In This Section

PINDROP BLOG

Category: Device Security

July 19, 2016
Banking Trojan Lurks in Legitimate Software
Cybercriminals have been relying on the watering hole attack for many years as a consistent method for getting their malware onto victims’ machines. Recently, security researchers discovered that one group of attackers had compromised the site of a legitimate software company and found a way to insert their banking Trojan’s code into the company’s own downloader. The…
Read More →
July 13, 2016
Q&A: Donato Ferrante on the Ransomware Simulator
There are few threats that are as commanding as much attention right now as ransomware is. It infects thousands of PCs every day, generates millions of dollars for the attackers behind the campaigns, and there’s not clear solution to the problem on the horizon. To help enterprises understand the threat, researchers at NCC Group built…
Read More →
July 12, 2016
On the Wire Podcast: Rick Holland on Ransomware
Let’s be honest: The ransomware crews are kind of winning right now. They have a simple, clean business model, a huge victim base, and not much on the horizon to slow them down. In this episode, Dennis Fisher talks with Rick Holland of Digital Shadows about a new research paper the firm did on ransomware…
Read More →
July 11, 2016
Apple Needs a Patch Schedule for iOS
Android users don’t have many things they can point to when it comes to security advantages over iPhone users. The iOS platform is considered significantly safer and more resistant to attack than Android, as are the devices. But when it comes to the patching schedule, if not the process, Google has it all over Apple. In…
Read More →
July 6, 2016
Google July Android Update Fixes Dozens of Bugs
Google has released a huge security update for Android that fixes dozens of vulnerabilities, including a number of critical flaws that allow remote code execution. In an unusual move, Google released two distinct sets of patches: July 1 and July 5. The July 5 level has many more fixes, and Google said it separated the…
Read More →
July 6, 2016
Ransomware Simulator Shows Glimpse of Damage an Infection Can Cause
Ransomware defense is emerging as one of the more important sectors of the security field, with researchers exploring many different paths. One of the key elements of defending against a threat is understanding how it operates, and researchers in the U.K. have now developed a pair of tools that emulate the behavior of ransomware to…
Read More →
July 6, 2016
Eleanor OS X Backdoor Emerges
Researchers have discovered a new backdoor for Mac OS X that gives attackers essentially complete control over an infected machine. The malware is disguised as a common file converter utility and uses Tor for some communication functions. Known as Eleanor, the backdoor has a wide range of functionality, including the ability for the attacker to…
Read More →
July 5, 2016
Android Nougat Takes on Mobile Ransomware
As Android ransomware continues to evolve, defenders are trying to keep pace. Most of the efforts to defeat ransomware have come through third-party security software and behavioral changes, but now Google is making a change to the next version of the mobile operating system to prevent a key part of some ransomware threats. One of…
Read More →
June 30, 2016
House Committee Report Slams Proposed Encryption Legislation
A new report from House Homeland Security Committee on the encryption debate says that despite both parties being motivated to find common ground, law enforcement and the private sector haven’t yet started a meaningful conversation on encryption, and none of the legislative proposals forwarded so far are realistic. The report, released Wednesday, discusses the encryption…
Read More →
June 29, 2016
Android Malware Impersonates Google Play, WhatsApp
Overlay malware has emerged as one of the more pernicious threats on mobile devices, particularly Android phones, and researchers have now discovered a new SMS phishing campaign that uses overlay malware to steal credentials for mobile banking apps and messaging apps. The attackers behind the campaign are using a wide range of lures and a…
Read More →
2019 Voice Intelligence Webinar Series – where voice, not touch is the main interface for customers.