Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Threats & Risks

The latest updates on constantly evolving viruses, malware, ransomware, spyware and online threats.

Mac OS X Threat Masquerading as a PDF Document

A new Mac OS X Threat has been discovered masquerading as an innocent PDF document with a controversial topic. It is implementing one of the techniques used by windows malware to hide its malicious activity. When the Mac malware is executed, it attempts to drop and execute a non-malicious PDF file in the /tmp folder […]

Stay Safe With Your Twitter Account.

Twitter is a nice social network that allows you to send very quick messages to your colleagues and friends alike indicating what you are doing, where you are located and so on. The main feature of this social network is the so-called “Following Tweets,” which is a way to inform you that somebody is following […]

New SDK, Old tricks – SillyDl repackaged!

Routine processing of our large volume collections has unearthed a sample that seems noteworthy to be mentioned. Digging deeper revealed it was indeed a simple variant descending from a very old and familiar family of Java based Trojans [Java/SillyDl] Intricacies of its execution This sample’s payload is same as what the age old downloader agents […]

SpyEye Behind Cyber-fraud

SpyEye is now very well known within all security communities and security blogs of the world. The latest version of the SpyEye tool includes very powerful capabilities, specifically designed to steal sensitive data from Windows users conducting monetary transactions over the Internet. The Trojan tool is sold on the underground market and in cybercrime forums […]

Rootkit Infection: MBR wanted!

We recently witnessed another rootkit infection which raised the attention of the press and Microsoft users. It is again a high profile malware whose target is the hard drive’s master boot record (MBR) corrupting the bootstrap of the Windows Operating System. Once run the malware follows the steps below: Open file: \.PhysicalDrive0 Create File: hello_tt.sys […]

QR Code: a channel to spread malware?

Not everyone knows what a QR Code is or how they can be used. A QR Code is a specific matrix barcode (or two-dimensional code), readable by dedicated QR barcode reader.  There are many QR Code Reader apps available today for camera phones. The code consists of black modules arranged in a square pattern on […]