Analysis by: Hiroshi Shinotsuka
Recent malware campaigns that used Tibet-related issues as bait have been well documented and it should come as no surprise that we have seen another Tibetan-t
Category: Backdoor.Trojan
Analysis: Kevin Savage
Following on from our recent blog post on malicious Web injects affecting distribution of a malicious Android application, here is a more traditional type – but o
Contributor: Fred Gutierrez
Cybercriminals have continuously evolved their methods throughout the years to avoid detection and arousing the suspicion of the users they are targeting. In the c
Symantec Security Response, along with some other security vendors, reported the discovery of the OSX.Flashback malware recently patched by Apple. Many people may be surprised to learn the infectio