Logitech Bluetooth Audio Adapter
Lenovo Vibe X2
Microsoft Lumia 730
Martian Notifier smartwatch
Motorola Moto 360
How offline retailers can make a comeback
6 important takeaways from Google's study on e-commerce in India
Android Lollipop vs KitKat on Nexus 4
Nokia N1 Android tablet: All you need to know
Moving ahead with Microsoft Azure
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
NotCompatible: New malware threat for Android devices
Xiaomi readies the Redmi Note for Dec 2 launch, announces a contest
100 OnePlus One India invites up for grabs via contest
Xiaomi to launch smartwatches next year?
Twitter now lets you send private tweets
Alcatel One Touch Flash
Celkon Millennia Epic Q550
Karbonn Titanium S12 Delite
Case Study: Developing a Health App for Windows 8
Case Study: Developing an augmented reality app for Intel based devices
Use Spotify, Netflix in India on your PC, Android smartphone
Overview: Implementing fast real-time GPU-based image blur algorithms
How to use Intel Perceptual Computing SDK for human-robot interface
How to upgrade your laptop or ultrabook's hard drive to an mSATA or M.2 SSD
Jolla Smartphone Review
iPhone 5S vs iPhone 6 Showdown
Samsung Galaxy Note 4 - The best phablet today
Digit's 11 hi-tech tests that gadgets fear
4 Android features erased by Lollipop update
5 great Android games launched this month
The 5 most underrated and under-hyped smartphones of 2014
5 great Android apps launched this month
The 5 most overrated and overhyped smartphones of 2014
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
Acer Aspire E5Intel Core i7 Processor, Windows 8.1 , 12 GB RAM, 1TB Hard Disk Space, 2GB GraphicsClick to know more
Peer to Peer Connection in AndroidHow to setup the peer to peer connection between two Android devices
Click to know more
According to Trend Micro's Q2 2013 security roundup report, the online banking malware saw a 29 percent increase from the previous quarter- from 113,000 to 146,000 infections. The report, released today, expresses concern over the increased online banking threats and availability of sophisticated and inexpensive malware toolkits. The report also warns users about the increasing hazards of online banking.
“We found an online banking malware that modifies an infected computer’s HOSTS file to redirect a customer of certain banks to phishing sites. We also saw more Citadel variants (detected as ZBOT) targeting different financial service institutions. These malware not only target the big banks but also smaller ones, including those that exclusively cater to online banking customers. As predicted, cybercriminals carried out developments in malware distribution and refinement for existing tools,” says Dhanya Thakkar, Managing Director, India & SAARC, Trend Micro.
According to the report, more online banking threats were seen in different countries this quarter, specifically in Brazil, South Korea, India and Japan. These highlighted the need for increased awareness of online banking security. Cybercriminals also came up with more diverse attacks that used various social engineering lures, single sign-on (SSO) and multiprotocol services, and blogging platforms for their malicious schemes.
The FAKEBANK malware spotted this quarter spoofs legitimate apps. It contains specific Android application package files (APKs), which it copies to a device’s Secure Digital (SD) card. Using the APK files, the malware displays icons and a user interface that imitates legitimate banking apps. This technique is reminiscent of PC banking Trojans that monitor users’ browsing behaviors and spoofs banking sites.
As predicted, cybercriminals have not generated completely new threats and instead opted to repackage old ones. The online banking malware volume significantly increased this quarter due in part to the rise in the ZeuS/ZBOT malware volume in the wild. Online banking threats are spreading across the globe and are no longer concentrated in certain regions like Europe and the Americas.
In the cybercriminal underground, the CARBERP source code was “leaked,” making the creation of banking Trojans even easier to do for bad guys. Meanwhile, other online banking Trojan toolkits like ZeuS, SpyEye, and Ice IX are already available for free, making it easier for any skilled hacker to obtain their source codes.
Check out the full Trend Micro's Q2 2013 security roundup report here.