New Monero Crypto Mining Botnet Leverages Android Debugging Tool
The botnet uses port scanning code from Mirai, a first for Android-related attacks, according to researchers.
Threatpost | The first stop for security news
The botnet uses port scanning code from Mirai, a first for Android-related attacks, according to researchers.
Threatpost | The first stop for security news
A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.
The rootkit, called Jellyfish, is a proof of concept designed to demonstrate that completely running malware on GPUs (graphics processing units) is a viable option. This is possible because dedicated graphics cards have their own processors and RAM.
Such threats could be more sinister than traditional malware programs, according to the Jellyfish developers. For one, there are no tools to analyze GPU malware, they said.
Also, such rootkits can snoop on the host’s primary memory, which is used by most other programs, via DMA (direct memory access). This feature allows hardware components to read the main system memory without going through the CPU, making such operations harder to detect.
To read this article in full or to leave a comment, please click here
ARC |
How Android Leverages Open Hardware Without Compromising Security
ARC Because of the media echo chamber Google started a public dialog about the state of Android security to for the sake of transparency. In doing so, Google did something that no other mobile or PC company has done before. When Google first spoke openly … |
Centre for Internet Security leverages FiberLink MaaS360
Telecompaper (subscription) Provider of cloud-based enterprise mobility management (EMM), FiberLink and the Centre for Internet Security (CIS) have announced a new agreement through which government agencies and educational institutions can purchase MaaS360 through … |