• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Alice Decker (Senior Threat Researcher)

Alice Decker

Senior Threat Researcher

How Mobile Ads Abuse Permissions

  • Posted on:October 29, 2012
  • Posted in:Mobile
  • Posted by:
    Alice Decker (Senior Threat Researcher)
1

It has become an inevitable part of the Android user experience that apps will ask for a long laundry list of permissions. Many apps will ask you to grant them network access so they can download updates. Others seek permission to read your phone’s state and identity so calls won’t disrupt them from doing what…

Read More

Do You Know What Data Your Mobile App Discloses?

  • Posted on:September 2, 2012
  • Posted in:Mobile
  • Posted by:
    Alice Decker (Senior Threat Researcher)
0

Living in Europe, I noticed the general interest of the media, politicians, and users about privacy and potential data leakage. This concern is surely not limited to Europeans — people from around the globe and governments are also interested on how to protect the sensitive data stored on mobile devices. With this in mind, I…

Read More
Tags: androiddata leakageGooglemobile app repuationskype

What the New AMTSO Guidelines Mean for Users

  • Posted on:June 24, 2010
  • Posted in:Bad Sites
  • Posted by:
    Alice Decker (Senior Threat Researcher)
0

Earlier this month, the Anti-Malware Testing Standards Organization (AMTSO) published new guidelines on the delicate topic of testing anti-malware products. Since then, many experts in the anti-malware industry have been commenting on the said guidelines. Many of these comments (including some from myself), have been summed up by tech blogger Kevin Townsend here. After reading…

Read More

Insight: AMTSO’s Reviews

  • Posted on:March 8, 2010
  • Posted in:Bad Sites
  • Posted by:
    Alice Decker (Senior Threat Researcher)
1

Some time ago (February 25–26), the Anti-Malware Testing Standard Organization (AMTSO) had its first meeting this year. This time, it was hosted by McAfee and took place in Santa Clara, California. One of the hot topics during the meeting was related to the initiative to review reports published by testing and certification organizations/companies. How was…

Read More

DefCon Las Vegas 2009

  • Posted on:August 7, 2009
  • Posted in:Bad Sites
  • Posted by:
    Alice Decker (Senior Threat Researcher)
2

DefCon in Las Vegas is probably the biggest event hackers and even non hackers have been waiting for. Although there were fewer people in this year’s DefCon (around 6,000, my estimate), the presentations, contests, and parties still raked in a huge number of attendees. The DefCon attendees believe that cybercriminals will likely be doing more…

Read More
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.