The 2016 edition of Mobile Pwn2Own has wrapped, and the contestants demonstrated some unique attacks against the iPhone 6S and Nexus 6P. By the end of the day, researchers showed how phones ā even while running the latest software and patches ā could have a rogue application installed and pictures or data stolen. With multiple…
Read More
In a follow-on report to our recent one involving the use of pagers in healthcare, Trend Micro Forward-Looking Research (FTR) team also analyzed the use of pager communications in industrial environments.Ā This report will look at how and why these environments still utilize pagers and the potential security concerns due to this unencrypted channel. The…
Read More
Doctors and pagers are two things that have been closely linked since the introduction of pagers in the 1960s. For decades, the doctor checking his (and later his or her) pager has been a staple in movies and television. And while you might have expected pagers to have gone way like rotary telephone (or any…
Read More
Trend Micro has seen ransomware on PCs dominate the threat landscape over the last 18 months with their unprecedented volume and destructiveness. But now cybercriminals are attacking another vector: the Android mobile platform. Our research shows unique Android ransomware threats grew 15 times higher in June 2016 than in April 2015[i]. The mobile ransomware threat…
Read More
After taking a year off to do some paperwork, the Zero Day Initiative (ZDI) invites you to join us for the fifth annual Mobile Pwn2Own competition, to be held this year on October 26 and 27 at the PacSec Security Conference in Tokyo, Japan. Weāre looking forward to rewarding the worldās top security researchers for…
Read More
In the Trend Micro 2016 Security Predictions report, āThe Fine Line,ā our CTO, Raimund Genes predicted the following: China will drive mobile malware growth to 20M by the end of 2016; globally, mobile payment methods will be attacked. Letās discuss this and put some perspective around the information to help you understand what is happening…
Read More
When you bank online using your Android smartphone, youād think the bankās own app would be the best way to connect securely to your account. And it isāif itās really the bankās own app. But what if it isnāt? What if itās a fake? And how would you know? In 2013 and 14, more than…
Read More
As the mobile malware epidemic has raged on the Android platform, people on iOS have been relatively safe. There are many reasons why this is the case, but one of the chief reasons is that Apple has claimed that they keep their āwalled gardenā safe meaning that they keep malicious code and malware from entering…
Read More
Financially motivated cybercriminals are expert analysts of emerging tech trends. Theyāre often the first to spot and adapt to changing patterns of device usage, web browsing, and other key identifiers of our ever-evolving relationship with technology. Once itās guaranteed that thereāll be a captive user base to make money from, the bad guys turn their…
Read More
If youāve been hiding on Mars for the past week, you might have missed that Apple has just launched its latest iPhone. Perhaps lacking some of the gee-whizz-bang features of previous major releases, the iPhone 6S and 6S Plus nevertheless contain enough to keep die-hard fans happy. Smartphone design has come a long way in…
Read More