• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Bob Pan (Mobile Security Engineer)

Bob Pan

Mobile Security Engineer

Detecting Hidden Administrator Apps on Your Mobile Device

  • Posted on:June 18, 2013
  • Posted in:Malware, Mobile
  • Posted by:
    Bob Pan (Mobile Security Engineer)
0

Last week, we talked about the OBAD Android malware, which installed itself as an administrator on the device and used a vulnerability in Android to hide this fact from the user. One effect of this particular behavior was to make removal of this threat very difficult. Apps that have set themselves up as administrators require…

Read More
Tags: Android malwaremobile malwareOBAD

Fake Versions of Temple Run 2 Sprint Their Way to Users

  • Posted on:January 22, 2013
  • Posted in:Mobile
  • Posted by:
    Bob Pan (Mobile Security Engineer)
2

Just days after its release on the Apple App Store, some sites are already offering their own dubious versions of Temple Run 2 for Android. With 20 million downloads just 4 days after its release on the Apple App Store, Temple Run 2 is indeed highly-anticipated among Temple Run fans and gaming fanatics. While the…

Read More

The Issues Surrounding Android Debugging

  • Posted on:January 9, 2013
  • Posted in:Mobile
  • Posted by:
    Bob Pan (Mobile Security Engineer)
0

Recently, we found that Android’s debugging feature could be used to steal information from apps running on an Android device. We won’t go into the full details of the problem here, but here is the short version: with some effort, an app can be set up on Android to debug another running app. This debugging…

Read More
Tags: androidmobile security

Android Malware Exploits China Mobile SMS Payments

  • Posted on:August 24, 2012
  • Posted in:Mobile
  • Posted by:
    Bob Pan (Mobile Security Engineer)
0

We recently encountered ANDROIDOS_SMSZOMBIE.A, an Android Trojan targeting China Mobile subscribers that takes control of a device’s SMS functionality. It can send, forward, and drop SMS messages. What makes this more troubling for users is the fact that this malware is difficult to uninstall. A dedicated removal tool will be released to Google Play and…

Read More
Tags: androidAndroid malwareChina mobileSMS

17 Bad Mobile Apps Still Up, 700,000+ Downloads So Far

  • Posted on:May 3, 2012
  • Posted in:Mobile
  • Posted by:
    Bob Pan (Mobile Security Engineer)
5

We’ve reported previously that malicious apps were discovered in the official Android app store, which is now known as Google Play. While those reported apps were removed, more malicious apps have been seen in the official marketplace and appear to be still victimizing users. This is just one of the important reasons why we feel…

Read More
Page 1 of 212

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting
  • Mac Backdoor Linked to Lazarus Targets Korean Users
  • New Magecart Attack Delivered Through Compromised Advertising Supply Chain
  • September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days
  • Banking Trojan DRIDEX Uses Macros for Infection

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.