Tag: trojan

Feb 09

Symantec warns of Android Trojans that mutate with every download – symantec, security, malware – Services – Security – Techworld

Researchers from security vendor Symantec have identified a new premium-rate SMS Android Trojan horse that modifies its code every time it gets downloaded in order to bypass antivirus detection.

via Symantec warns of Android Trojans that mutate with every download – symantec, security, malware – Services – Security – Techworld.

Feb 05

Half of Fortune 500s, US Agencies Still Infected With DNSChanger Trojan – Slashdot

Half of Fortune 500s, US Agencies Still Infected With DNSChanger Trojan – Slashdot.

Feb 02

Drive-by email infects readers immediately – Technology & science – Security – msnbc.com

For the past few years, drive-by downloads have been the bane of computer-security professionals. These malicious Trojans lurk inside seemingly innocuous Web pages and try to infect any browser that visits them. If a user doesnt have strong anti-virus software installed on his PC, hell be immediately infected just by looking at the Web page.

via Drive-by email infects readers immediately – Technology & science – Security – msnbc.com.

Jan 31

‘Quantum Trojans’ undermine security theory • The Register

A group of English and Canadian researchers has cast doubt on the nascent push to develop device-independent quantum cryptography standards, asserting that such schemes could be undermined by malicious vendors.

via ‘Quantum Trojans’ undermine security theory • The Register.

Jan 25

Authorities prepare to close down DNSChanger servers, recommend DNS repair tool

German authorities are advising victims of DNSChanger Trojan programs to fix their computers Domain Name System settings using a free tool developed by antivirus company Avira, because the servers resolving DNS queries on their behalf will be closed down on March 8.

via Authorities prepare to close down DNSChanger servers, recommend DNS repair tool.

Jan 23

Decade-Long Virus Infection Discovered

Recently discovered viruses, consisting of Trojans and other malware, at City College of San Francisco have stolen personal banking information and other data from perhaps tens of thousands of students, faculty and administrators, says John Rizzo, president of the board of trustees.

via Decade-Long Virus Infection Discovered.

Jan 07

IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST

HOST-2012 IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST

June 3-4, Moscone Center, San Francisco, CA
Held in conjunction with DAC-2012 (http://www.hostsymposium.org)


                              Call for Papers


A wide range of applications, from secure RFID tagging to high-end trusted computing,
relies on dedicated and trusted hardware platforms. The security and trustworthiness of
such hardware designs are critical to their successful deployment and operation. Recent
advances in tampering and reverse engineering show that important challenges lie
ahead. For example, secure electronic designs may be affected by malicious circuits,
Trojans that alter system operation. Furthermore, dedicated secure hardware
implementations are susceptible to novel forms of attack that exploit side-channel
leakage and faults. Third, the globalized, horizontal semiconductor business model
raises concerns of trust and intellectual-property protection. HOST 2012 is a forum for
novel solutions to address these challenges. Innovative test mechanisms may reveal
Trojans in a design before they are able to do harm. Implementation attacks may be
thwarted using side-channel resistant design or fault-tolerant designs. New securityaware
design tools can assist a designer in implementing critical and trusted
functionality, quickly and efficiently.
The IEEE International Symposium on Hardware Oriented Security and Trust seeks
original contributions in the area of hardware-oriented security. This includes tools,
design methods, architectures, and circuits. In addition, novel applications of secure
hardware are especially welcome. HOST 2012 seeks contributions based on, but not
limited to, the following topics.
• Trojan detection and isolation
• Implementation attacks and countermeasures
• Side channel analysis and fault analysis
• Intellectual property protection and metering
• Tools and methodologies for secure hardware design
• Hardware architectures for cryptography
• Hardware security primitives: PUFs and TRNGs
• Applications of secure hardware
• Interaction of secure hardware and software
To present at the symposium, submit an Acrobat (PDF) version of your paper on the
symposium submission website. The page limit is 6 pages, double column, IEEE
format, with a minimum font size of 10 points. Submissions must be anonymous and
must not identify the submitting authors, directly or indirectly, anywhere in the
manuscript.


SCHEDULE:

Submission of Paper:         January 20, 2012
Notification of Acceptance:  March 23, 2012
Camera Ready Paper:          April 13, 2012



General Chair
K. Mai, CMU


Program Chair
R. Karri, Polytechnic Inst of New York U.


Vice-program Chair
F. Koushanfar, Rice University


Panel Chair
Y. Makris, UT Dallas


Publicity Chair
G. Qu, U. Maryland


Registration Chair
J. Plusquellic, U. of New Mexico


Publication Chair
T. Huffmire, Naval Postgraduate School


Finance Chair
W. Robinson, Vanderbilt


Industry Liaison

M. Hsiao, Virginia Tech


Steering Committee

M. Tehranipoor (chair), U. Connecticut
J. Plusquellic, U. of New Mexico
F. Koushanfar, Rice University
M. Potkonjak, UC Los Angeles


Program Committee

D. Acharyya, Verigy
D. Arora, Intel
S. Bhunia, Case Western Reserve U.
S. Devadas, MIT
J. Dworak, Southern Methodist U.
S. Fazzari, Booz Allen Hamilton
Y. Fei, Northeastern U.
J. Guajardo, Bosch
S. Guilley, ENST Paris
I. Harris, UC Irvine
T. Huffmire, Naval Postgraduate School
R. Kastner, UC San Diego
Y. Makris, UT Dallas
D. Naccache, ECNS Paris
L. Nazandhali, Virginia Tech
C. Paar, Ruhr U.
Y. Pino, Air Force Research Labs
N. Potlapally, Intel
G. Qu, U. of Maryland
F. Regazzoni, U. Catholique de Louvain
P. Rohatgi, CRI
M. Rivain, Crypto Experts
U. Ruhrmair, TU Munchen
A. Sadeghi, TU Darmstadt
K. Sakiyama, U. of ElectroCommunications
P. Schaumont, Virginia Tech
S. Skorobogatov, U. of Cambridge
M. Soma, U. of Washington
F. Standaert, U. Catholique de Louvain
J. Zambreno, Iowa State U.

Oct 22

German Federal Trojan Eavesdrops On Skype, IE, Firefox, MSN Messenger, …

German Federal Trojan 0zapftis/Bundestrojaner Eavesdrops On Skype, IE, Firefox, MSN Messenger & More | Darknet – The Darkside.

Aug 23

SpyEye Trojan Source Code Leaked – Slashdot

SpyEye Trojan Source Code Leaked – Slashdot.