Tag Archive for: applications

Bot malware uncovered using gaming applications on Microsoft store


Check Point Research has revealed a new malware Electron-bot that is actively being distributed through Microsoft’s official store. 

With more than 5000 machines already affected in 20 countries so far, the malware continually executes attacker commands, such as controlling social media accounts on Facebook, Google and Sound Cloud. The malware can register new accounts, log in, comment on and “like” other posts. 

CPR urges users to immediately delete applications from a number of publishers.

Dubbed Electron-bot by CPR, the malware’s full capabilities include SEO poisoning, an attack method in which cybercriminals create malicious websites and use search engine optimisation tactics to make them show up prominently in search results. This method is also used as a sell as a service to promote other websites ranking.

The malware also utilises Ad Clicker, a computer infection that runs in the background and constantly connects to remote websites to generate ‘clicks’ for advertisement, hence profiting financially by the amount of times an advertisement is clicked.

It can promote social media accounts, such as YouTube and SoundCloud to direct traffic to specific content and increase views and ad clicking to generate profits, as well as promote online products, to generate profits with ad clicking or increase store rating for higher sales.

 

In addition, as Electron-bot’s payload is dynamically loaded, the attackers can use the installed malware as a backdoor in order to gain full control on the victim’s machine.

“This research analysed a new malware called Electron-bot that has attacked more than 5000 victims globally,” says Daniel Alima, Malware Analyst at Check Point Research.

“Electron-bot is downloaded and easily spread from the official Microsoft store platform. The Electron framework provides Electron apps with access to all of the computer resources, including GPU computing. 

“As the bot’s payload is loaded dynamically at every run time, the attackers can modify the code and change the bots behaviour to high risk,” he says. 

“For example, they can initialise another second stage and drop a new malware such as ransomware or a RAT. All of this can…

Source…

KIOXIA announces UFS embedded flash memory devices for a variety of mobile applications


KIOXIA America announced sampling of the Universal Flash Storage (UFS) embedded flash memory devices supporting MIPI M-PHY v5.04.

KIOXIA America UFS devices

The new lineup utilizes the company’s BiCS FLASH 3D flash memory and is available in three capacities: 128GB, 256GB and 512GB. The new devices deliver high speed read and write performance and are targeted to a variety of mobile applications, including leading-edge smartphones.

The new KIOXIA devices are next-generation UFS (MIPI M-PHY 5.0), which has a theoretical interface speed of up to 23.2Gbps per lane (x2 lanes = 46.4Gpbs) in HS-GEAR5 mode. Sequential read and write performance of the 256GB device is improved by approximately 90 percent and 70 percent, respectively, over previous generation devices6.

Also, random read and write performance of the 256GB device is improved by approximately 35 percent and 60 percent, respectively, over previous generation devices. This next generation of UFS provides significant increases in performance, enabling next-generation smartphones and other products to enhance their capabilities and end user experiences in the 5G era and beyond.

“We are pleased to announce another first in UFS memory,” noted Scott Beekman, vice president, Memory Business Unit, for KIOXIA America, Inc. “This next generation of UFS provides significant increases in performance, enabling next generation smartphones and other products to enhance their capabilities and end user experiences. Moving forward, we will continue to drive these advances, maintaining our UFS memory leadership role.”

Source…

Security and usability are not mutually exclusive in mobile applications


Organizations that build or maintain mobile applications have a greater responsibility than ever to secure their applications as the number of application downloads continues to grow. 

3.8 billion smartphone users accounted for 218 billion app downloads in 2020 alone.

Zimperium conducted a survey last year in which 250 enterprises described the security issues they  struggled with the most within their their mobile applications.

The greatest security issue with applications for Android was lacking runtime protection at 93% while this data point was at 79% for iOS. Where iOS struggles was in lacking code protection at 94% while it is only 63% on Android.

The two other most common issues were vulnerable encryption for which both application types hovered around 50%, while the lack of data protection sat at around 26-38% for both device types. 

The survey found that enterprises were concerned with the right things, such as ensuring data is securely stored and transmitted and ensuring proprietary source code cannot be stolen, but the fixes for these concerns were not being focused on enough, Krishna Vishnubhotla, VP of product strategy at Zimperium, said during a recent SD Times Live!  webinar “Top Five Best Practices for Mobile DevSecOps.” 

The reason is a lot of the companies fear that implementing security solutions can make the user experience suffer and slow up development or make it difficult to use. However, this can be mitigated by asking questions from the vendor to see whether the challenges or concerns can be minimized or removed. 

“People tend to look at mobile and they think it’s a contained environment. There’s this feeling of it being a little bit more secure than your desktops,” said Adam Wosotowsky, principal data architect at Zimperium. ”It really surprised me just how not true that is. From a security perspective, they have existing security wrapped around their app, and therefore they think they don’t have to worry about it quite as much. But the problem is all of that security can be pretty easily bypassed.” 

To bolster security organizations should be looking to:

  1. Ensure security still works when an attacker controls…

Source…

Mobile Security Market Analysis, Key Company Profiles, Types, Applications and Forecast to 2022-2030 – Construction News Portal


Mobile Security

The most recent Mobile Security Market statistical surveying report involves a complete evaluation of Mobile Security industry, featuring the variables that will affect the business’ income stream during the assessed course of events. Further, it gives an expressive framework of the open possibilities in the sub-promotes close by measures to profit from something almost identical.

The analyst presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters. Our report on Mobile Security market covers the following areas:

  • Mobile Security market sizing
  • Mobile Security market forecast
  • Mobile Security market industry analysis

Competitive Analysis:

The Mobile Security market report includes information on the product launches, sustainability, and prospects of leading vendors including: (Lookout, Trend Micro, Kaspersky, Lookout, Bitdefender, Tencent, Trend Micro, My Norton, F-Secure, 360, Webroot Secure, ESET, NetQin, BullGuard, McAfee)

Click the link to get a free Sample Copy of the Report @ https://crediblemarkets.com/sample-request/mobile-security-market-410859?utm_source=Akhilesh&utm_medium=SatPR

Market segmentation

Mobile Security market is split by Type and by Application for the period 2022-2030, the growth among segments provides accurate artifices and forecasts for sales by Type and by Application in terms of volume and value. This analysis can help you expand your business by targeting qualified niche markets.

By Types:

E-mail
Antivirus
Malware

By Applications:

Authentication
Sim card
Mobile application management
Mobile data protection
Firewall

Regional Analysis of Global Mobile Security Market

All the regional segmentation has been studied based on recent and future trends, and the market is forecasted throughout the prediction period. The countries covered in the regional analysis of the Global Mobile Security market report are U.S., Canada, and Mexico in North America, Germany, France, U.K., Russia, Italy, Spain, Turkey, Netherlands, Switzerland, Belgium, and Rest of Europe in Europe, Singapore, Malaysia, Australia, Thailand, Indonesia, Philippines, China, Japan, India, South Korea, Rest of…

Source…