Karbonn Titanium Mach One
Sennheiser Momentum In-Ear headphones review
Tonino Lamborghini 88 Tauri
Sigma DP2 Quattro digital camera
Creative MUVO mini
First Impressions: Lenovo Yoga 3 Pro
An overview of Digiflip Pro tablets
App of the Week: Frankly.Me
Don Bosco Institute of Technology hosts Teknack, an online tech fest
Why Sony is exiting smartphone business
Don't read this, lest you get offended!
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Samsung Galaxy S6 and S6 Edge are now official
HTC One M9 unveiled at MWC 2015
Google withdraws ban on 'explicit' adult content on Blogger
Karbonn Titanium Dazzle smartphone launched at Rs 5,490
The new Blackberry Classic does not have a camera, costs $400
Samsung Galaxy S Duos 3 -VE
Salora Arya Z3
Micromax Bolt Q324
Motorola Moto E Gen 2
Karbonn Titanium Dazzle
How to use Intel XDK plugins for Sublime Text
Intel XDK Update - HTML5 Games, Sublime Text* & Easier to Get Started
Steps to add x86 support to Android Apps Using Unity
3 easy steps for maximum performance for your Android emulator (Intel HAXM)
How does your GPU affect your image blur algorithms
Fly Snap Smartphone First Impression
Fly Qik+ Smartphone: First Impression
Lenovo Yoga 3 Pro Ultrabook
Wowsome Augmented Reality mobile app
15 top displays in tech products today
10 smartphones launched so far in Feb 2015
At a glance: Digiflip Pro range of tablets from Flipkart
Moto E (2015): An Overview
Best FPS games for mobile phones
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
According to Trend Micro's Q2 2013 security roundup report, the online banking malware saw a 29 percent increase from the previous quarter- from 113,000 to 146,000 infections. The report, released today, expresses concern over the increased online banking threats and availability of sophisticated and inexpensive malware toolkits. The report also warns users about the increasing hazards of online banking.
“We found an online banking malware that modifies an infected computer’s HOSTS file to redirect a customer of certain banks to phishing sites. We also saw more Citadel variants (detected as ZBOT) targeting different financial service institutions. These malware not only target the big banks but also smaller ones, including those that exclusively cater to online banking customers. As predicted, cybercriminals carried out developments in malware distribution and refinement for existing tools,” says Dhanya Thakkar, Managing Director, India & SAARC, Trend Micro.
According to the report, more online banking threats were seen in different countries this quarter, specifically in Brazil, South Korea, India and Japan. These highlighted the need for increased awareness of online banking security. Cybercriminals also came up with more diverse attacks that used various social engineering lures, single sign-on (SSO) and multiprotocol services, and blogging platforms for their malicious schemes.
The FAKEBANK malware spotted this quarter spoofs legitimate apps. It contains specific Android application package files (APKs), which it copies to a device’s Secure Digital (SD) card. Using the APK files, the malware displays icons and a user interface that imitates legitimate banking apps. This technique is reminiscent of PC banking Trojans that monitor users’ browsing behaviors and spoofs banking sites.
As predicted, cybercriminals have not generated completely new threats and instead opted to repackage old ones. The online banking malware volume significantly increased this quarter due in part to the rise in the ZeuS/ZBOT malware volume in the wild. Online banking threats are spreading across the globe and are no longer concentrated in certain regions like Europe and the Americas.
In the cybercriminal underground, the CARBERP source code was “leaked,” making the creation of banking Trojans even easier to do for bad guys. Meanwhile, other online banking Trojan toolkits like ZeuS, SpyEye, and Ice IX are already available for free, making it easier for any skilled hacker to obtain their source codes.
Check out the full Trend Micro's Q2 2013 security roundup report here.