A new release of SEAP and MORE mobile SDK is now available for both iOS and Android. Versions 2.1.9 for iOS and 2.3.6 for Android include several upgrades offering better performances, lower resource consumption and improved stability. Customers should have already received the download link to obtain the new version. Contact us for more [...]
Thanks to all who stopped by at the booth and met us. Weren’t you at RSA Conference? Here's the opportunity to download our company overview with the main topics addressed during the event.
This document describes the evolution and trends in Android malware behaviour with a focus on the financial context. After an initial contextualisation and an explanation of the usual anatomy of a mobile malware attack, the current landscape is presented with some interesting statistics. In conclusion, the MORE® malware engine is introduced explaining the benefits of [...]
Android malware is on the rise along with the popularity of Android OS. Malware writers are using novel techniques to create malicious Android applications which severely undermine the capability of traditional malware detectors which are ineffective towards detecting these unknown malicious applications. One of the last malware discovered, dubbed Expensive Wall, has infected about 21 [...]
The analysed malware, internally baptised as PowerFakeToken, has been identified to belong to the Android/FakeToken.A family. In a nutshell, the mentioned malware family pretends to be a mobile token generator, typically used for transaction validation in online banking systems, but in fact it is an application whose purpose is to steal sensitive credentials to perform [...]
What happens when a malware code is sold on underground board by black-hat vendors to fraudsters buyers? A source code leaked and a massive attack happened. This is what happened in December 2015, when the source code for the Android malware GM Bot, developed to perpetrate mobile banking frauds, was leaked by buyers and sold for free [...]