Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Recent Posts

  • Calendar

    March 2015
    S M T W T F S
    « Feb    
    1234567
    891011121314
    15161718192021
    22232425262728
    293031  
  • Email Subscription

  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Mobile’ Category




    Our report on the threats seen in 3Q 2014 shows us that once again, software vulnerabilities are the most favored cybercriminal targets. Following the second quarter's infamous Heartbleed vulnerability came another serious vulnerability in open-source software: Shellshock. Having gone unnoticed for years, the Shellshock incident suggests that there might be more vulnerabilities in Bash or in applications previously thought safe. Below is a timeline of events that Shellshock unraveled. Figure 1. A timeline of events that illustrate the Shellshock exploitation that took place ...




    We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the user’s RFID bus transit card to recharge the credits. What is the mechanism behind this, and what is the security risk of RFID payment cards in general? Paying via RFID cards is becoming more popular nowadays as more mobile devices add NFC support. Banks, merchants or public services issue RFID cards to their customers with ...

    Posted in Mobile | 1 TrackBack »



    Based on our research into the iOS threat Masque Attacks announced last week, Trend Micro researchers have found a new way that malicious apps installed through successful Masque Attacks can pose a threat to iOS devices: by accessing unencrypted data used by legitimate apps. According to reports, the iOS threat uses enterprise provisioning to attack non-jailbroken iOS devices as WireLurker does. This means that  provisioning allows enterprises to install “homegrown” apps on iOS devices without the need to be reviewed by Apple. They can ...

    Posted in Mobile | Comments Off



    These days, when you see someone staring intently or tapping at their mobile phones, chances are that they’re busy with an app. This comes as no surprise as 80% of consumers’ time on mobile devices apps is spent in apps for gaming, news, productivity, utility, social networking, and more. Safe and Risky Apps We are currently seeing almost 11 million samples in existence as of October 2014. Of these samples, 64% are considered safe, while 23% are considered high risk or adware. The app permissions ...

    Posted in Mobile | Comments Off



    Earlier this week, we noticed that there was a spike in the volume of spammed messages that pretend to come from the messaging service Viber.  This app, which also has  a desktop version, allows users for free calls and messages. The email informs the recipient that they have one voice message for their account. Figure 1. Sample spammed message Different Routines for PC and Mobile The infection routine is pretty straightforward for computers: clicking the embedded link leads to the download of backdoor malware, detected ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice