tag
android

Free Android USSD vulnerability protection from ESET now on Google Play

If you use an Android phone you may have heard of something called the USSD vulnerability. This allows a nasty piece of malicious software to reset your Android to its factory default settings and permanently delete your data.

The Dynamic Duo for Securing your Android: Common Sense and Security Software

On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet,

SMSmishing Unabated: Best Buy targeted by fake gift card campaign

News of SMS (text) phishing scams are nothing new to readers of this blog.  ESET researcher Cameron Camp recently wrote an article explaining how they work and how to avoid them here on ESET’s Threat Blog: SMSmishing (SMS Text Phishing) – how to spot and avoid scams, And just before Valentine’s Day, my colleague Stephen

SMSmishing (SMS Text Phishing) – how to spot and avoid scams

If the smartphones of ESET bloggers are any indication, scams executed via SMS text, known as smishing or SMS phishing, are on the rise. I don’t do a lot of texting, which makes a smish easy to spot on my phone, but I just read an amazing statistic from a Pew report: Users 18 to

QR Codes and NFC Chips: Preview-and-authorize should be default

What do printed QR codes and NFC (Near Field Communication) chips have in common, besides storing instructions that computers can read? They are both hackable and their ability to store and communicate computer instructions is bound to be abused, if not already, then sometime soon. This happens to every new means of communication; QR and

Windows Phone 8: Security Heaven or Hell?

Introduction Mobile World Congress 2012 is almost upon us, and one of the most hotly-anticipated topics is the next generation of Microsoft’s smartphone operating system Windows Phone 8, which has been kept under wraps far more tightly than its PC counterpart, Windows 8. While Microsoft was an early adopter in the creation of smartphones with

Google responds to Android app Market security with stronger scanning measures

In response to recent reports that malicious apps may have made their way into the official Android Market, Google has responded by announcing a new program to more proactively scan the Market and developer accounts for seemingly malicious apps and highlights and/or remove them before users experience trouble. Traditionally, the barriers of entry for developers

Resumen de amenazas de diciembre

Una vez más, como todos los meses, compartimos con ustedes el reporte mensual de amenazas, esta vez el correspondiente a  Diciembre. Este mes se caracterizó por el descubrimiento de un ataque de phishing para Facebook: Este ataque, basado en Ingeniería Social, explota la curiosidad del usuario presentando un video en el que supuestamente este aparece.

2012 Predictions: More mobile malware and localized attacks

I want share with you what ESET Latin America’s Research team thinks will be the main trends in malware and cybercrime in 2012. In our office it is usual to produce an analysis of emerging trends in a year-end report and so, in keeping with recent postings by my ESET colleagues, I present a summary

Limpieza en el Android Market

En este último tiempo, debido al gran crecimiento y popularidad del sistema operativo Android, los creadores de malware han desarrollado muchas amenazas para esta plataforma. Muchas de estos códigos maliciosos se encuentran por lo general alojados en repositorios de aplicaciones no oficiales, pero eventualmente pueden filtrarse estas aplicaciones a los repositorios oficiales. Esta semana Google

Top exploits 2011

Todos los años el laboratorio independiente, Virus Bulletin, celebra el evento más importante del año para la comunidad de investigadores de la industria antivirus, la Virus Bulletin Conference. En esta conferencia participan los principales investigadores de los laboratorios antivirus, entre ellos ESET, presentando las principales tendencias en lo que respecta al mundo del malware y

Flash da un paso al costado y da lugar a HTML5

Los servicios de Adobe Flash Player han sido muy convenientes y utilizados hasta el momento en smartphones y tablets con plataforma Android y en los dispositivos y tablets de BlackBerry; a pesar de su gran utilización de energía, lo que es un punto negativo al tratarse de dispositivos móviles, y sus inconvenientes de estabilidad y

Rogue para Android evita política de seguridad china

Hoy en día, muchos usuarios de smartphones, se suscriben a servicios pagos a través de mensajes de texto, tales como la descarga de ringtones, eBooks, entre otros. Esto puede desembocar en un posible fraude, debido a que se realizan cobros ocultos o por el envío de información no solicitada, lo que produce una pérdida económica.

Resumen de amenazas de agosto

Escuchá el resumen mensual de amenazas en formato podcast: Como todos los meses, compartimos con ustedes el resumen mensual de amenazas correspondiente al mes de Agosto. Este mes, nuevamente Wikileaks acaparo la atención de los distintos medios del mundo publicando cables confidenciales. Una nueva publicación de más de 250,000 cables fueron liberados por la pagina

Calling Android Smartphone Zombies

Android Smartphones are under attack again by rogue applications that once installed are reading information from the phone and sending it back to a pre-assigned location. According to mobile security firm as many as 120,000 users may have been infected from a cafeteria selection of at least two dozen applications from the Android Market. “Once

Mobile Devices Favor Malware and Phishing

A while back a malicious program called DroidDream was found on the Google Marketplace. The thing about DroidDream is that it exploited a vulnerability that gave it root access. Now contrast how Google treats security software. Security applications are not allowed to have root access. The truth is that the most popular mobile platforms (and

EICAR Schnapps-Shot

Well, the EICAR conference earlier this month was in Krems, in Austria, where I hear that they're not averse to the occasional brandy, but I was actually perfectly sober when I delivered my paper on Security Software & Rogue Economics: New Technology or New Marketing? (The full abstract is available at the same URL.) To conform with EICAR's

Android’s Anomaly?

There are reports coming out today about Google Android and how approximately 99.7% of its users are potentially open to compromise.  This news cycle started by the Ulm University publishing some information on the 13th of May showing some results.  I'm sure this story will develop and CTAC may follow-up to my blog with more details;

Happiness is a Warm Smartphone*

…35% of iPhone/Android users in the US interact with their smartphones before they get out of bed…

ESET Mobile Security Beta for Android is Here!

As I have blogged about the Android platform a recurring comment has been “When will ESET have protection for my Android?” Well, I still don’t know when it will be available for sale, but for those who understand the risks involved with running beta software, have backed up all of their data on their Adnroid

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

1 article related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.