andoid

A new mobile-based trojan has been discovered that’s capable of compromising Android’s accessibility features in order to steal user data from banking applications and read user’s SMS messages, allowing the malware to bypass two-factor authentication. Named Eventbot, the trojan was discovered by a group of cyber security experts from Cybereason Nocturnus, who found it targeting financial banking applicationsRead More →

crypto

Monero stands on its Peer To Peer (P2P) communication network. The network’s blockchain-aware computers—called nodes—share the information that powers Monero, such as node addresses, historical blockchain data, blocks as they are mined, and new transactions to be added to blocks. The nodes are identified using Internet Protocol (IP) addresses, though,Read More →

Reverse-engineering

Google Cast is a proprietary protocol by Google which enables controlling playback of Internet-streamed audiovisual content on the Chromecast, Android TV and other compatible devices. From the consumer perspective, Google Cast connects two devices: a sender (i.e a smartphone) and a receiver (such as a Chromecast). Using the Google CastRead More →

monero

There’s a good chance everyone who reads this story will have had some degree of interaction with a botnet we call MyKings (others call DarkCloud or Smominru), whether you know it or not. For the past couple of years, this botnet has been a persistent source of nuisance-grade opportunistic attacksRead More →