Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    November 2014
    S M T W T F S
    « Oct    
     1
    2345678
    9101112131415
    16171819202122
    23242526272829
    30  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Mobile’ Category




    The competition between mobile OSes is heating up, with Apple’s iOS 8 and Google’s Android Lollipop in tight competition, as the public discovers their features and what these OSs can do for them. There are notable changes and significant improvements in these releases, particularly in their default settings. Encryption by default seems to be the primary selling points of both OSs. With rising awareness about data protection and consumers demanding better privacy and security on their devices, both major mobile OSes are in ...

    Posted in Mobile |



    In the threat landscape, it can sometimes be difficult to classify if something should be considered a threat.  Certainly, there are the blatantly obvious threats (read: malware) but there are some that merit discussion. One such example are “cloned” apps or “spoofed” apps. As the term suggests, “cloned”  or “spoofed” apps are apps that resemble other apps in functionality and even name. Tech site Ars Technica wrote an article highlighting just how fast spoofed apps can make their way into app stores. Featured in ...

    Posted in Mobile |



    There are many mobile app developers today who want to develop the next hot mobile app. After all, if you pay your cards right, you could end up being bought by a much larger company like Facebook, Google, or Microsoft for billions of dollars. It's hard enough to build a mobile app that will have the features and ease of use that will make it popular with millions of users. There are other things that apps can compete on, however: this ...

    Posted in Bad Sites, CTO Insights, Mobile |



    Independent security researcher Rafay Baloch recently disclosed a serious vulnerability in Android's built-in browser. The vulnerability allows the same origin policy of the browser to be violated. This could allow a dangerous universal cross-site scripting (UXSS) attack to take place. An attacker could potentially use an IFRAME to load a legitimate site for which the victim has an account. Due to the disclosed bug he now has the ability to run Javascript in the context of that site, something he should ...

    Posted in Mobile, Vulnerabilities |



    One of the biggest announced features of the newly released iPhone 6 and 6 Plus is Apple Pay. This is Apple's attempt to popularize mobile payments, which have been around in some form for years. For example, Google Wallet has been around since 2011. NFC (Near Field Communication) contactless payments have been around in some form for more than a decade: Figure 1. MasterCard contactless payment terminal However, Google's efforts have not met with much acceptance from consumers. The end users do not believe that these ...

    Posted in Mobile | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice