Articles from ITBoB Home (trending on the web)

Hackers Can Remotely Install Malware Apps to Your Android Device

Security researchers have warned of a pair of vulnerabilities in the Google Play Store that could allow cyber crooks to install and launch malicious applications remotely on Android devices.

Tod Beardsley, technical lead for the Metasploit Framework at Rapid7 warns that an X-Frame-Options (XFO) vulnerability – when combined with a recent Android WebView (Jelly Bean) flaw – creates a way

CEOs On The Run: Financial Crisis With Chinese Characteristics

As China’s economy slows down, many firms cannot service their debt obligations. This isn’t abnormal, but what is unusual is that, faced with debt issues, there has been an increasing number of CEOs and owners of borrowing companies who simply choose to disappear. The local media have coined a new term to describe these vanishing acts: paolu (running on the road).

How secure is Android? And should we be worried? [Q&A]

In the past malware developers and hackers have tended to concentrate on Windows. But as mobile has taken off and there's been a shift in the type of systems people use they've diversified their efforts into other systems. In particular Android, as the most popular mobile OS, has become a prime target. We spoke to Ren Huan, chief architect at Android security and performance specialist 360 Security to get his view of the mobile security landscape. BN: How does the Android threat landscape differ from other operating systems? Are premium SMS threats still a major problem for example?

Top 5 Malware Trends on the Horizon

  Over the past two decades, I’ve developed an intense fascination with malware. When studying evasive malware alongside Lastline co-founders Dr. Giovanni Vigna and Dr. Christopher Kruegel as part of our academic research years before we founded the company, the term “malware” was esoteric and evasive malware didn’t really exist. Fast forward to today and […]… Read More
The post Top 5 Malware Trends on the Horizon appeared first on The State of Security.

Pages