• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Mobile Security

The Results are In: Mobile Pwn2Own 2016

  • Posted on:October 26, 2016
  • Posted in:Mobile Security, Security, Zero Day Initiative
  • Posted by:
    Dustin Childs (Zero Day Initiative Communications)
0

The 2016 edition of Mobile Pwn2Own has wrapped, and the contestants demonstrated some unique attacks against the iPhone 6S and Nexus 6P. By the end of the day, researchers showed how phones – even while running the latest software and patches – could have a rogue application installed and pictures or data stolen. With multiple…

Read More

Use of Pagers in ICS Pose Challenges

  • Posted on:October 25, 2016
  • Posted in:Critical Infrastructure, Mobile Security, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In a follow-on report to our recent one involving the use of pagers in healthcare, Trend Micro Forward-Looking Research (FTR) team also analyzed the use of pager communications in industrial environments.Ā  This report will look at how and why these environments still utilize pagers and the potential security concerns due to this unencrypted channel. The…

Read More

Data Protection Risks of Using Pagers in Healthcare

  • Posted on:September 26, 2016
  • Posted in:Healthcare, Mobile Security, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0
Why are hackers going after health care facilities?

Doctors and pagers are two things that have been closely linked since the introduction of pagers in the 1960s. For decades, the doctor checking his (and later his or her) pager has been a staple in movies and television. And while you might have expected pagers to have gone way like rotary telephone (or any…

Read More

Mobile Ransomware: The Fast Growing Yet Unknown Threat

  • Posted on:September 22, 2016
  • Posted in:Consumer, Mobile Security, Ransomware, Security
  • Posted by:
    Shannon McCarty-Caplan
0
Is your phone infected?

Trend Micro has seen ransomware on PCs dominate the threat landscape over the last 18 months with their unprecedented volume and destructiveness. But now cybercriminals are attacking another vector: the Android mobile platform. Our research shows unique Android ransomware threats grew 15 times higher in June 2016 than in April 2015[i]. The mobile ransomware threat…

Read More

Presenting Mobile Pwn2Own 2016

  • Posted on:September 6, 2016
  • Posted in:Mobile Security, Network, Security, Zero Day Initiative
  • Posted by:
    Brian Gorenc
0

After taking a year off to do some paperwork, the Zero Day Initiative (ZDI) invites you to join us for the fifth annual Mobile Pwn2Own competition, to be held this year on October 26 and 27 at the PacSec Security Conference in Tokyo, Japan. We’re looking forward to rewarding the world’s top security researchers for…

Read More

Continued Rise in Mobile Threats for 2016

  • Posted on:November 16, 2015
  • Posted in:Android, Malware, Mobile Security, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In the Trend Micro 2016 Security Predictions report, ā€œThe Fine Line,ā€ our CTO, Raimund Genes predicted the following: China will drive mobile malware growth to 20M by the end of 2016; globally, mobile payment methods will be attacked. Let’s discuss this and put some perspective around the information to help you understand what is happening…

Read More

Protect Yourself Against Fake Banking Apps with Trend Micro Mobile Security for Android

  • Posted on:October 29, 2015
  • Posted in:Android, Consumer, Mobile Security, Security
  • Posted by:
    Michael Miley
0

When you bank online using your Android smartphone, you’d think the bank’s own app would be the best way to connect securely to your account. And it is—if it’s really the bank’s own app. But what if it isn’t? What if it’s a fake? And how would you know? In 2013 and 14, more than…

Read More

Malicious Code Slips into Apple’s Walled Garden: Millions of iOS Devices Affected

  • Posted on:September 22, 2015
  • Posted in:Consumer, Mobile Security, Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0

As the mobile malware epidemic has raged on the Android platform, people on iOS have been relatively safe. There are many reasons why this is the case, but one of the chief reasons is that Apple has claimed that they keep their ā€œwalled gardenā€ safe meaning that they keep malicious code and malware from entering…

Read More

Banking on Trend Micro Mobile Security

  • Posted on:September 15, 2015
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:
    Susan Orbuch
0

Financially motivated cybercriminals are expert analysts of emerging tech trends. They’re often the first to spot and adapt to changing patterns of device usage, web browsing, and other key identifiers of our ever-evolving relationship with technology. Once it’s guaranteed that there’ll be a captive user base to make money from, the bad guys turn their…

Read More

As iPhone 6S Launches, Time to Remember Some Mobile Security Basics

  • Posted on:September 14, 2015
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:
    Susan Orbuch
0

If you’ve been hiding on Mars for the past week, you might have missed that Apple has just launched its latest iPhone. Perhaps lacking some of the gee-whizz-bang features of previous major releases, the iPhone 6S and 6S Plus nevertheless contain enough to keep die-hard fans happy. Smartphone design has come a long way in…

Read More
Page 2 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.