PINDROP BLOG

Category: Device Security

March 23, 2017
Android Trojan Spreads Through Fake Cell Towers
Attackers in China are using rogue cell base stations to spread versions of an Android banking Trojan that steals user credentials and has the ability to bypass two-factor authentication. The malware, known as the Swearing Trojan for some impolite language found in the Chinese code, has been in circulation for several months and uses a…
Read More →
March 22, 2017
Half of Android Devices Didn’t Get Security Patches in 2016
Google has made several changes to the Android security ecosystem recently, including providing monthly updates and working with manufacturers to get those patches in the hands of users more quickly. But despite those efforts, about 50 percent of Android devices didn’t install a single security update in 2016. One of the issues with Android security…
Read More →
March 16, 2017
Congress Pushes DHS For Answers on SS7 Security
A year after flaws in SS7, one of the underlying protocols in the cell network came to the public’s attention, two powerful members of Congress are asking the secretary of Homeland Security how DHS has addressed the threat and whether the department has sufficient resources to detect and defeat SS7-related attacks. The flaws in SS7, a…
Read More →
March 15, 2017
Security Professionals Expect More Attacks On IIoT in 2017
As technology vendors race to create more and more devices connected to the Internet of Things (IoT) the opportunity for hackers to get into these devices grows larger and larger, as these IoT devices are usually made with little to no regard for security. The fears of a large-scale attack waiting to happen were solidified this week when security firm Tripwire released the…
Read More →
March 14, 2017
Researchers Find 36 Android Devices Pre-Owned With Malware
About 10 years ago, security researchers began warning users and technology manufacturers about the problem of hardware devices coming out of the box pre-loaded with malware. It began with digital picture frames and USB drives, and it has moved to mobile phones, with the latest example coming in the form of 36 Android phones that shipped with…
Read More →
March 13, 2017
Google Roots Out Harmful Chamois Apps From Play Store
Fraudsters and cybercriminals continue to target mobile app stores with garbage apps disguised as benign ones, and Google has just identified a large family of potentially harmful apps in the Play marketplace and banned the apps and some people who were trying to take advantage of the company’s ad system to make money on the apps.…
Read More →
March 8, 2017
Researchers Find Multiple Bugs in Confide Messaging App
Researchers at IOActive have uncovered a number of serious security flaws in the Confide secure messaging app, some of which could allow an attacker to hijack a user’s session or impersonate a target user. Confide is one of the group of encrypted chat apps that have emerged in the last few years and promises end-to-end…
Read More →
February 21, 2017
Netflix Releases Stethoscope Security Tool
Netflix has released a new security application that’s designed to give normal users detailed information about the security state of their various devices and help them remedy any issues, without going to IT or a help desk. Stethoscope is a Web-based tool that the company says is part of its user-focused security ethos, and Netflix has…
Read More →
February 21, 2017
Wyden to Introduce Bill to Prohibit Warrantless Phone Searches at Border
A senator from Oregon who has a long track record of involvement on security and privacy issues says he plans to introduce a bill soon that would prevent border agents from forcing Americans returning to the country to unlock their phones without a warrant. Sen. Ron Wyden said in a letter to the secretary of…
Read More →
February 14, 2017
‘When Computers Start Killing People, There Are Going to Be Consequences’
SAN FRANCISCO–The massive, rapidly expanding network of insecure IoT devices is becoming so large and unwieldy that it will inevitably attract attention from government regulators in the near future. And that’s actually a positive development, security experts say. “As everything becomes a computer, computer security becomes everything security. The beachhead of all of this is…
Read More →