Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    April 2014
    S M T W T F S
    « Mar    
     12345
    6789101112
    13141516171819
    20212223242526
    27282930  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Mobile’ Category




    Note: We have clarified the use of the word "bricking" in this blog post, and added a solution for developers and other power users. We recently read about an Android system crash vulnerability affecting Google's Bouncer™ infrastructure, one that, alarmingly, also affects mobile devices with Android OS versions 4.0 and above. We believe that this vulnerability may be used by cybercriminals to do some substantial damage on Android smartphones and tablets. The device is stuck in an endless reboot loop, or a ...




    A key part of Anrdoid's access control policies are permissions. To access certain resources on an Android device, applications need to request and be granted specific permissions. However, beyond those permissions specified by the operations system, an app can define its own customized permissions. Generally, this is done to protect an app's own functions or data. Custom permissions like these are usually defined at either the "signature" or "signatureOrSystem" protection levels. These are defined in the Android Open Source Project (AOSP) ...

    Posted in Mobile, Vulnerabilities |



    There is no doubt that mobile banking is going to become very significant in 2014, if it isn't already. In the United States, a quarter of all people selecting a bank say mobile banking is a "must-have". In parts of the developing world, mobile banking is even the dominant form of banking. There is no doubt anymore that mobile banking is a big part of the banking landscape - which means, of course, that it is bound to become a big ...

    Posted in CTO Insights, Mobile |


    Feb24
    11:45 am (UTC-7)   |    by

    In these times, embracing consumerization is not only inevitable for any company; it is now, at some level, necessary. It's become a powerful business tool, providing efficiency to the company, as well as convenience to the employees. The usage of mobile devices in corporate environments is a primary example of how enterprises apply consumerization, a practice that enterprises apply more and more each day. With continued adoption comes challenges. The risks around mobile threats are typically focused on malicious apps, but ...

    Posted in Data, Mobile |



    Earlier we talked about some Flappy Bird-related threats. In the course of uncovering their background, we found several third-party app stores that distributed or created similarly dangerous mobile apps. These third-party app stores target mobile users in Vietnam and inject advertising or even malicious code into popular apps. These apps put the user's privacy at risk, and may even cause financial loss - the recent Trojanized Flappy Bird app used premium service abuse to profit, and also connected to a command-and-control server in order ...

    Posted in Malware, Mobile |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice