Barcode Reader Apps on Google Play Found Using New Ad Fraud Technique
By Jessie Huang (Mobile Threats Analyst) We recently saw two barcode reader apps in Google Play, together downloaded more than a million times, that started showing unusual behavior (Trend Micro detects these as AndroidOS_HiddenAd.HRXJA). This includes behavior that can be seen even when the user is not actively using the phones; the video below shows […] more…Deception at scale: How attackers abuse governmental infrastructure
Continuing our initiative of sharing VirusTotal’s visibility to help researchers, security practitioners and the general public better understand the nature of malicious attacks, we are proud to announce our “Deception at scale: How attackers abuse governmental infrastructure” report. Here are some of the main ideas presented there: Governmental domains are among the top categories used […] more…IT threat evolution Q3 2021
IT threat evolution Q3 2021 IT threat evolution in Q3 2021. PC statistics IT threat evolution in Q3 2021. Mobile statistics Targeted attacks WildPressure targets macOS Last March, we reported a WildPressure campaign targeting industrial-related entities in the Middle East. While tracking this threat actor in spring 2021, we discovered a newer version. It contains […] more…Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East
By: Ecular Xu and Grey Guo (Mobile Threats Analysts) We uncovered a cyberespionage campaign targeting Middle Eastern countries. We named this campaign “Bouncing Golf” based on the malware’s code in the package named “golf.” The malware involved, which Trend Micro detects as AndroidOS_GolfSpy.HRX, is notable for its wide range of cyberespionage capabilities. Malicious codes are […] more…What Parents Need to Know About Live-Stream Gaming Sites Like Twitch
Clash of Clans, Runescape, Fortnite, Counter Strike, Battlefield V, and Dota 2. While these titles may not mean much to those outside of the video gaming world, they are just a few of the wildly popular games thousands of players are live streaming to viewers worldwide this very minute. However, with all the endless hours […] more…Fortnite: Why Kids Love It and What Parents Need to Know
Fortnite: Battle Royale is the hottest video game for kids right now. More than 125 million people have downloaded the game and it’s estimated that 3.4 million play it monthly. But while the last-man-standing battle game is a blast to play, it also has parents asking a lot of questions as their kids spend […] more…Unraveling the Lamberts Toolkit
Yesterday, our colleagues from Symantec published their analysis of Longhorn, an advanced threat actor that can be easily compared with Regin, ProjectSauron, Equation or Duqu2 in terms of its complexity. Longhorn, which we internally refer to as “The Lamberts”, first came to the attention of the ITSec community in 2014, when our colleagues from FireEye […] more…Teaching Kids to Secure Their Data & Hearts Online
Valentine’s week is filled with flowers, chocolate . . . and that wonderfully dangerous little thing called oxytocin. Referred to as the “trust hormone,” oxytocin is one of several chemicals our brains release when we feel attracted to someone. Fun right? Yes, but it can also function pretty much like an opiate and cause feelings […] more…Windows 10: What’s New in the Security System
Operating system security is one of Microsoft’s priorities. The developers of the new generation of Windows have vigorously responded to the most significant and relevant threats that target the Windows platform by developing numerous security technologies that were previously available only in third-party solutions. The system has become better protected, making the life of cybercriminals […] more…Lurk Banker Trojan: Exclusively for Russia
One piece of advice that often appears in closed message boards used by Russian cybercriminals is “Don’t work with RU”. This is a kind of instruction given by more experienced Russian criminals to the younger generation. It can be interpreted as: “don’t steal money from people in Russia, don’t infect their machines, don’t use compatriots […] more…New Released Smart phones in 2015
The smart phone brands in India launched new smart phones this month October, with high upgrades and latest made configurations. The smart phone brands are listed below! Motorola Moto X Style (29999/-) Moto X Style launched recently on October 8th 2015. The android phones has endless entertainment with 5.7 inches 1440p HD resolution display and […] more…Mobile Security Myths
Mobile computing is the new frontier of personal technology. Whether you are on a phone or tablet, if you have a carrier connection, you are mobile. Today, most of us can’t live without our mobile devices. We live in an always on, always connected world. While this is convenient in many ways, it also brings […] more…LilyJade Version 2.0 – Malicious Browser Extension
In Market, there are different web browsers available, in order to gain the popularity and more usability of these browsers among the users requires some extra features apart from just merely being used to browse web. In hence, they introduce some extra feature to their browsers one among that is the browser plug-in which the […] more…More information
- Email upgrade: Replacing Axigen mail with MailScanner
- Microsoft Edge CVE-2017-0200 Scripting Engine Remote Memory Corruption Vulnerability
- Crypto founder admits $25 million ICO backed by celebrities was a scam
- Review: Avast Free Antivirus
- Senate bill rewrite lets Feds read your e-mail without warrants
- Apple Safari 7.0.4 closes 22 holes, including 21 listed under "arbitrary code execution"
- Symantec Endpoint Protection CVE-2019-12756 Local Security Bypass Vulnerability
- Internet Explorer 10 finally released for Windows 7
- Microsoft bets on Windows XP disaster
- All Work and No Play? Not at McAfee!