Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a variety of widely-used hobbyist drones and make them do your bidding. Why are such tools necessary As any technology, flying drones could be put to good use or can be misused to enable crimes and endanger the public and/or individuals. Terror attacks via drones, smuggling contraband into prisons, spying on … More
Source: helpnetsecurity

Though the majority of gaming companies prohibit the real-money trading of online gaming currencies, the practice is still widespread, and according to Trend Micro researchers, the money that cybercriminals earn through it is used to mount DoS attacks, spam campaigns, perpetrate identity theft and financial fraud against a variety of business and organizations, and so on. Until players stop trying to buy in-game currencies, cybercriminals will try to get it and sell it. And while … More
Source: helpnetsecurity

When Check Point researchers unearthed more than 40 apps on Google Play (and 400 on third party app stores) infected with the so-called DressCode malware in late October, it was just the tip of the iceberg. Trend Micro researchers have announced last week that the company has found at least 3,000 trojanized apps containing the malware, more than 400 of which were offered on Google Play (and some of which have been downloaded by hundreds … More
Source: helpnetsecurity