Android Security. Francesco Mercaldo, PhD
|
|
- Mervin Thornton
- 6 years ago
- Views:
Transcription
1 Android Security Francesco Mercaldo, PhD Post-Doctoral researcher Sicurezza delle Reti e dei Sistemi Software Corso di Laurea Magistrale in Ingegneria Informatica Università degli Studi del Sannio (fmercaldo@unisannio.it) Things are not always what they seem; the first appearance deceives many; the intelligence of a few perceives what has been carefully hidden. Phaedrus
2 A matter of fact Symantec: Gli antivirus sono morti, non sono più sufficienti a proteggere i nostri computer Attualmente il miglior antivirus al mondo si chiama Linux (Brian Dye, vicepresidente di Symantec, 2014) 1988: Dr. Solomon s Anti-Virus Toolkit, AIDSTEST (Sophos), AntiVir Mailing list VIRUS-L (tra i membri comparivano John McAfee e Eugene Kaspersky)
3
4 A matter of fact LaRepubblica,
5 98% of mobile malware targets Android platform
6 Android Antimalware it is very easy for malware to evade detection by most antivirus (Fraunhofer Research Institution, 2013) with the only trivial alteration to the package files of a trusted application Android does not allow an application to monitor the file system any application can only access its own disk space resource sharing is allowed only if expressly provided by the developer of the application.
7 Signature-based detection Antivirus software heavily relied upon signatures to identify malware. when a malware arrives in the hands of an antivirus firm, it is analysed by malware researchers or by dynamic analysis systems. once it is sure it is actually a malware, a proper signature of the file is extracted and added to the signatures database of the antivirus software When a particular file has to be scanned, the antivirus engine compares the content of the file with all the malware signatures in the signatures database. If the file matches one signature, then the engine is able to know which malware.
8 Signature-based detection A technique very effective But cannot defend against malware unless some of its samples have already been obtained a proper signatures generated the antivirus product updated Signature-based detection system rely on the consideration that, generally speaking, the more infective a malware is the faster arrives in the hands of security researchers. and zero-day attack?
9
10 Kind of attacks To infect mobile users, malicious apps typically lure users into downloading and installing them. Repackaging: downloading popular benign apps, repackaging them with additional malicious payloads, and then uploading repackaged ones to various Android marketplaces. Update attack : the malicious payloads are disguised as the updated version of legitimate apps. Drive-by download: redirect users to download malware, e.g., by using aggressive in-app advertisement or malicious QR code. Rogueware: it pretends to be a well-known application (e.g., an antimalware), in order to steal confidential data or receive money.
11 Android Defender first detected mobile Rogueware, 2013 this hybrid fake antivirus/ransomware app demands a $99.99 payment to restore access to your Android device. uses a variety of social engineering tactics can restrict access to all other applications, making it impossible to make calls, change settings, kill tasks, uninstall apps, or even perform a factory reset. It presents a warning message about infection that is visible on screen, no matter what a user is doing Bank account theft, delivered via smartphone Do you remember the Guardia di Finanza virus? 11
12 FakeAV 12
13 Fast growing families Families engaged in premium-sms messages sending saw the greatest rate of development, as their operators ramps up operations and chum out more variants in the last six months
14 Limits of the Existing Antimalware Strategies Goal: evaluate the effectiveness of current antimalware: a real world Android malware dataset more than 50 antimalware Free and commercial A set of code transformations
15 The transformations Disassembling & Reassembling Changing package name
16 Changing package/ class name
17 Data encoding
18 Call indirections
19 Junk code insertion Type I: nop instructions at the beginning of each method Type II: nop instructions and unconditional jumps Type III: allocation of three additional registers performing garbage operations
20 The evaluated antimalware
21 Antimalware evaluation Antimalware that correctly detected at least 90% of original and transformed samples Original malware set: 47% Transformed malware set: 7%
22 Antimalware evaluation Applications identified as trusted Original malware set: 5% Transformed malware set: 81%
23 Reverse Engineering Definition: Refers to the process of analyzing a system to identify its components and their interrelationships, and create representations of the system in another form or a higher level of abstraction. Objectives: The purpose of reverse engineering is not to make changes or to replicate the system under analysis, but to understand how it was build.
24 Application analysis workflow
25 Application analysis workflow
26 Static Analysis Tool
27 Other (necessary) tools
28 Malware Malware definition Malware is a piece of code which changes the behaviour of either the operating system kernel or some security sensitive applications, without a user consent and in such a way that it is then impossible to detect those changes using a documented features of the operating system or the application. A Malware is any malicious code or piece of software that is designed to perform functions without the consent of the user.
29 Viber: the case study Free text, calling, photo messages and location-sharing with Viber users Very close to WhatsApp but not obfuscated
30 ApkTool It can decode resources to nearly original form and rebuild them after making some modifications In most cases
31 dex2jar a tool to convert Androids classes.dex into a.jar file
32 JDGui It s a standalone graphical utility that displays Java source codes of.class files. You can browse the reconstructed source code It s for Java not for Android!
33 Malicious Permission Identify a possible malicious application App with unnecessary permission A wallpaper that requires SEND SMS MESSAGES A calculator that requires DIRECTLY CALL PHONE NUMBERS
34
35 How to stimulate a payload
36 From Dalvik to Java Convert from Dalvik Executable to Java classes d2j-dex2jar.sh pipe.apk Decompile Java classes and download source code jd-gui pipe-dex2jar.jar
37 APKInspector Control Flow Graph Static Instrumentation Permission Analysis Dalvik codes Smali codes Java codes APK Information
38 APKInspector Run "python StartQT.py from program directory Click "Setting" button to choose the analysis component you want. Click "New" button, choose the application you want to analysis. Select different pages to see CFG\Call Graph\Dalvik codes\permissions etc
39 APKInspector in action
40 Dexter online service
41 Online malware detection services
42 Google Bouncer Virtual Environment to check if app is malicious Runs the app in a phone like environment for around 5 mins before publishing Detects most of the malwares Can be bypassed easily
43 Android Framework for Exploitation
44 AFE s features Malware Creator (Creation of malware and botnet modules. Also used to inject malicious codes into legitimate applications) Listener (Python listener to listen to and show incoming data from the phone/emulator) Exploiter (Used to exploit various vulnerabilities in applications and platform in order to obtain root privileges)
45 AFE s features Stealer (To steal information from the phone including contacts, call logs, text messages, files from the SD Card and many more) Crypter (To make already detected malware samples, undetectable by the anti-malwares)
46 Malware Creator responsible for creating the malicious applications with whatever functionality you wish for a pre-defined template AndroidManifest.xml MainActivity.java Services.java Strings.xml Main.xml
47 AFE in practice Inject malware code as a service, and then activating it with a broadcast receiver. To start up AFE, type in a built-in shell./afe.py but AFE is also stealer, crypter, exploiter...enjoy!
48 References Elliot J. Chikofsky, James H. Cross Reverse Engineering and Design Recovery: A Taxonomy. IEEE Software, Jan 1990, pg J. Rutkowska. Introducing Stealth Malware Taxanomy. Alternative markets to the Play Store. Security features provided by Android. y/permissions.html
49 References Y. Zhoux, X. Jiang «Dissecting Android Malware: Characterization and Evolution», Proc. Of IEEE Symposium on Security and Privacy 2012, pg: Yousra Aafer, Wenliang Du, and Heng Yin, «DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android» proc. Of SecurComm H.Le Thanh Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It Journal of Information Security 2013, 4,
50 References Using the Android Emulator. ator.html Android malware database aseandroidmalwares «Attacking Angry Birds» fundamentals.html
51 Any Questions?
Android Analysis Tools. Yuan Tian
Android Analysis Tools Yuan Tian Malware are more creative: XcodeGhost More than 300 a pps are infected, including wechat and netease Collect device ID, Apple ID and p assword 10/3/15 CMU Mobile Security
More informationAndroid Application Sandbox. Thomas Bläsing DAI-Labor TU Berlin
Android Application Sandbox Thomas Bläsing DAI-Labor TU Berlin Agenda Introduction What is Android? Malware on smartphones Common countermeasures on the Android platform Use-Cases Design Conclusion Summary
More informationSECURE2013 ANDROTOTAL A SCALABLE FRAMEWORK FOR ANDROID ANTIMALWARE TESTING
SECURE2013 ANDROTOTAL A SCALABLE FRAMEWORK FOR ANDROID ANTIMALWARE TESTING Federico Maggi, Andrea Valdi, Stefano Zanero Politecnico di Milano, DEIB fede@maggi.cc ROADMAP 1. Android threats and protections
More informationAndroid Overview. Francesco Mercaldo, PhD
Android Overview Francesco Mercaldo, PhD Post-Doctoral researcher Corso di Sicurezza delle Reti e dei Sistemi Software Università degli Studi del Sannio (fmercaldo@unisannio.it) Things are not always what
More informationReview Kaspersky Internet Security - multi-device 2015 online software downloader ]
Review Kaspersky Internet Security - multi-device 2015 online software downloader ] Description: Benefits Protecting all your connected devices the one-licence, easy-touse solution Kaspersky Internet Security
More informationdroidcon Greece Thessaloniki September 2015
droidcon Greece Thessaloniki 10-12 September 2015 Reverse Engineering in Android Countermeasures and Tools $ whoami > Dario Incalza (@h4oxer) > Application Security Engineering Analyst > Android Developer
More informationOWASP German Chapter Stammtisch Initiative/Ruhrpott. Android App Pentest Workshop 101
OWASP German Chapter Stammtisch Initiative/Ruhrpott Android App Pentest Workshop 101 About What we will try to cover in the first session: Setup of a Mobile Application Pentest Environment Basics of Mobile
More informationCUHK CSE ADAM: An Automatic & Extensible Platform Stress Test Android Anti-Virus Systems John Spark Patrick C.S. Lui ZHENG Min P.C.
ADAM: An Automatic & Extensible Platform To Stress Test Android Anti-Virus Systems John C.S. Lui Patrick P.C. Lee 1 of 15 Android Malware Up 3,325% in 2011 1. This past year, we saw a significant increase
More informationBUILDING A TEST ENVIRONMENT FOR ANDROID ANTI-MALWARE TESTS Hendrik Pilz AV-TEST GmbH, Klewitzstr. 7, Magdeburg, Germany
BUILDING A TEST ENVIRONMENT FOR ANDROID ANTI-MALWARE TESTS Hendrik Pilz AV-TEST GmbH, Klewitzstr. 7, 39112 Magdeburg, Germany Email hpilz@av-test.de ABSTRACT The growth of the Smartphone market over the
More informationVirtualSwindle: An Automated Attack Against In-App Billing on Android
Northeastern University Systems Security Lab VirtualSwindle: An Automated Attack Against In-App Billing on Android ASIACCS 2014 Collin Mulliner, William Robertson, Engin Kirda {crm,wkr,ek}[at]ccs.neu.edu
More informationMOBILE DEFEND. Powering Robust Mobile Security Solutions
MOBILE DEFEND Powering Robust Mobile Security Solutions Table of Contents Introduction Trustlook SECURE ai Mobile Defend Who Uses SECURE ai Mobile Defend? How it Works o Mobile Device Risk Score o Mobile
More informationFILELESSMALW ARE PROTECTION TEST OCTOBER2017
FILELESSMALW ARE PROTECTION TEST OCTOBER2017 1 / 12 INTRODUCTION In times of digitalization of each aspect of public and private life new and interesting techniques of bypassing protections are abundant.
More informationMRG Effitas Android AV review
MRG Effitas Android AV review 1 Contents Introduction... 3 Tests Applied... 3 Test samples... 4 Security Applications Tested... 5 Test Results... 5 Conclusions... 10 2 Introduction MRG Effitas is an independent
More informationDetecting Advanced Android Malware by Data Flow Analysis Engine. Xu Hao & pll
Detecting Advanced Android Malware by Data Flow Analysis Engine Xu Hao & pll 2013.09 Content Background adfaer - Android Data Flow Analyzer Janus - Detect Reflection Experiment Future Work Android Security
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security
More informationMalware in the Mobile Device Android Environment
Annual ADFSL Conference on Digital Forensics, Security and Law 2016 May 25th, 10:30 AM Malware in the Mobile Device Android Environment Diana Hintea Coventry University, School of Computing, Electronics
More informationNetwork Security Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 5 Viruses & Worms, Botnets, Today s Threats Viruses
More informationDiscount Kaspersky PURE 3.0 internet download software for windows 8 ]
Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social
More informationAHNLAB 조주봉 (silverbug)
AHNLAB 조주봉 (silverbug) Android Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Application framework Dalvik virtual machine Integrated
More informationPrevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,
Prevx 3.0 v3.0.1.65 Product Overview - Core Functionality April, 2009 includes overviews of MyPrevx, Prevx 3.0 Enterprise, and Prevx 3.0 Banking and Ecommerce editions Copyright Prevx Limited 2007,2008,2009
More informationDr.Web KATANA. Kills Active Threats And New Attacks
Dr.Web KATANA Kills Active Threats And New Attacks Doctor Web 2018 Dr.Web KATANA Kills Active Threats And New Attacks A next-generation non-signature anti-virus that operates in tandem with your traditional
More informationWhite Paper. New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection
White Paper New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection The latest version of the flagship McAfee Gateway Anti-Malware technology adapts to new threats and plans for future
More informationSeqrite Antivirus for Server
Best server security with optimum performance. Product Highlights Easy installation, optimized antivirus scanning, and minimum resource utilization. Robust and interoperable technology makes it one of
More informationHackveda Training - Ethical Hacking, Networking & Security
Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass
More informationQuick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.
Optimized Antivirus Scanning. Low on Resources. Strong on Technology. Product Highlights Quick Heal» Easy installation, optimized antivirus scanning, and minimum resource utilization.» Robust and interoperable
More informationKaspersky Mobile Security 9. Reviewer s Guide
Kaspersky Mobile Security 9 Reviewer s Guide The purpose of this document is to provide an introduction to Kaspersky Mobile Security 9 (KMS 9). KMS 9 is a product that has been designed to protect the
More informationBreaking and Securing Mobile Apps
Breaking and Securing Mobile Apps Aditya Gupta @adi1391 adi@attify.com +91-9538295259 Who Am I? The Mobile Security Guy Attify Security Architecture, Auditing, Trainings etc. Ex Rediff.com Security Lead
More informationA Large-Scale Empirical Study on the Effects of Code Obfuscations on Android Apps and Anti-Malware Products
Department of Informatics University of California, Irvine Irvine, California, USA {hammadm, joshug4, malek}@uci.edu ABSTRACT The Android platform has been the dominant mobile platform in recent years
More informationAbusing Android In-app Billing feature thanks to a misunderstood integration. Insomni hack 18 22/03/2018 Jérémy MATOS
Abusing Android In-app Billing feature thanks to a misunderstood integration Insomni hack 18 22/03/2018 Jérémy MATOS whois securingapps Developer background Worked last 12 years in Switzerland on security
More informationMOBILE THREAT PREVENTION
MOBILE THREAT PREVENTION BEHAVIORAL RISK ANALYSIS AN ADVANCED APPROACH TO COMPREHENSIVE MOBILE SECURITY Accurate threat detection and efficient response are critical components of preventing advanced attacks
More informationESET ENDPOINT SECURITY FOR ANDROID
ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Endpoint Security 1.1 Installation...3
More informationBig Trends in IT and how they shape Security. Gerhard Eschelbeck, CTO
Big Trends in IT and how they shape Security Gerhard Eschelbeck, CTO Industry Trends #1 The Rapidly Growing Demand for Processing and Data Storage Google processes 20 PB a day London s traffic cams processing
More informationCuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes Patrick Carter, Collin Mulliner, Martina Lindorfer, William Robertson, Engin Kirda 02/23/2016 Android 2015
More informationQuick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.
Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth
More informationManually Remove Of Xp Internet Security Protect Virus Manually
Manually Remove Of Xp Internet Security Protect Virus Manually We show you how to remove malware from a PC or laptop. You may also wish to read: Windows users: how to protect your PC from Check now: do
More informationQuick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.
Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email
More informationAccess Control for Plugins in Cordova-based Hybrid Applications
2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More information3.5 SECURITY. How can you reduce the risk of getting a virus?
3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define
More informationThe Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company
The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company November 12, 2014 Malware s Evolution Why the change? Hacking is profitable! Breaches and Malware are Projected to Cost $491
More informationFree antivirus software download windows 10
Free antivirus software download windows 10 Search Free software download,the biggest software directory for freeware and shareware download at brothersoft.com. 2-3-2018 Protect your devices with the best
More informationHow To Remove Personal Antivirus Security Pro Virus Manually
How To Remove Personal Antivirus Security Pro Virus Manually Uninstall Antivirus Pro 2017 Virus (Manual Removal Guide) This type of virus uses false scan results and fake security alerts to scare computer
More informationOnline Security and Safety Protect Your Computer - and Yourself!
Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your
More informationQuick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.
Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationComodo Mobile Security for Android Software Version 2.5
Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile
More informationKASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com KASPERSKY FRAUD PREVENTION 1. Ways of Attacking Online Banking The prime motive behind cybercrime is making money and today s sophisticated criminal
More informationWhat is Zemana AntiLogger?
Zemana AntiLogger You need smarter protection against the bad guys who are trying to steal your financial credentials, gain access to your private online accounts and even your identity. What is Zemana
More informationEthical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,
More informationPhishing in the Age of SaaS
Phishing in the Age of SaaS AN ESSENTIAL GUIDE FOR BUSINESSES AND USERS The Cloud Security Platform Q3 2017 intro Phishing attacks have become the primary hacking method used against organizations. In
More informationHow to prevent phishing attacks? In 3 Pages. Author: Soroush Dalili irsdl {4t[ yahoo }d0t] com Website: Soroush.SecProject.
How to prevent phishing attacks? In 3 Pages Author: Soroush Dalili Email: irsdl {4t[ yahoo }d0t] com Website: Soroush.SecProject.Com March 2009 How to prevent phishing attacks? 1. Introduction Phishing
More informationFeatures. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage
PRO Not just an app, but a friend for your phone. Product Highlights Fonetastic is an all-in-one app for Android devices. Built with multiple productivity and security features, it enhances your device
More informationPenetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security No part of this publication, in whole or in part, may
More informationIntel Security Advanced Threat Defense Threat Detection Testing
Intel Security Advanced Threat Defense Threat Detection Testing DR150724C July 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 Products Tested... 4 3.0 How We Did It...
More informationHow To Remove Personal Antivirus Security Pro From Registry
How To Remove Personal Antivirus Security Pro From Registry This page contains step by step instructions on how to remove Malware Defender 2015 to remove the viruses you will be submitting your personal
More informationCSCD 303 Essential Computer Security Fall 2017
CSCD 303 Essential Computer Security Fall 2017 Lecture 13 - Malware Evasion, Prevention, Detection, Removal Reading: Chapter 6 CompTIA Book, Links Overview Malware Techniques for Evasion Detection/Removal
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from
More informationCSCD 303 Essential Computer Security Fall 2018
CSCD 303 Essential Computer Security Fall 2018 Lecture 10 - Malware Evasion, Prevention, Detection, Removal Reading: Chapter 6 CompTIA Book, Links Overview Malware Techniques for Evasion Detection/Removal
More informationDIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions
A DIGITAL LIFE E-GUIDE A Guide to 2013 New Year s Resolutions 2012 is coming to a close, and what better way to prepare for the year ahead than to get our New Year s resolutions straightened out? With
More informationQuick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile
More informationThe Scenes of Cyber Crime
Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES The Scenes of Cyber Crime 5 July 2011 Toralv Dirro EMEA Security Strategist, McAfee Labs Low Risk + High Profit -> Crime 500,000 Cyber
More informationFighting Spam, Phishing and Malware With Recurrent Pattern Detection
Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection
More informationWhen providing a native mobile app ruins the security of your existing web solution. CyberSec Conference /11/2015 Jérémy MATOS
When providing a native mobile app ruins the security of your existing web solution CyberSec Conference 2015 05/11/2015 Jérémy MATOS whois securingapps Developer background Spent last 10 years working
More informationA Framework for Evaluating Mobile App Repackaging Detection Algorithms
A Framework for Evaluating Mobile App Repackaging Detection Algorithms Heqing Huang, PhD Candidate. Sencun Zhu, Peng Liu (Presenter) & Dinghao Wu, PhDs Repackaging Process Downloaded APK file Unpack Repackaged
More informationGet Max Internet Security where to buy software for students ]
Get Max Internet Security where to buy software for students ] Description: Features of Max Secure Internet Security 2013 Exciting, Easy to understand GUI Easy, Quick installation Get immediate protection
More informationBuilding Resilience in a Digital Enterprise
Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly
More informationPC SECURITY LABS COMPARATIVE TEST. Microsoft Office. Flash. August Remote code execution exploit. mitigations for popular applications
August 2014 PC SECURITY LABS COMPARATIVE TEST Remote code execution exploit mitigations for popular applications Microsoft Office Flash Silverlight QuickTime Internet Explorer Java Adobe Content 1. BACKGROUND...2
More informationID: Sample Name: SMS_MMS_1.0_1.apk Cookbook: defaultandroidfilecookbook.jbs Time: 14:20:20 Date: 01/12/2017 Version:
ID: 38864 Sample Name: SMS_MMS_1.0_1.apk Cookbook: defaultandroidfilecookbook.jbs Time: 14:20:20 Date: 01/12/201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information
More informationCHECK POINT SANDBLAST MOBILE BEHAVIORAL RISK ANALYSIS
CHECK POINT SANDBLAST MOBILE BEHAVIORAL RISK ANALYSIS AN ADVANCED APPROACH TO COMPREHENSIVE MOBILE SECURITY Accurate threat detection and efficient response are critical components of preventing advanced
More informationSecuring the SMB Cloud Generation
Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking
More informationDownload firefox with virus protection
P ford residence southampton, ny Download firefox with virus protection 3-11-2015 Protect your devices with the best free antivirus on the market. Download Avast antivirus and anti-spyware protection for
More informationProactive Protection Against New and Emerging Threats. Solution Brief
Proactive Protection Against New and Emerging Threats Solution Brief Executive Summary With new and variant strains of malware emerging at an unprecedented rate, heuristic malware detection has become
More informationAndroid security enforcements
Android security enforcements Hello DroidCon! Javier Cuesta Gómez Android Engineer manager @Grab Android 2017 security 450 reports $1.1 payout The most difficult OWASP security risks: Unintended data leakage
More informationInvestigating the Effectiveness of Obfuscation Against Android Application Reverse Engineering. Rowena Harrison. Technical Report
Investigating the Effectiveness of Obfuscation Against Android Application Reverse Engineering Rowena Harrison Technical Report RHUL MA 2015 7 4 March 2015 Information Security Group Royal Holloway University
More informationMOBILE THREAT LANDSCAPE. February 2018
MOBILE THREAT LANDSCAPE February 2018 WHERE DO MOBILE THREATS COME FROM? In 2017, mobile applications have been a target of choice for hackers to access and steal data, with 86% of mobile threats coming
More informationManually Remove Of Xp Internet Security Protect
Manually Remove Of Xp Internet Security Protect McAfee Family Protection McAfee Internet Security NOTE: To determine which McAfee Security software version you have installed, You must uninstall your McAfee
More informationRemove Mcafee Antivirus Plus 2013 Link Version For 90 Days
Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days Meanwhile McAfee Antivirus Plus insisted that my AV subscription expired, and I am getting tech help to remove it and put Microsoft essentials
More informationID: Sample Name: YNtbLvNHuo Cookbook: defaultandroidfilecookbook.jbs Time: 14:44:34 Date: 12/01/2018 Version:
ID: 42511 Sample Name: YNtbLvNHuo Cookbook: defaultandroidfilecookbook.jbs Time: 14:44:34 Date: 12/01/2018 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information
More informationNHS South Commissioning Support Unit
NHS South Commissioning Support Unit ICT Anti-virus Policy This document can be made available in a range of languages and formats on request to the policy author. Version: Ratified by: V.2.1 Alliance
More informationEnterprise Ready. Sean Yarger. Sr. Manager, Mobility and Identity. Making Android Enterprise Ready 1
Making Enterprise Ready Sean Yarger Sr. Manager, Mobility and Identity Making Android Enterprise Ready 1 Enterprise Benefits of Android Java-based, get up and running with ease Open source, no license
More informationCyber Security Guide for NHSmail
Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationQuick Heal Total Security
For secure online banking, smooth Internet surfing, and robust protection for your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware
More informationMRG Effitas Online Banking Browser Security Assessment Project Q Q1 2014
MRG Effitas Online Banking Browser Security Assessment Project Q3 2013 - Q1 2014 1 Contents Introduction... 3 The Purpose of this Report... 3 Tests Employed... 3 Security Applications Tested... 4 Methodology
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationManual Removal Norton Internet Security Won't Open Or
Manual Removal Norton Internet Security Won't Open Or Dec 3, 2014. Finally during the reinstall - I had to delete a key to get a new key other wise I would I have it shown on the prgrams and features -
More informationTrend Micro SMB Endpoint Comparative Report Performed by AV-Test.org
Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org A test commissioned by Trend Micro and performed by AV-Test GmbH Executive Summary In May of 2011, AV-Test.org performed endpoint security
More informationAndroid Malware: they divide, we conquer
Android Malware: they divide, we conquer Igor Muttik *, Irina Mariuca Asavoae ** J. Blasco ***, T.M. Chen ***, H.K. Kalutarage *****, H.N. Nguyen ****, M. Roggenbach **, S.A. Shaikh **** * - Intel Security;
More informationLatest Press Release. atlanta backpage women seeking men
corp@stantec.com Latest Press Release atlanta backpage women seeking men S 28-7-2017 It has come to my attention that Windows 10 is totally not compatible with McAfee Anti-virus protection. THOUSANDS of.
More informationHow To Remove Virus From Computer Without Using Antivirus In Windows Xp
How To Remove Virus From Computer Without Using Antivirus In Windows Xp How to remove a virus - how to clean PC and laptop of virus, spyware and other PC internet security software that includes up to
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationTechnical Report. Verifying the Integrity of Open Source Android Applications. Michael Macnair. RHUL MA March 2015
Verifying the Integrity of Open Source Android Applications Michael Macnair Technical Report RHUL MA 2015 4 4 March 2015 Information Security Group Royal Holloway University of London Egham, Surrey, TW20
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationSensible Surfing. Kingston Diocesan Convention May 4, 2014 Presented by Colleen Randall, 2 nd Vice-President, Ontario Provincial Communications Chair
Sensible Surfing Kingston Diocesan Convention May 4, 2014 Presented by Colleen Randall, 2 nd Vice-President, Ontario Provincial Communications Chair We spend so much time these days online that we often
More informationSecurity Trend of New Computing Era
Security Trend of New Computing Era Presented by Roland Cheung HKCERT Agenda Security Threat Overview Introduction of Botnet Impact of Botnet Fight Back Botnet Security Protection Scheme Security Threat
More informationMobile Malware Detection Comparison
Mobile Malware Detection Comparison REVISION HISTORY Rev. Date Comment 1.0 03/21/2011 1.Initial Release Lionic Corp. 1F-C6, No. 1, Lising 1st Road, Science- Based Industrial Park, Hsinchu City 300, Taiwan,
More informationRemove Trend Micro Titanium Internet Security Without Password
Remove Trend Micro Titanium Internet Security Without Password Uninstall Titanium Internet Security for Mac using the installer. Open the Trend Click Uninstall. Type the administrator name and password,
More information