With a simple trick, the MacDownloader accesses passwords. The malware is intended to have employees of US armaments companies and human rights activists.
Disguised
as an Adobe Flash installer and BitDefender adware removal tool, the
MacDownloader malware attempts to forward passwords to its creators. This is what the two security researchers Claudio Guarnieri and Collin Anderson write in a report.
With a simple trick, the MacDownloader accesses passwords. The malware is intended to have employees of US armaments companies and human rights activists.
Disguised
as an Adobe Flash installer and BitDefender adware removal tool, the
MacDownloader malware attempts to forward passwords to its creators. This is what the two security researchers Claudio Guarnieri and Collin Anderson write in a report.
The two researchers describe the malware as the "first attempt of an amateur developer". Because the MacDownloader was sloppily programmed and the system dialogs full of writing errors. The malicious software is nevertheless dangerous: according to
computerworld.com the virus database VirusTotal did not recognize the
MacDownloader.
Armaments companies and human rights activists
Guarnieri and Anderson explain that the malware on a fake website of the American aviation company United Technologies emerged. The site was used in a spear-phishing attack via email to spread Windows malware.Meanwhile, the pest also attacks Mac computers.
The main goal was to be the first staff of US armaments companies like Lockheed Martin or Boeing, who were on the fake websiteFree courses and programs were lured into the trap. Later, the malware, according to security researchers, had also targeted human rights activists. For
security and stability reasons, these would increasingly rely on Apple
products, especially in Iran, and may therefore be better protected
against malware.
Friday, 10 February 2017
Wednesday, 8 February 2017
BrandedLogoDesigns Reviews: Google returns original URLs in AMP
Google changes the URL ad to Accelerated Mobile Pages (AMP) after criticism from publishers. These had complained that Google taps their traffic.
With Google's Accelerated Mobile Pages (AMP) project, Internet browsing on mobile devices is to be accelerated by providing optimized versions of publisher websites that do not include third-party scripts or other extensions. So far, so good - but when forwarding AMP content, so far the AMP URL was visible in the address field, which could lead to confusion when sharing the article.
This is where Google is now following the critics of publishers, adding a new header under the URL line, which tells users which website the article comes from. The feature allows users to share the displayed permalink over a long fingerprint on the new header.
The feature is already activated in the iOS Google app and is to be introduced in the coming weeks also for Android, according to Google in the developer blog.
In January 2017, Google had already screwed to AMP to make images and data load even faster.
With Google's Accelerated Mobile Pages (AMP) project, Internet browsing on mobile devices is to be accelerated by providing optimized versions of publisher websites that do not include third-party scripts or other extensions. So far, so good - but when forwarding AMP content, so far the AMP URL was visible in the address field, which could lead to confusion when sharing the article.
This is where Google is now following the critics of publishers, adding a new header under the URL line, which tells users which website the article comes from. The feature allows users to share the displayed permalink over a long fingerprint on the new header.
The feature is already activated in the iOS Google app and is to be introduced in the coming weeks also for Android, according to Google in the developer blog.
In January 2017, Google had already screwed to AMP to make images and data load even faster.
Subscribe to:
Comments (Atom)