Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Mobile’ Category




    A key part of Anrdoid's access control policies are permissions. To access certain resources on an Android device, applications need to request and be granted specific permissions. However, beyond those permissions specified by the operations system, an app can define its own customized permissions. Generally, this is done to protect an app's own functions or data. Custom permissions like these are usually defined at either the "signature" or "signatureOrSystem" protection levels. These are defined in the Android Open Source Project (AOSP) ...

    Posted in Mobile, Vulnerabilities | Comments Off



    There is no doubt that mobile banking is going to become very significant in 2014, if it isn't already. In the United States, a quarter of all people selecting a bank say mobile banking is a "must-have". In parts of the developing world, mobile banking is even the dominant form of banking. There is no doubt anymore that mobile banking is a big part of the banking landscape - which means, of course, that it is bound to become a big ...

    Posted in CTO Insights, Mobile | Comments Off


    Feb24
    11:45 am (UTC-7)   |    by

    In these times, embracing consumerization is not only inevitable for any company; it is now, at some level, necessary. It's become a powerful business tool, providing efficiency to the company, as well as convenience to the employees. The usage of mobile devices in corporate environments is a primary example of how enterprises apply consumerization, a practice that enterprises apply more and more each day. With continued adoption comes challenges. The risks around mobile threats are typically focused on malicious apps, but ...

    Posted in Data, Mobile | Comments Off



    Earlier we talked about some Flappy Bird-related threats. In the course of uncovering their background, we found several third-party app stores that distributed or created similarly dangerous mobile apps. These third-party app stores target mobile users in Vietnam and inject advertising or even malicious code into popular apps. These apps put the user's privacy at risk, and may even cause financial loss - the recent Trojanized Flappy Bird app used premium service abuse to profit, and also connected to a command-and-control server in order ...

    Posted in Malware, Mobile | Comments Off



    2013 was another year marked by many changes - for good and bad - in the threat landscape. Some threats waned, others grew significantly, while completely new threats emerged and made life difficult for users. What remained constant, however, were the threats against the safety of digital information. In this entry, we present some of these threats that were seen last year. These are described in more detail in our roundup titled Cashing In On Digital Information Cybercrime: Banking Malware, CryptoLocker Grow; ...

    Posted in Bad Sites, Data, Exploits, Malware, Mobile, Social, Spam, Targeted Attacks | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice