Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Mobile Vulnerabilities

  • Zero-Day Alerts

  • Recent Posts

  • Calendar

    December 2012
    S M T W T F S
    « Nov   Jan »
  • Email Subscription

  • About Us

    Archive for December 21st, 2012

    Experts are predicting this holiday season will be the biggest holiday season for mobile devices yet. Whether it’s Android or iOS, phones or tablets, odds are good that you or someone in your family will be unwrapping and using a new device this holiday season.

    But once you unwrap your new device and turn it on before you do anything else, you should take some time to secure your device properly. Installing security software, configuring settings on the device to protect your security and privacy: these are all things you should do next after turning it on.

    In our new infographic “Unwrapping Mobile Security,” our experts step you through some things you can and should do to make sure your devices and your kids’ devices are set up to help better protect them.

    Take a few minutes to check it out and have a safe and fun holiday season.

    Posted in Mobile | Comments Off on [Infographic] Unwrapping Mobile Security During the Holidays

    Since data is the new digital currency, it is not uncommon to read about data stealers designed to collect users’ personally identifiable information (PPI) like credit cards, etc. So the entry of ‘Dexter’ in the threat picture comes as no surprise, especially as the holiday season draws near.

    There are reports of a malware that targets point-of-sale (POS) systems used to store payment card data. Point-of-sale (like checkout counters) is typically where payment for goods and services occur. Given the wealth of data found on these payment hubs, it’s expected that these are the next targets of cybercriminal activities.

    Dubbed ‘Dexter’ (Trend Micro detection BKDR_DEXTR.A), the malware was reportedly found in (POS) systems of popular establishments, hotels, and other businesses. Currently, the arrival infector remains undetermined. However, it is unlikely that the malware is downloaded from malicious sites, as the POS systems are typically not used for web browsing.

    Based on our analysis of the malware, BKDR_DEXTR.A downloads files, sends information, and checks memory for information among others. But the centerpiece of the malware is its ability to collect and send certain information to a remote server. Some of the possible data that can be stolen from POS systems include such as username, hostname, key to decrypt the sent information, OS information, and list of running processes. These data are then presumably duplicated by remote malicious users.

    Read the rest of this entry »

    Posted in Malware | 1 TrackBack »


    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice