Barcode Reader Apps on Google Play Found Using New Ad Fraud Technique
By Jessie Huang (Mobile Threats Analyst) We recently saw two barcode reader apps in Google Play, together downloaded more than a million times, that started showing unusual behavior (Trend Micro detects these as AndroidOS_HiddenAd.HRXJA). This includes behavior that can be seen even when the user is not actively using the phones; the video below shows […] more…Microsoft launches its second generation AI inference chip, Maia 200
Signaling that the future of AI may not just be how many tokens an AI model generates, but how optimally it does so, Microsoft has announced Maia 200, which it described as a breakthrough inference accelerator and inference powerhouse. The AI silicon is designed for heterogeneous AI infrastructure in multiple environments, and was specifically developed […] more…The future of smart glasses comes into focus
Twelve years ago, Google kicked off the human cyborg revolution with its Google Glass product. The ugly, clunky, expensive Glass product was way ahead of its time. But it signaled a future when ordinary-looking glasses with a heads-up display would enable hands-free “computing” anywhere, all the time. Well, that future time is now. Meta CEO […] more…Deception at scale: How attackers abuse governmental infrastructure
Continuing our initiative of sharing VirusTotal’s visibility to help researchers, security practitioners and the general public better understand the nature of malicious attacks, we are proud to announce our “Deception at scale: How attackers abuse governmental infrastructure” report. Here are some of the main ideas presented there: Governmental domains are among the top categories used […] more…IT threat evolution Q3 2021
IT threat evolution Q3 2021 IT threat evolution in Q3 2021. PC statistics IT threat evolution in Q3 2021. Mobile statistics Targeted attacks WildPressure targets macOS Last March, we reported a WildPressure campaign targeting industrial-related entities in the Middle East. While tracking this threat actor in spring 2021, we discovered a newer version. It contains […] more…Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East
By: Ecular Xu and Grey Guo (Mobile Threats Analysts) We uncovered a cyberespionage campaign targeting Middle Eastern countries. We named this campaign “Bouncing Golf” based on the malware’s code in the package named “golf.” The malware involved, which Trend Micro detects as AndroidOS_GolfSpy.HRX, is notable for its wide range of cyberespionage capabilities. Malicious codes are […] more…What Parents Need to Know About Live-Stream Gaming Sites Like Twitch
Clash of Clans, Runescape, Fortnite, Counter Strike, Battlefield V, and Dota 2. While these titles may not mean much to those outside of the video gaming world, they are just a few of the wildly popular games thousands of players are live streaming to viewers worldwide this very minute. However, with all the endless hours […] more…Fortnite: Why Kids Love It and What Parents Need to Know
Fortnite: Battle Royale is the hottest video game for kids right now. More than 125 million people have downloaded the game and it’s estimated that 3.4 million play it monthly. But while the last-man-standing battle game is a blast to play, it also has parents asking a lot of questions as their kids spend […] more…Unraveling the Lamberts Toolkit
Yesterday, our colleagues from Symantec published their analysis of Longhorn, an advanced threat actor that can be easily compared with Regin, ProjectSauron, Equation or Duqu2 in terms of its complexity. Longhorn, which we internally refer to as “The Lamberts”, first came to the attention of the ITSec community in 2014, when our colleagues from FireEye […] more…Teaching Kids to Secure Their Data & Hearts Online
Valentine’s week is filled with flowers, chocolate . . . and that wonderfully dangerous little thing called oxytocin. Referred to as the “trust hormone,” oxytocin is one of several chemicals our brains release when we feel attracted to someone. Fun right? Yes, but it can also function pretty much like an opiate and cause feelings […] more…Windows 10: What’s New in the Security System
Operating system security is one of Microsoft’s priorities. The developers of the new generation of Windows have vigorously responded to the most significant and relevant threats that target the Windows platform by developing numerous security technologies that were previously available only in third-party solutions. The system has become better protected, making the life of cybercriminals […] more…Lurk Banker Trojan: Exclusively for Russia
One piece of advice that often appears in closed message boards used by Russian cybercriminals is “Don’t work with RU”. This is a kind of instruction given by more experienced Russian criminals to the younger generation. It can be interpreted as: “don’t steal money from people in Russia, don’t infect their machines, don’t use compatriots […] more…New Released Smart phones in 2015
The smart phone brands in India launched new smart phones this month October, with high upgrades and latest made configurations. The smart phone brands are listed below! Motorola Moto X Style (29999/-) Moto X Style launched recently on October 8th 2015. The android phones has endless entertainment with 5.7 inches 1440p HD resolution display and […] more…Mobile Security Myths
Mobile computing is the new frontier of personal technology. Whether you are on a phone or tablet, if you have a carrier connection, you are mobile. Today, most of us can’t live without our mobile devices. We live in an always on, always connected world. While this is convenient in many ways, it also brings […] more…LilyJade Version 2.0 – Malicious Browser Extension
In Market, there are different web browsers available, in order to gain the popularity and more usability of these browsers among the users requires some extra features apart from just merely being used to browse web. In hence, they introduce some extra feature to their browsers one among that is the browser plug-in which the […] more…More information
- US Healthcare Organizations Most Affected by Stegoloader Trojan
- Resolved: Inbound voice calls from the outside (excluding Penn State Telephony Service) are not routing to the Schuylkill campus.
- Top 10 stories of 2017: Security woes, autonomous machines and a very cool phone
- Glupteba – the malware that gets secret messages from the Bitcoin blockchain
- As Facebook privacy suit reaches 25,000 participant target, court is still unsure if it will allow it
- US, China appear close on cyber economic espionage deal
- Unofficial Patches Released for Exploited Windows Font Processing Flaws
- MongoDB Introduces Client-Side Field Level Encryption to Aid Compliance
- TeenSafe phone monitoring app leaks teens’ iCloud logins in plaintext
- Leaked Samsung Galaxy S9 renders show off fixed fingerprint sensor placement