Blog

Smartphone security

What constitutes an effective mobile security suite?

 April 30, 2012

Estimated reading time: 3 minutes

With mobile malware on the rise and with millions of people jumping onto the smartphone bandwagon, the necessity to protect devices is now pronounced. Mobile scanning software is designed to protect smartphones from multiple threats. In an earlier post we discussed why your Android smartphone needs security, this article highlights...

5 reasons why your Android Smartphone needs security

 April 6, 2012

Estimated reading time: 4 minutes

Andy Rubin, co-founder of Android, says that there are nearly 850,000 new Android devices activated on a daily basis since February 2012. Since its inception in 2007, Android has grown at a phenomenal rate and has inched closer to toppling the massive ecosystem that Apple founder, Steve Jobs initiated. At...

Android Malware targeting users with fake Android Market website

 January 19, 2012

Estimated reading time: 2 minutes

Android malware is targeting users with a fake Android Market website URL that is nothing like the real Android Market website (https://market.android.com). When users click on the in-app ad they are taken to something that looks like the official Google Android Market page that may appear to loom like the...

Android Rougeware targeting “Stevens Creek Software”

 January 12, 2012

Estimated reading time: 1 minute

We have received a new malicious Android malware which is using the names of popular games and applications published under the name “Stevens Creek Software” to get installed on the user’s mobile. And the interesting thing about this rogueware is that unlike other Android malware which ask for numerous permissions...

“Battery Doctor” Android Scareware

 October 24, 2011

Estimated reading time: 2 minutes

A new “scareware” targeting mobile devices running Google’s Android operating system claims that it has the ability to recharge the battery, but in reality it is designed to steal information. When the program first executes, the overview window shown below appears. As you can see, it shows information about the...

Netflix application looks alike Android Malware

 October 17, 2011

Estimated reading time: 2 minutes

We have received a new malicous Android malware which looks like a genuine Netflix application and which can be used to steal Netflix account information. This is a classic case of trojanzied malware wherein the fake application, which is identical to the genuine application, lures users to enter their Netflix...

Malicious QR code used for spreading Android malware

 October 7, 2011

Estimated reading time: 2 minutes

Android malware writers have found a new and convenient way of delivering malware to users. This method makes use of malicious QR codes. QR (Quick Response) codes are a type of matrix barcode which contains encoded forms of data. They can also be used to store URL information. Most people...

Will new SMS regulations bring down fraudulent SMS scams?

 September 28, 2011

Estimated reading time: 1 minute

Mobile users in India are letting out a sigh of relief as unsolicited calls and text messages selling a wide spectrum of things ranging from credit card services to weight loss solutions have significantly come down. This is the first day of this improvement as the TRAI (Telecom regulatory Authority...

Android – RogueSPPush Malware

 August 29, 2011

Estimated reading time: 2 minutes

The growing popularity of Android and the tendency of users to store important data on their mobile phones are attracting many hackers. They are targeting users of Google Android mobile operating system with a malicious application that harvests personal information, controls the system and sends it to a remote server....

Android malware gains root access

 August 26, 2011

Estimated reading time: 1 minute

A new malware affecting the latest version of Android operating system (2.3 – Gingerbread) is now out in the wild and masquerading as an app featuring some “Beauty of the Day” photos. The package I downloaded uses the following permissions: android.permission.READ_PHONE_STATE android.permission.READ_LOGS android.permission.DELETE_CACHE_FILES android.permission.ACCESS_CACHE_FILESYSTEM android.permission.WRITE_SECURE_SETTINGS android.permission.ACCESS_NETWORK_STATE android.permission.INTERNET android.permission.WRITE_EXTERNAL_STORAGE android.permission.MOUNT_UNMOUNT_FILESYSTEMS android.permission.READ_OWNER_DATA...