In an article published in March, we were informing you about the risks behind malicious clones of popular applications. Five months later, impostor apps are still trying to access our data and to target more users.
Overlay malware allows attackers to create an overlay to be displayed on top of legitimate Android applications. The overlay mimics the real app UI (User Interface) to trick users into entering sensitive data into a fake window that will collect and forward them to a remote attacker.
From Banking to Gaming, the preferred channel to access our favorite services is decidedly via mobile applications. Ensuring those Apps security, comes with a series of challenges.
Currently, the likelihood to find vulnerability in a mobile app is high, and hackers, well aware of this fact, keep trying new techniques to access corporate and personal data through apps.
Summer is here and employees will be going on holiday soon. While some of them will totally disconnect, some others will continue to read their work emails or to check their corporate applications from wherever they are. That is when things go wrong usually.
Pradeo’s Tech team just released its biannual Mobile Applications Threats Review for S1 2017, based on a sample of 1.5 million most recent single applications processed by Pradeo’s engine. Here are some figures resulting from the study. Read the full report here for free.