Security Blog
HKCERT Security Newsletter (May 2014 Issue)
May 2014 Issue of Security Newsletter is available now: /my_url/en/newsletter/1405 Cover Story Impacts and Response to Heartbleed Vulnerability Beware of Encryption Ransomware, Do data protection now Hot Topic Hong Kong Google Play Store's Apps Security...
Release Date: 2 May 2014
1486 Views
Hong Kong Google Play Store's Apps Security Risk Report (April 2014)
Hong Kong Computer Emergency Response Team (HKCERT) Coordination Centre cooperates with the National Institute of Network and Information Security (NINIS) for detecting malicious and suspicious behaviors of Apps from the Google Play Store, in order to study the security risk of apps in the Google Play Store in Hong Kong area. NINIS provides us analyzed result, and we collate the detection result and publish security alerts to the public. In the report of April, we have downloaded 150 apps from Play Store, where 8 apps have been identified as high risk. None of them was removed from Play Store (on or before 28-April). The detail of report is shown as follow. Target scope Top 50 Free Applications in Hong Kong area Top 50 New Free Applications in Hong Kong area Top 50 Free Games in Hong Kong area Top 50 New Free Games in Hong Kong area Scanned Apps Successful downloaded and scanned: 150 apps Unable to download via the system: 50 apps Downloaded date: 5-April 2014 List of the downloaded apps: "Appendix 1" [download] Analysis Overview In this analysis, 150 apps were scanned for bad behaviors. Based on the level of security threat, the apps were divided into 2 categories: apps with malicious and apps with suspicious behaviors. Malicious behavior refers to apps having malicious purpose explicitly, which could cause direct harm to systems and users' interests. Suspicious behavior refers to apps having behavior, which could cause direct harm to systems and users' interests, but no malicious behavior can be explicitly identified. 1. Scanning Result Among the 150 scanned apps, 8 apps were identified as security high risk. These 8 Apps were identified with the following high risk behavior signatures Android.Trojan.Generic, Android.Adware.AirPush.A, ApplicUnwnt, Android.Adware.Domob, Android.Adware.LeadBolt, Android.Adware.Waps.l.Gen and Android/AdLoad.B.Gen, etc. List of security high risk apps Application High risk behavior signature / Ad plug-in Malware detection ratio by VirusTotal Status # 1. 千寻影视HD v1.2.2 Category: Top Free Applications Installs: >250,000 High risk behavior description: Obtain SIM serial number, obtain SIM status, read phone number, connect to the Internet, call camera application, make phone call, and send out phone information. AndroidOS.Domob Adware/ANDR.Waps.I.Gen 8/50 [Link] Available on play store 2. PPS影音(HD版) v1.6.1 Category: Top Free Applications Installs: >250,000 High risk behavior description: Obtain SIM serial number, obtain SIM status, connect to the Internet, call...
Release Date: 28 Apr 2014
2822 Views
Favourite Security Reads of the Week (25 Apr 2014)
Favourite Security Reads of the Week (25 Apr 2014) "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@...
Release Date: 25 Apr 2014
1440 Views
Favourite Security Reads of the Week (17 Apr 2014)
Favourite Security Reads of the Week (17 Apr 2014) "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@...
Release Date: 17 Apr 2014
1538 Views
Impacts and Response to Heartbleed Vulnerability
Content Introduction Impacts How to respond to Heartbleed Vulnerability System Administrator General Users Heartbleed Vulnerability Checking Tools Additional Information Introduction On 8th April 2014, there were numerous reports about OpenSSL Heartbleed vulnerability on information security websites globally. HKCERT published a security...
Release Date: 15 Apr 2014
5233 Views
Beware of Encryption Ransomware, Do data protection now
What is "Encryption Ransomware"? Encryption Ransomware attacks victims through phishing emails. Once infected, the malware encrypts not only the files located in the affected machines, but also the files shared on the connected network drive. The malware demands payment for a...
Release Date: 14 Apr 2014
3932 Views
Favourite Security Reads of the Week (11 Apr 2014)
Favourite Security Reads of the Week (11 Apr 2014) "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@...
Release Date: 11 Apr 2014
1444 Views
Favourite Security Reads of the Week (4 Apr 2014)
Favourite Security Reads of the Week (4 Apr 2014) "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to [email protected]. Below is the Favourite Security Reads of this Week. 1. 42 days to go for XP - 8 tips if you aren't going to make it (Naked Security, 1 Apr 2014) [Editor: HKCERT has set a webpage dedicated to Windows XP end of support.] 2. Malware uses Your Phone to generate virtual currency for cybercriminals (E Hacking News, 28 Mar 2014) 3. Twelve sources of global cyber attack maps (SSeguranca, 21 Mar 2014) 4. [資安小常識] 淺談公有雲和私有雲的資安考量 (台灣微軟資安部落格,21 Mar 2014) [Editor: You may refer to this latest HKCERT blog - Cloud Storage Security...
Release Date: 4 Apr 2014
1666 Views
HKCERT Security Newsletter (April 2014 Issue)
April 2014 Issue of Security Newsletter is available now: /my_url/en/newsletter/1404 Cover Story Cloud Storage Security Guidelines Data Protection Guideline Hot Topic Hong Kong Google Play Store's Apps Security Risk Report (March 2014) Favourite Security...
Release Date: 1 Apr 2014
1220 Views
Cloud Storage Security Guidelines
In light of the rapid development of the Internet and the popularity of mobile devices, the demand in cloud storage continuously increases. Cloud storage has no geographical restriction, making the service available around the globe; plus that the requirement in information security differs in every country...
Release Date: 31 Mar 2014
1649 Views