Trustaira Blog
April 8, 2017        Trustaira Staff

As you can see in the above image, Application Processor (AP) is at core of the system of any modern mobile platform. As it is getting most of the attention from security researchers, attackers has been gradually shifting their attention to other less-attended parts such as sensors, camera or Wi-Fi & BT System on a Chip (SoC). Today we going to focus on Wi-Fi System…

Read More »

 
April 4, 2017        Trustaira Staff

Previously, there were report about infecting android devices with malware through the Apps downloaded from Android Stores.  It is only getting worse with time. Recently android devices of various vendors were found with pre-installed malware. They were discovered to be loaded with malwares pre-installed somewhere along the supply chain. Check Point Software Technologies said that it found that 38 Android handsets were infected with adware, information-stealing malware…

Read More »

 
April 4, 2017        Trustaira Staff

What is a Trojan Horse Attack? A Trojan horse, often shortened to Trojan, is a type of malware designed to provide unauthorized, remote access to a user’s computer. Suppose you are working in a Bank and you have a communication system like Viber or Whats app to communicate with other colleagues. One day a new message with Hyper Text Link came to your inbox from…

Read More »

 
March 28, 2017        Trustaira Staff

Greetings! Today were are here with the details about a very risky malware. Cyber threat landscape is changing rapidly every day. It is an undeniable fact that cyber criminals are becoming more organized, skilled and innovative as technology progresses.  These hackers are taking better strategic approaches and becoming more sophisticated and creative in their methods of attack. New attack patterns are having stealthier techniques that…

Read More »

 
March 7, 2017        Trustaira Staff

News of data breach, security leak and system vulnerability incidents have been occurring almost every day in this year. Unfortunately, here comes another BIG ONE!  On a dark web marketplace, someone is selling millions of Gmail and Yahoo accounts. These accounts include personal information such as usernames, emails and their passwords in a plain text format. In the last few months, we have heard of several…

Read More »