Keyword: androidos_tcent.a12
104715 Total Search   |   Showing Results : 1 - 20
   Next  
This malware is noteworthy as it is an Android malware that specifically targets China Mobile subscribers. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
ANDROIDOS_TCENT.A connects to this website to send and receive information.
This URL downloads an updated copy of the malware ANDROIDOS_TCENT.A.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays pop-up advertisements. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives as a component bundled with malware/grayware/spyware packages. Arrival Details This adware arrives as a component bundled with malware/grayware/spyware packages. NOTES: It loads
and impressive Web connectivity these offer, consumers and organizations alike are availing of mobile devices for both personal and business use. In 2010, Gartner noted a 31.8 percent increase in the
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/033201275427.jpeg In our 12 Security Predictions for 2012 , we predicted that smartphones and tablets will continue to be targets for cybercriminal
decryption key, "Fuck_sExy-aLl!Pw." It uses its root privilege to install a malicious package named LEGACY found in its assets folder. This is installed on the system folder as a specific file. This is done so
Download a file Execute an application Install an APK file Update itself Trojan:AndroidOS/Legana.A (Microsoft), Backdoor.AndroidOS.KungFu.hi (Kaspersky) Connections Between DroidDreamLight and DroidKungFu 12
unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This backdoor may be unknowingly downloaded by a user while visiting malicious
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/09720123053.png 2012 has been great year for the popular photo–sharing app Instagram . Its Android version has been a resounding success with 5M
This malware is bundled with legitimate Android apps. It is a simplified and obfuscated version of ANDROIDOS_PJAPPS.D. It is a Trojanized version of TouchMix App, a normal gaming app, but the malware
This malware roots the device using components employed by ANDROIDOS_LOTOOR.A. However, the said components are encrypted with AES and are decrypted at the time that they are used by using a certain
This malware is able to send an SMS to a Chinese premium number. As a result, affected users are charged without their knowledge. To get a one-glance comprehensive view of the behavior of this
This malware abuses a premium service number as well as sends demeaning messages to the user's contact list, causing unauthorized charges as well as potential damage to the user's reputation. To get
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
This is the new variant of DroidDreamLight that exhibits information theft routines. It also guises itself as apps like battery-monitoring tool, a task-listing tool, and an app listing the