Remove 2011 Remove Internet Remove Spyware Remove Technology
article thumbnail

Mobile malware evolution 2020

SecureList

In 2020, Kaspersky mobile products and technologies detected: 5,683,694 malicious installation packages, 156,710 new mobile banking Trojans, 20,708 new mobile ransomware Trojans. The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers.

Mobile 134
article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

Fitbit and similar technology can be used to track employees’ exercise routines, with some companies even offering rewards like extra days off for good behavior. This is a common selling point of the technology, but is there evidence backing up these claims? Does Employee Monitoring Increase Productivity?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Security Affairs

It should be noted that some of the tech companies provide a wide range of Internet-related services and some of them, like cloud storages and email services, form separate categories. They, in turn, let spyware and backdoors move ahead and become the second most popular malware with a 35-percent share.

article thumbnail

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

What follows are a series of clues that point to the likely real-life identity of a Russian man who appears responsible for enabling a ridiculous amount of cybercriminal activity on the Internet today. It is allowed to host: ordinary sites, doorway pages, satellites, codecs, adware, tds, warez, pharma, spyware, exploits, zeus, IRC, etc.

article thumbnail

APT trends report Q1 2021

SecureList

During routine monitoring of detections for FinFisher spyware tools, we discovered traces that point to recent FinFly Web deployments. We have discovered new evidence showing that Domestic Kitten has been using PE executables to target victims using Windows since at least 2013, with some evidence that it goes back to 2011.

Malware 139
article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

1903 — Wireless Telegraphy — During John Ambrose Fleming’s first public demonstration of Marconi’s “secure” wireless telegraphy technology, Nevil Maskelyne disrupts it by sending insulting Morse code messages discrediting the invention. 1988 — The Morris Worm — Robert Morris creates what would be known as the first worm on the Internet.

article thumbnail

NullMixer: oodles of Trojans in a single dropper

SecureList

NullMixer is a dropper that includes more than just specific malware families; it drops a wide variety of malicious binaries to infect the machine with, such as backdoors, bankers, downloaders, spyware and many others. NullMixer execution chain. The real infection occurs when the user extracts the ‘win-setup-i864.exe’ SmokeLoader.

Malware 109