mobile | Page 2


While inspecting the Pokémon Go application, I incidentally found information on ... Pokémon Go Plus. Basically, this is the Pokémon IoT: a connected wristband with a button (to throw a pokéball, for instance), a RGB LED, and vibration capability (e.g to notify of nearby Pokémon). The device is not yet released, and the software is still under development: as you can see below, versions 0.29.x corresponds to "BETA4". Implementation in version... [Read More]
by RSS Axelle Apvrille  |  Aug 11, 2016  |  Filed in: Security Research
Recently, we - i.e Giuseppe Pacelli (student at Eurecom), Matteo Bertolino (student at Eurecom) and their supervisors Ludovic Apvrille (Telecom ParisTech) and myself - had a closer look at a few Android samples infected with the Feiwo adware. This adware family is not new, but the instances we analyzed were still undetected by all anti-virus vendors last week, as far as we know. Besides aggressively serving ads to your mobile phone, this potentially unwanted application (PUA) posts your phone number and list of applications you installed... [Read More]
by RSS Axelle Apvrille  |  May 20, 2016  |  Filed in: Security Research
Google fixed a denial of service vulnerability in Minikin library (CVE-2016-2414) with the Android patches of this month. I reported this vulnerability to Google in early March, 2016 and Google confirmed it was a duplicated report of bug 26413177 which had been reported by another researcher in November, 2015. In this blog, we will provide an in-depth analysis of this vulnerability. It exists because the Minikin library fails to parse .TTF font files correctly. As a result, it could allow a local attacker... [Read More]
by RSS Kai Lu  |  Apr 13, 2016  |  Filed in: Security Research
Not surprisingly, mobile security ranks among the top challenges IT faces when it comes to protecting small and mid-sized businesses. What is surprising, however, is that only 16% of SMBs worldwide responding to a recent Techaisle survey say they’re prepared to deal with mobile security challenges. For some small businesses, this is constraining mobile adoption; for others, it's creating concerning security gaps. However, it also creates an opportunity for channel partners to step in and become trusted advisors. Right now, many MSPs... [Read More]
by RSS Esther Shein  |  Sep 24, 2015  |  Filed in: Industry Trends
For the second year in a row, BlackHat Asia was held in Singapore, at the end of March, in the luxury Marina Bay Sands hotel. As usual, the 2 days briefings were fully loaded of plenty of topics. 3 distinct tracks were offered, plus the business track (briefings sponsored by companies) and of course the technical Arsenal rooms. This year Fortinet had a booth, I was asked to help. We had a lot of great conversations with prospective customers and passerby generally interested in industry trends. I was also able to attend some briefings,... [Read More]
by RSS David Maciejak  |  Apr 02, 2015  |  Filed in: Industry Trends
A recent news article described email as the undying "cockroach of the Internet". To validate this statement, seeing some of the Android malware samples I've analyzed recently, malware authors might share that sentiment. In 2013, we saw the first Android botnet variant that used email as a means to 'call home'. However, over the past few months there has been a surge in the number of samples discovered that follow suit (thanks to Crypto Girl for the observation). The table below lists all such variants we've seen so far : Variant Name Date... [Read More]
by RSS Ruchna Nigam  |  Sep 15, 2014  |  Filed in: Security Research
Today we announced the availability of the first firewall to cross the 1 Terabit per second threshold. That's 1 trillion bits, or 1 with 12 zero's after it (1,000,000,000,000). But why is it needed now and why is it important? The way we do business has changed, and the threat landscape along with it. Mobile computing, public and private cloud services, social media, everything-as-a-Service, and Big Data. These trends mean the firewall cannot become a bottleneck, and the bar has to constantly be raised higher and higher. The new FortiGate-5144C... [Read More]
by RSS Tamir Hardof  |  Jul 23, 2014  |  Filed in: Industry Trends
Ransomware is a type of malware that restricts usage of the device it infects, demanding a ransom from the end-user in order to regain control over the device. Now, the malware could actually damage/encrypt the system and the files on it or it could take the easier way out by merely giving a semblance of having performed these functions. Although in both cases, phone usage becomes difficult for the user Ransomware threats have been big on mobile phones this year - from the emergence of the first variant targetting iOS devices to the first Android... [Read More]
by RSS Ruchna Nigam  |  Jun 25, 2014  |  Filed in: Security Research
2014 has come out swinging with lots of things to discuss in the security threat landscape for January. Our very own Derek Manky, Global Security Strategist, talks with IDG Enterprise's Keith Shaw on the Target hack, the worst passwords, and the 10-year anniversary of mobile malware. For more on the Target breach read an interesting take on the recent hack written by Rick Popko Learn more about staying safe online with Data Privacy Day: Top 5 Ways to Protect Your Privacy For more on the 10th anniversary of mobile malware check out... [Read More]
by RSS Michael Perna  |  Jan 28, 2014  |  Filed in: Industry Trends
This Tuesday, January 28th, marks a significant day of observation. No, it's not another presidential holiday. And you probably won't get the day off from work - at least not without calling in sick. January 28 is in fact Data Privacy Day. Led by the non-profit public-private partnership National Cyber Security Alliance, Data Privacy Day is a concerted, international effort that aims to educate and empower users to better safeguard their personally identifying information and take control of their digital footprint. The effort stems from the... [Read More]
by RSS Stefanie Hoffman  |  Jan 28, 2014  |  Filed in: Industry Trends