Create Backdoors in Millions of Smartphones .This Vulnerability Existing in Low secured Server Software which used to Serve for Remote Clients .  Many of Smart phones are using...
Google Blocked a new Spyware Family Lipizzan

200 Unique Android Apps Discovered with Backdoor Called “MilkyDoor” Downloaded by Nearly 1...

An Android Backdoor called  MilkyDoor Infected with More than 200 Apps in Play store  which contains Nealy 1 million Downloads .   According to the Trend Macro Report, MilkyDoor's  provides attackers a way to conduct reconnaissance and access an enterprise’s vulnerable...
multi-component Trojan Linux.LuaBot

Serious Threat: A multi-component Trojan from Linux.LuaBot family infecting Linux devices

Security Experts from Doctor Web have analyzed a complex multi-part Trojan that taints Linux devices having different hardware architectures. The Trojan contaminates devices having the accompanying models: Intel x86 (and Intel x86_64), MIPS, MIPSEL, Power PC, ARM, SPARC, SH4, and...
Backdoor "Stantinko" Infected 5 Lakh PC's

A Sophisticated Backdoor Called “Stantinko” Infected More Than 500,000 Computers

An Advance Backdoor called "Stantinko" Installed  More than half Million Computer Around the World which Automatically injects Malicious ads Through Browser Extension while surfing on the internet and Create a Backdoor in Victims Computer. Stantinko has Capable of highly obfuscated...

Malware Tricks to Avoid Detection by using Big Junk Data and Activates a Backdoor

A New technique used by Malware authors by Creating More unwanted junk file embedded with Malicious payload which leads to Avoid Detection by AV. Those unwanted Garbage files contains more than 100 MB junk files. According to the Researchers from...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

0

Most Popular

Recommended