Blog

Mobile devices

Security news updates from the last week

 July 27, 2012

Estimated reading time: 2 minutes

Android malware learns a new trick Mobile security software and a cautious nature can help you avoid risky apps over the Android Market (Google Play). But researchers have now discovered a way to convert good apps into malicious ones via an update, after they have been installed on a device....

Black Hat conference demonstrates Android and Meego NFC vulnerability

 July 27, 2012

Estimated reading time: 2 minutes

Yesterday I discussed the potential risks of NFC technology and how an attacker could ‘eavesdrop’ on NFC signals. If an attacker steals data by intercepting signals it could be crushing, but what if he could actively send signals and command the NFC enabled phone to do as he pleases? This...

Future Watch V: NFC and Shopping apps security risks

 July 25, 2012

Estimated reading time: 2 minutes

Imagine a scenario where a customer walks into a supermarket to buy groceries. She receives a greeting and a list of offers and discounts for the day on her phone. The store then prepares a customizable shopping list based on past purchases. The store then provides an in-depth mapped shopping...

Android malware creates clones of popular apps and tricks victims

 July 23, 2012

Estimated reading time: 3 minutes

Our malware analysis team has discovered a new social engineering trick used by criminals to target Android users. The attack vector guides the victim to a fake application market (or an untrustworthy third-party source). Once there, the victim downloads clones of popular apps that are cleverly disguised. Once such an...

The savoir faire of safe mobile banking

 July 17, 2012

Estimated reading time: 2 minutes

The convenience and fluidity of access that mobile devices promise makes them one of the most sought after platforms for banking and mobile commerce. A recent study by IDC shows an estimated growth of 49.2% in the worldwide Smartphone market. This implies that these devices are being used for just...

Malicious QR codes threaten mobile security

 July 11, 2012

Estimated reading time: 2 minutes

How many times have you spotted a QR code and scanned it through your smartphone camera? While these may be an effective tool for marketers to re-direct people to a particular website, how safe are these QR codes? What are QR codes? A Quick Response (QR) code is a square-shaped...

Threatening apps doing the rounds on Google Play

 June 28, 2012

Estimated reading time: 2 minutes

Here are a few potentially risky applications for Android that you should avoid. The first one is a variant of the notorious mobile spyware, Zeus. Users should actively avoid this app, whereas the second one has some serious privacy related implications. Zeus malware poses as security app A new version...

Thinking of rooting your precious Droid? Here’s why it may not be such a good idea

 May 19, 2012

Estimated reading time: 3 minutes

The massive popularity of Android smartphones has brought several features and options of the OS to the public domain. One of these options remains the ability to ‘root’ the device. Rooting an Android phone implies gaining (superuser) access to the kernel code of the software and using this access to...

Beware: Fake Antivirus Scanner Targeting Android Users on Twitter

 May 18, 2012

Estimated reading time: 3 minutes

Social media networks are very good hunting grounds for scammers and this is another such instance of a new scam (targeting Android) spreading on Twitter. This scam consists of enticing tweets that tempts users to click them. The links in these messages carry a ‘.TK’ extension and direct the users...

Infographic: The myth about smartphone invulnerability

 May 16, 2012

Estimated reading time: 1 minute

Contrary to popular belief, the user-programmable miniature yet powerful mobile devices used for carrying data, sending e-mails, social networking, banking, gaming, downloading music and video aided with the rampant use of third party software, are not invincible. There are increasing problems from applications that upload malware or exploit vulnerabilities in...