Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    October 2014
    S M T W T F S
    « Sep    
     1234
    567891011
    12131415161718
    19202122232425
    262728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Mobile’ Category




    In the threat landscape, it can sometimes be difficult to classify if something should be considered a threat.  Certainly, there are the blatantly obvious threats (read: malware) but there are some that merit discussion. One such example are “cloned” apps or “spoofed” apps. As the term suggests, “cloned”  or “spoofed” apps are apps that resemble other apps in functionality and even name. Tech site Ars Technica wrote an article highlighting just how fast spoofed apps can make their way into app stores. Featured in ...

    Posted in Mobile |



    There are many mobile app developers today who want to develop the next hot mobile app. After all, if you pay your cards right, you could end up being bought by a much larger company like Facebook, Google, or Microsoft for billions of dollars. It's hard enough to build a mobile app that will have the features and ease of use that will make it popular with millions of users. There are other things that apps can compete on, however: this ...

    Posted in Bad Sites, CTO Insights, Mobile |



    Independent security researcher Rafay Baloch recently disclosed a serious vulnerability in Android's built-in browser. The vulnerability allows the same origin policy of the browser to be violated. This could allow a dangerous universal cross-site scripting (UXSS) attack to take place. An attacker could potentially use an IFRAME to load a legitimate site for which the victim has an account. Due to the disclosed bug he now has the ability to run Javascript in the context of that site, something he should ...

    Posted in Mobile, Vulnerabilities |



    One of the biggest announced features of the newly released iPhone 6 and 6 Plus is Apple Pay. This is Apple's attempt to popularize mobile payments, which have been around in some form for years. For example, Google Wallet has been around since 2011. NFC (Near Field Communication) contactless payments have been around in some form for more than a decade: Figure 1. MasterCard contactless payment terminal However, Google's efforts have not met with much acceptance from consumers. The end users do not believe that these ...

    Posted in Mobile |



    The introduction of personal devices (or Bring Your Own Device) into the workplace brings about issues about control and data protection. BYOD has not only blurred the lines between corporate and personal data but it has also ushered in risks, such as lost or stolen devices or data breaches via employee-owned devices. Enter mobile device management (MDM). Mobile device management allows IT administrators to secure and monitor corporate data and apps found in personal devices. And yet, MDM is not without ...

    Posted in Mobile |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice