Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Mobile’ Category




    Evolution is a continuous process, and nothing can exemplify the process better in our industry than the threats we defend against. From simple pranks and nuisances, they've become thieves of information, violators of privacy, destroyers of reputations and even saboteurs of businesses, all for the sake of money. They've also become tools for activists and terrorists of the cyber variety, used to make strong statements against governments or organizations. But as such threats evolve, so must the security solutions that defend against them, ...

    Posted in Exploits, Malware, Mobile |



    Cross-platform threats can be dangerous, both at home and in the office. These can ‘jump’ from one platform to another, or target all of them at the same time – potentially infecting a user’s entire network, or even a company's network if left unchecked. The risk to critical data and system functionality, not to mention overall network security, can be catastrophic if not mitigated properly. With the mobile device boom, cybercriminals had begun taking the portable platform into consideration with their all-encompassing ...

    Posted in Malware, Mobile |



    One of the reasons that mobile OSes such as iOS and Android are more secure than their desktop counterparts is that they include very robust controls over app permissions. Each app requests from the user and operating system permissions that, in theory, are limited to what they need. As applied, they have not always worked. App developers tend to ask for more permissions than they need; users don't always pay attention and will approve just about anything. Still, for all the ...

    Posted in Mobile |



    The recent introduction of ransomware in the mobile threat landscape was followed by a new development: the usage of TOR to hide C&C communication. In our analysis samples we now detect as AndroidOS_Locker.HBT, we found that this malware  shows a user interface that notifies the user that their device has been locked down, and that they need to pay a ransom of 1000 rubles to unlock it. The interface also states that failure to pay would result in the destruction of all data in the ...




    In our 1Q Threat roundup report, we noted that the number of mobile malware and high-risk applications reached the two-million mark and is rapidly growing. In our monitoring of the mobile threat landscape, we have recently discovered an Android malware that is spreading fast in Taiwan, detected as ANDROIDOS_RUSMS.A. Mobile users fall victim via SMS spam attack. Users receive an SMS in order to lure them to install the malicious app. The messages read as follows: 您正在申請網上支付103年3月電費共計480元,若非本人操作,請查看電子憑證進行取消 (malicious link) 您的快遞簽收通知單, (malicious link) Translated into English, these read as: You ...

    Posted in Bad Sites, Malware, Mobile |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice