Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Whitepapers

 

Mobile Threat Report Q1 2013

Mobile Threat Report Q1 2014

Mobile malware development in Q1 2014 continues to focus exclusively on the Android platform, continuing the inexorable trend we’ve seen in the last couple years. Of all the mobile app samples we collected during this period, almost 14 % were malicious Android apps (with the rest being determined as PUAs or clean).

>> View the Report (web, PDF)

>> View the Report (print-friendly, PDF)

 

Mobile Threat Report Q1 2013

Mobile Threat Report Q3 2013

The "Masterkey" vulnerability and exploit apps; banking trojans; and other notable threats and trends for mobile malware in Q3 2013.

>> Read the full report

 

Mobile Threat Report Q1 2013

Mobile Threat Report Q1 2013

While the raw amount of Android malware continues to rise significantly, it is the increased commoditization of those malware that is the more worrying trend. The Android malware ecosystem is beginning to resemble to that which surrounds Windows, where highly specialized suppliers provide commoditized malware services.

>> Read the full report

 

Mobile Threat Report Q4 2012

Mobile Threat Report Q4 2012

The rise of Android malware can be largely attributed to the operating system’s increasing foothold in the mobile market. Android’s market share has risen to 68.8% in 2012, compared to 49.2% in 2011. On the threat side, its share rose to 79% in 2012 from 66.7% in 2011.

>> Read the full report

 

Mobile Threat Report Q3 2012

Mobile Threat Report Q3 2012

Despite Android's dominance in the mobile threat landscape, the Symbian malware scene is far from dead. 21 new families and variants were discovered in the third quarter of 2012, a 17% increase compared to the second quarter.

>> Read the full report

 

Mobile Threat Report Q2 2012

Mobile Threat Report Q2 2012

After a while on the scene, Android malware has begun to explore new methods of infection. In May 2012, the first Android malware to use the drive-by download method was spotted in the wild. A simple visit to a malicious website could render a device with certain configuration infected.

>> Read the full report

 

Mobile Threat Report Q1 2012

Mobile Threat Report Q1 2012

In Q1 2012, 37 new malware families and variants were discovered, which nearly quadrupled the number of new malware discovery a year earlier, in Q1 2011. Majority of these malware reap profit from sending messages to premium-rate numbers or subscribing customers to a premium service.

>> Read the full report

 

Mobile Threat Report Q4 2011

Mobile Threat Report Q4 2011

Android malware continues to expand rapidly in the fourth quarter of 2011, with malware originating from Russia forming a significant presence in the scene. Malware seen in the Russian domain has been the most widely distributed, with a single variant alone being found on a thousand unique Android application package files (APKs).

>> Read the full report

 

 

 

 

 

Threat Report H1 2013

Threat Report H2 2013

News of alleged massive data gathering and online surveillance activities by state entities raises privacy concerns. A Tor-using botnet grows while the arrest of a suspected creator/operator upends the underground market in exploit kits; meanwhile, Android continues to dominate the mobile threat landscape.

>> Read the full report

 

Threat Report H1 2013

Threat Report H1 2013

Exploit-based attacks, particularly against the Java development platform, continue to dominate. New developments continue in mobile malware, ransomware, Mac malware and phishing, as Bitcoin comes of age. Meanwhile, hacks and intrusions aimed at tech companies gain major mainstream press.

>> Read the full report

 

Threat Report H2 2012

Threat Report H2 2012

The report focuses on three things that stood out in the second half of 2012: botnets (with special reference to ZeroAcess), exploits (particularly against the Java development platform) and banking trojans (Zeus). Also discussed are multi-platform attack in which a coordinated attack campaign is launched against both desktop and mobile platforms, state of today's web concerning malware hosting and malvertising, and an update on the mobile threat scene.

>> Read the full report

 

Threat Report H1 2012

Threat Report H1 2012

One of the most pervasive trends we saw in the computer threat landscape in the first half of 2012 was the expanding usage of vulnerability exploitation for malware distribution. This phenomenon is directly tied to the recent improvement in exploit kits - toolkits that allow malware operators to automatically create exploit code.

>> Read the full report