Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Mobile’ Category




    Repackaged applications, which are a category of fake applications, play a crucial role in the proliferation of mobile malware. Like fake apps, repackaged apps use social engineering tactics, displaying similar user interface (UI), icon, package names and app labels as the legitimate/official version of the apps they spoofed. This is done to trick users into downloading fake apps and consequently, generating profit. Based on the research, nearly 80% of the top 50 free apps found in Google Play have bogus versions. ...

    Posted in Malware, Mobile |



    Sporting events are getting more and more connected, and the just-concluded World Cup is no exception. Brazilian telecom provider Oi made sure that no expense was spared in 'connecting' the World Cup , and even claimed that this year's event is in fact the most connected in the history of the World Cup. Oi claims that they provided connections to all twelve host stadiums across Brazil, resulting with 32 terabytes of data being generated by the media, sponsors, volunteers and FIFA officials in just ten days.  More than ...

    Posted in Bad Sites, Malware, Mobile, Social |



    Evolution is a continuous process, and nothing can exemplify the process better in our industry than the threats we defend against. From simple pranks and nuisances, they've become thieves of information, violators of privacy, destroyers of reputations and even saboteurs of businesses, all for the sake of money. They've also become tools for activists and terrorists of the cyber variety, used to make strong statements against governments or organizations. But as such threats evolve, so must the security solutions that defend against them, ...

    Posted in Exploits, Malware, Mobile |



    Cross-platform threats can be dangerous, both at home and in the office. These can ‘jump’ from one platform to another, or target all of them at the same time – potentially infecting a user’s entire network, or even a company's network if left unchecked. The risk to critical data and system functionality, not to mention overall network security, can be catastrophic if not mitigated properly. With the mobile device boom, cybercriminals had begun taking the portable platform into consideration with their all-encompassing ...

    Posted in Malware, Mobile |



    One of the reasons that mobile OSes such as iOS and Android are more secure than their desktop counterparts is that they include very robust controls over app permissions. Each app requests from the user and operating system permissions that, in theory, are limited to what they need. As applied, they have not always worked. App developers tend to ask for more permissions than they need; users don't always pay attention and will approve just about anything. Still, for all the ...

    Posted in Mobile |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice