Tag: in-the-wild

  • There is no evidence in-the-wild malware is using Meltdown or Spectre

    Almost a month after the Meltdown and Spectre attacks against various CPUs were discovered and revealed to the public, there have been reports of the existence of malware that appears to be using the published proof-of-concept code. The source of these reports is a Google Plus post from testing organization AV-Test , which lists the…

  • There is no evidence in-the-wild malware is using Meltdown or Spectre

    Almost a month after the Meltdown and Spectre attacks against various CPUs were discovered and revealed to the public, there have been reports of the existence of malware that appears to be using the published proof-of-concept code. The source of these reports is a Google Plus post from testing organization AV-Test , which lists the…

  • VB2016 preview: Wild Android Collusions

    Most research into and protection against malicious apps focuses on single apps. This makes it interesting for malware authors to use app ‘collusion’: the ability of two (or more) apps to perform an attack in collaboration. Such attacks have previously been demonstrated as proof-of-concepts but had not yet been found in the wild until earlier…

  • VB2016 preview: Wild Android Collusions

    Most research into and protection against malicious apps focuses on single apps. This makes it interesting for malware authors to use app ‘collusion’: the ability of two (or more) apps to perform an attack in collaboration. Such attacks have previously been demonstrated as proof-of-concepts but had not yet been found in the wild until earlier…