BUGAT TROJAN JOINS THE MOBILE REVOLUTION
|
|
- Erica Miller
- 8 years ago
- Views:
Transcription
1 BUGAT TROJAN JOINS THE MOBILE REVOLUTION June 2013 RSA researchers analyzing Bugat Trojan attacks have recently learned that Bugat s developers managed to develop and deploy mobile malware designed to hijack out-of-band authentication codes sent to bank customers via text messages. Bugat (aka: Cridex) was discovered and sampled in the wild as early as August This privately-owned crimeware s earlier targets were business and corporate accounts, its operators attempting high-value transactions ($100K-$200K USD per day) in both automated and manual fraud schemes. It is very likely that Bugat s operators started seeing a diminished ability to target high-value accounts due to added authentication challenges, forcing them to resort to developing a malware component that is already used by many mainstream banking Trojans in the wild. BITMO: A LITTLE LATE IN THE GAME? In somewhat tardy fashion, Bugat joins the lineup of banking malware that makes use of SMS capturing mobiles apps. The first occurrences of such malware were observed in use by Zeus and SpyEye Trojan variants, which were respectively dubbed ZitMo and SPitMo (Zeus-in-the-Mobile, SpyEye-in-the-Mobile). In mid-2012, RSA coined the name CitMo to denote the Citadel breed of in-the-mobile activity. The fourth Trojan for which malicious apps were discovered was Carberp in early 2013, and with this case, Bugat is the most recent banking Trojan to have its own SMS-forwarding app, now coined BitMo. WEB INJECTIONS PAVE THE ROAD Among other banking Trojan features, Bugat comes with a set of HTML injections for online banking fraud and possesses Man-in-the-Browser script functionality. This very feature is what allows it to interact with victims in real time and lead them to download FRAUD REPORT
2 the BitMo mobile malware to their Android/BlackBerry/Symbian devices. ios remains almost entirely exempt from this type of malware since the Apple policy limits app downloads from third party sites. Bugat s operators are not doing anything novel. Much as observed in the case of Citadelin-the-Mobile (which emerged in May 2012), the malware s developers created classic web injections, albeit very visually-appealing, designed to show up on the client-side and communicate social engineering messages to the victim. When Bugat-infected online banking customers access their financial provider s login page, the Trojan is triggered to dynamically pull a relevant set of injections from the remote server, displays them to the victim and leads them to the BitMo download under the guise of AES encryption being adopted by the bank. The malware requests application permissions linked with the SMS relay, while the next injection on the PC side requests that the victim enter a code appearing on the mobile device connecting the infected PC and the mobile handset. Once installed and deployed BitMo begins hijacking and concealing incoming text messages from the bank, disabling the phones audio alerts, and forwarding the relevant messages to its operators drop zones. Bugat s entrance to the mobile space only demonstrates the increasing use of SMS-forwarders as part of Trojan-facilitated fraud. IN-THE-MOBILE MALWARE EVERYWHERE Although the injection set created by Bugat s developers, as well as the distribution mechanism designed for delivering APKs/BlackBerry OS BitMo apps are indeed sophisticated, the actual malware apps are rather basic and show no innovation. That being said, it is very clear that all banking Trojans, both commercial and privately operated codes, are increasingly making use of SMS-forwarders in their criminal operation. page 2
3 Phishing Attacks per Month RSA identified 36,966 phishing attacks launched worldwide in May, marking a 37% increase in attack volume. Trending data shows that a rise in phishing attacks typically occurs in Q May Jul 12 Jun Aug Nov 12 Oct 12 Sep Dec 12 Jan Feb May 13 Apr 13 Mar 13 Source: RSA Anti-Fraud Command Center 400 Number of Brands Attacked In May, 351 brands were targeted in phishing attacks, marking a 13% increase. Two new entities suffered their first attack in May May Jun Jul Aug Sep Oct Nov Dec Jan Feb 13 Mar Apr May 13 Source: RSA Anti-Fraud Command Center page 3
4 US Bank Types Attacked U.S. nationwide banks maintained the highest volume of phishing in May while regional banks saw a 7% increase in phishing volume, from 12% to 19%. Since February, the attack volumes targeting regional banks and credit unions have fluctuated quite a bit % 10% 11% 11% 9% 9% 12% 6% 15% 8% 17% 15% 8% 18% 12% 15% 15% 14% 14% 9% 15% 15% 23% 23% 12% 19% 62% 78% 74% 74% 77% 77% 79% 79% 70% 69% 60% 73% 73% Source: RSA Anti-Fraud Command Center May 13 Apr 13 Mar 13 Feb 13 Jan 13 Dec 12 Nov 12 Oct 12 Sep 12 Aug 12 Jul 12 Jun 12 May 12 a Australia South Korea Canada China Germany UK India 4% Top Countries by Attack Volume The U.S. remained the country most targeted by phishing in May, absorbing 50% of the total phishing volume. The UK held steady, once again recording 11% of attack volume. South Africa, the Netherlands, Canada, Australia, and India accounted for about one-quarter of attack volume. Australia 5% Canada 5% Netherlands 5% South Africa 5% United Kingdom 11% U.S. 50% 50 Other Countries 15% page 4
5 a US S Africa China Italy Canada Netherlands India Bra Top Countries by Attacked Brands Canada 4% Brazil 4% France 4% China 4% 50 Other Countries 39% U.S. brands remained the most targeted by phishing among worldwide brands, absorbing 30% of phishing volume in May. UK brands were targeted by one-tenth of phishing volume followed by India, China and Brazil. India 6% United Kingdom 9% U.S. 30% US S Africa China Canada 3% Netherlands 4% France 3% Italy Canada Netherlands India B Top Hosting Countries The U.S. remained the top hosting country in May, hosting 47% of global phishing attacks. Germany was the second top hosting country with 8% of attacks hosted within the country, followed by the UK, the Netherlands, France, and Canada. United Kingdom 5% Germany 8% U.S. 47% 61 Other Countries 30% page 5
6 CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller or visit us at EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective holders. JUN RPT 0613
How To Get Rid Of A Phish Locker On A Computer (For A Bank)
PHISH LOCKERS OUT IN THE WILD August 2013 RSA researchers have been increasingly witnessing the activity of highly targeted Trojans, dubbed Phish Lockers, used at the hands of cybercriminals to steal credentials.
More informationPHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD
PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD April 2013 As cybercriminals will have it, phishing attacks are quite the seasonal trend. It seems that every April, after showing a slight decline
More informationEMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information
More informationDNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS
DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS December 2011 November saw DNS Poisoning, aka Pharming, making the headlines on more than one occasion: To name a few, the online threat
More informationCITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS May 2012 As of April 30th, 2012 the Citadel Trojan was at its fourth upgrade with Version 1.3.4.0 already in the hands of its customers. Citadel s features, bug
More informationBEHIND THE SCENES OF A FAKE TOKEN MOBILE APP OPERATION
BEHIND THE SCENES OF A FAKE TOKEN MOBILE APP OPERATION December 2013 In the last few years, we have seen the mobile space explode with malware. According to a recent report by Trend Micro, the number of
More informationCYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
More informationMALWARE TOOLS FOR SALE ON THE OPEN WEB
MALWARE TOOLS FOR SALE ON THE OPEN WEB May 2014 RSA Research, while investigating a Zeus Trojan sample, discovered an additional drop server used by a fraudster who is offering a set of spyware tools for
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationProtect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationVersafe TotALL Online Fraud Protection
Versafe TotALL Online Fraud Protection Protect ALL users. From ALL malware, threat types. On ALL devices. ALL transparently to the end-user. Summary of Mobile Malware & Cross-Device Attacks Overview of
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationTransaction Anomaly Protection Stopping Malware At The Door. White Paper
Transaction Anomaly Protection Stopping Malware At The Door White Paper Table of Contents Overview 3 Programmable Crime Logic Alter Web Application Flow & Content 3 Programmable Crime Logic Defeats Server-Side
More informationSYMANTEC INTELLIGENCE REPORT NOVEMBER 2013
SYMANTEC INTELLIGENCE REPORT NOVEMBER 2013 p. 2 CONTENTS CONTENTS 3 Executive Summary 4 BIG NUMBERS 7 TARGETED ATTACKS 8 Targeted Attacks in 2013 8 Targeted Attacks per Day 8 First Attacks Logged by Month
More informationBotnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
More informationPrevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA
Prevent Malware attacks with F5 WebSafe and MobileSafe Alfredo Vistola Security Solution Architect, EMEA Malware Threat Landscape Growth and Targets % 25 Of real-world malware is caught by anti-virus Malware
More informationThe dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
More informationPhishing Activity Trends Report for the Month of December, 2007
Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease
More informationComputer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance
Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance Presentation for the Seventh European Academic Conference on Internal Audit
More informationProtecting Against Online Fraud with F5
Protecting Against Online Fraud with F5 Fraud is a relentless threat to financial services organizations that offer online banking. The F5 Web Fraud Protection solution defends against malware, phishing
More informationDragonfly: Energy Companies Under Sabotage Threat Symantec Security Response
Dragonfly: Energy Companies Under Sabotage Threat Symantec Security Response Dragonfly: Western Energy Companies Under Sabotage Threat 1 What is Dragonfly? Ongoing cyberespionage campaign Targeting the
More informationDeep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
More informationPhishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud
1 st Half 2009 Committed to Wiping Out Internet Scams and Fraud January June 2009 Phishing Report Scope The quarterly APWG analyzes phishing attacks reported to the APWG by its member companies, its Global
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received by the (APWG) came to 23,61 in, a drop of over 6, from January s previous record
More informationDeep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
More informationCurrent counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
More informationHow To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)
Plugging the Holes in Mobile Security: The Rising Threat Jennifer M. Pigg, VP of Research, Yankee Group Nick Wade, Group Product Manager, Symantec June 2011 Copyright 2011. Yankee Group Research, Inc.
More informationUpdate on the Latest Developments of the Madrid System Madrid Working Group Roundtable
Update on the Latest Developments of the Madrid System Madrid Working Group Roundtable Asta Valdimarsdottir Director Operations Division Madrid Registry Geneva Ocotber 23, 2014 Main points 2013 2014 Figures
More informationPhishing Activity Trends Report June, 2006
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
More informationAgenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2
Mobile Security Agenda John Veldhuis, Sophos The playing field Threats Mobile Device Management Pagina 2 The Changing Mobile World Powerful devices Access everywhere Mixed ownership User in charge Powerful
More informationUsing big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
More informationMulti Factor Authentication Security Beyond Usernames and Passwords. Brian Marshall Vanguard Integrity Professionals go2vanguard.
Multi Factor Authentication Security Beyond Usernames and Passwords Brian Marshall Vanguard Integrity Professionals go2vanguard.com About Vanguard Founded: 1986 Business: Cybersecurity Experts for Large
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationThe Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
More informationTHE CURRENT STATE OF CYBERCRIME 2013
THE CURRENT STATE OF CYBERCRIME 2013 An Inside Look at the Changing Threat Landscape Cybercrime continues to diverge down different paths with each new year that passes. In 2013, cybercriminals are changing
More informationDeployment Guide Mar-2016 rev. a. Integrating the Array Standalone Client with RSA Token Automation
Deployment Guide Mar-2016 rev. a Integrating the Array Standalone Client with RSA Token Automation Table of Contents 1 Introduction... 2 2 Install the RSA SecurID Token Client... 3 3 Import the Token File
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationKASPERSKY LAB REPORT. Financial cyber threats in 2013
KASPERSKY LAB REPORT Financial cyber threats in 2013 April 2014 2 Kaspersky Lab Report: Financial cyber threats in 2013 TABLE OF CONTENTS Introduction. Money and risks in a multi-device world 3 Methodology
More informationCENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
More informationCAFIS REPORT 2015.10
CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card
More informationFigure 1: A screenshot of a known Zeus variant called Citadel
Title: Online Data Theft and ZeuS Dropzones (WORKING PAPER) By: Steve Chon, Roderic Broadhurst Organisation: ANU Cybercrime Observatory, Australian National University Website: http://cybercrime.anu.edu.au
More informationFive Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
More informationConsumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
More informationWhite paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
More informationKASPERSKY FRAUD PREVENTION PLATFORM COVERING ONLINE AND MOBILE BANKING RISKS
KASPERSKY FRAUD PREVENTION PLATFORM COVERING ONLINE AND MOBILE BANKING RISKS ONLINE PAYMENTS ARE VERY POPULAR BUT NOT SECURE of people regularly use online banking, online shopping or 98% e-payment services
More informationExecutive Summary. McAfee Labs Threats Report: Third Quarter 2013
Executive Summary McAfee Labs Threats Report: Third Quarter Although summer can be a relatively slow season for cybercriminal activity (even the bad guys need a break occasionally), the third quarter of
More informationINTELLIGENCE DRIVEN FRAUD PREVENTION
INTELLIGENCE DRIVEN FRAUD PREVENTION OVERVIEW If you were in business 15 years ago, the term cybercrime was just hitting the mainstream and cyber criminals were transitioning from showing off technical
More information場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationGlobal Equity Trading Volumes Surge 36% in 1 st half 2015 driven by Mainland China
Global Equity Trading Volumes Surge 36% in 1 st half 215 driven by Mainland China Global Equity Trading Volumes Ex Mainland China Up 5% Mainland China Share Trading Vols Rise 166% in H1 215 vs H2 214 The
More informationThe Mobile Malware Problem
The Mobile Malware Problem Eddy Willems Security Evangelist G Data Security Labs Director Security Industry Relationships - EICAR eddy.willems@gdata.de Introduction Security Evangelist at G Data: Privately
More informationHow To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
More informationProtecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
More informationopennms reporting generation tool
opennms reporting generation tool Juan Pedro Escalona DevOps Southampton, UK - 2014 Juan Pedro Escalona DevOps / Systems Administrator with over 6 years experience administering different OS, network systems
More informationStanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University
Abuse and Prevention Stanford University Stanford Computer Security Lab TrackBack Spam: Introduction Many users nowadays post information on cloud computing sites Sites sometimes need to link to each other
More informationApples Review of 2012/13 season Prognosfruit - Congress 2013 Helwig Schwartau, AMI
Apples Review of 2012/13 season Prognosfruit - Congress 2013 Helwig Schwartau, AMI Market balance for table apples in EU-27 1.000 tons 2009/10 2010/11 2011/12 2012/13f Market production 10.984 9.651 10.663
More informationDividends Tax: Summary of withholding tax rates per South African Double Taxation Agreements currently in force Version: 2 Updated: 2012-05-22
Dividends Tax: Summary of withholding tax rates per South African Double Taxation Agreements currently in force Version: 2 Updated: 2012-05-22 Note: A summary of the rates and the relevant provisions relating
More informationComputing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified
More informationThursday, September 15, 2011
The Smartphone Revolution 2011 is the Year of Smartphones (Gartner) Gadgets Americans intend to buy in 2011 1) Smartphone 2) Laptop 3) Desktop PC 4) Mobile handset (other than Smartphone) 5) E-Book reader
More informationDeep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
More informationAttack Intelligence Research Center Monthly Threat Report MalWeb Continues to Make Waves on Legitimate Sites
Attack Intelligence Research Center Monthly Threat Report MalWeb Continues to Make Waves on Legitimate Sites A l a d d i n. c o m / e S a f e Following up on some recent attacks, the AIRC team wanted to
More information2012 Bit9 Cyber Security Research Report
2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by
More informationInternational Telecommunication Union. ITU Internet Report 2006 SUMMARY
International Telecommunication Union digital.lifelife ITU Internet Report 2006 SUMMARY This ITU Internet Report, the eighth in the series, has been produced by a team from the ITU Strategy and Policy
More informationProposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre
Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre Proposal To change the opening hours of the Revenues & Benefits Call Centre to 9am until 5pm Monday to Friday with effect
More informationHACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success
HACKER INTELLIGENCE INITIATIVE The Secret Behind 1 1. Introduction The Imperva Application Defense Center (ADC) is a premier research organization for security analysis, vulnerability discovery, and compliance
More informationChoosing a Cell Phone Plan-Verizon
Choosing a Cell Phone Plan-Verizon Investigating Linear Equations I n 2008, Verizon offered the following cell phone plans to consumers. (Source: www.verizon.com) Verizon: Nationwide Basic Monthly Anytime
More informationParticipatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets
Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets Pasquale Stirparo (@pstirparo) Laurent Beslay www.jrc.ec.europa.eu Serving society Stimulating innovation Supporting legislation
More informationOPERATIONS SERVICE UPDATE
OPERATIONS SERVICE UPDATE EXECUTIVE SUMMARY Policy Processing At the June 24 Citizens Board of Governors meeting, Staff committed to achieving year end policy processing service goals by September 1, 24.
More informationKaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
More informationwebmethods Mobile Designer June 2011
webmethods Mobile Designer June 2011 Agenda Software AG Mobile Strategy Introduction to Metismo Value Proposition How to identify customers and engage Questions Feb 2011 - Forrester asked 80 Companies:
More information2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
More informationPhishing Activity Trends Report. 1 st Half 2011. Unifying the. Global Response To Cybercrime
1 st Half 2011 Unifying the Global Response To Cybercrime January June 2011 Phishing Report Scope The APWG analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners,
More informationDetailed guidance for employers
April 2015 3 Detailed guidance for employers Appendix A: Pay reference periods This document accompanies: Detailed guidance no. 3 Assessing the workforce Pay reference period calendars where the definition
More informationIBM Security Systems Trends and IBM Framework
IBM Security Systems Trends and IBM Framework Alex Kioni CISSP, CISM, CEH, ITILv3 Security Systems Lead Technical Consultant Central, East & West Africa Region 1 Agenda IBM X-Force 2013 Mid Year Trend
More information2015 Annual Report. How many phones have been added to GARI?
Annual Report 2015 The Global Accessibility Reporting Initiative in 2015 BACKGROUND Since the Global Accessibility Reporting Initiative (GARI) was established in 2008 by the Mobile Manufacturers Forum
More informationWorking Holiday Maker visa programme report. 31 December 2014
Working Holiday Maker visa programme report 31 December 2014 Contents Page About this report 1 Enquiries 1 Definition of terms 2 Background to the Working Holiday Maker programme 3 Recent developments
More informationThe Japanese Experience Countering Spam ITU TELECOM WORLD 2006
The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 8th December 2006 Shuji Sakuraba Copyright 2006 Present condition of spam in Japan - I 2004 Media Sent to mobiles 66 % Sent to PCs 34 % 2005
More informationSophos Mobile Security Threat Report. Launched at Mobile World Congress, 2014. By Vanja Svajcer, Principal Researcher, SophosLabs
Launched at Mobile World Congress, 2014 By Vanja Svajcer, Principal Researcher, SophosLabs Contents Introduction...1 Huge Growth in Smartphones and Tablets...1 Fig. 1 Cumulative Android Malware Samples
More informationPRELIMINARY STEEL IMPORTS INCREASE 17% IN JANUARY Import Market Share 32% in January
News Release FOR IMMEDIATE RELEASE February 25, 2015 CONTACT: Lisa Harrison 202.452.7115/ lharrison@steel.org PRELIMINARY STEEL IMPORTS INCREASE 17% IN JANUARY Import Market Share 32% in January Washington,
More informationG DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: 4,900 new Android malware samples every day 04-04 Half of Android malware is
More informationTapping into the Lucrative China Market with an Omni-Channel Strategy. Frankie Ho General Manager
Tapping into the Lucrative China Market with an Omni-Channel Strategy Frankie Ho General Manager A GENDA v China Digital Landscape & Latest Marketing Trends v Embracing the Mobile Age v Connect with Your
More informationInternational Mobile Phone Top Up For Consumers & Merchants
International Mobile Phone Top Up For Consumers & Merchants March 2015 What is CY.SEND? CY.SEND is an international prepaid mobile phone top up provider located in Switzerland for consumers and merchants.
More informationWe Manage Mobility. www.soti.net. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances balhar@soti.
We Manage Mobility Manage Secure Support Monitor Track Balhar Dosangh Director, Strategic Alliances balhar@soti.net www.soti.net MOBILE DEVICE MANAGEMENT THE LANDSCAPE WE PREDICT THROUGH 2017, 90% OF
More informationDigital Forensic analysis of malware infected machine Case study ***
Abstract Digital Forensic analysis of malware infected machine Case study Amulya Podile, Keerthi G & Krishna Sastry Pendyala# Incident Response & Malware Analysis Unit, Digital Forensics CoE, Tata Consultancy
More informationThe Central Role of Energy Efficiency in the Energy Outlook and EIA s Energy Data Program
The Central Role of Energy Efficiency in the Energy Outlook and EIA s Energy Data Program For MIT Energy Initiative Symposium May 12, 2014 Cambridge, MA By Howard Gruenspecht, Deputy Administrator U.S.
More informationA!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!
ATeamCymruEISReport:GrowingExploitationofSmall OfCiceRoutersCreatingSeriousRisks PoweredbyTeamCymru sthreatintelligencegroup Page 1of 14www.team-cymru.com www.team-cymru.com Threat'Intelligence'Group EXECUTIVE
More informationGlobal Branding Task Force Conference Call Agenda: Monday, 27 August 2007 Intl: +1-706-679-3490 Canada/US: 1-877-523-6692 Pass code: 656622#
Global Branding Task Force Conference Call Agenda: Monday, 27 August 2007 Intl: +1-706-679-3490 Canada/US: 1-877-523-6692 Pass code: 656622# Sydney, 21.00h; Hong Kong, 19.00h; Jakarta, 18.00h; Johannesburg,13.00h;
More informationUPDATE ON CURRENT MACRO ENVIRONMENT
1 Oct 213 Macro & Strategy Equity Credit Commodities 13 13 #1 Global Strategy #1 Multi Asset Research #3 Global Economics #2 Equity Quant #2 Index Analysis #3 SRI Research 12 sector teams in the Top 1
More information4 edition. LUxURY TRAVEL TRENDS. march 2014
march 2014 WHO WE ARE p 3 THE STUDY p 4 MARKET p 6 LERS PROFILE CONCLUSION p16 p24 The Pangaea Network Who we are Pangaea Network is an international organization of independent agencies offering consultancy,
More informationOnline security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.
Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity
More informationWorking Holiday Maker visa programme report
Working Holiday Maker visa programme report 30 June 2015 This page is left blank intentionally. Table of Contents About this report 1 Enquiries 1 Definition of terms 2 Background to the Working Holiday
More informationTop 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
More informationBILD and WELT: Two successful Paid Content Strategies Capital Markets Day Berlin, December 10, 2014. Donata Hopfen, Publishing Director BILD Group
BILD and WELT: Two successful Paid Content Strategies Capital Markets Day Berlin, December 10, 2014 Donata Hopfen, Publishing Director BILD Group Paid content is key to Axel Springer s strategy Start of
More informationFACTS & FIGURES AUGUST 2013
AUGUST 2013 WHAT THE MARKET SAYS ABOUT AUGMENTED REALITY 1. INTRODUCTION At Layar we measure everything that we do and our customers can measure everything that they do. We use these insights to continuously
More informationWin the Internet Security War. Keep Internet Criminals Out of Your Network and Protect Your Business
Win the Internet Security War Keep Internet Criminals Out of Your Network and Protect Your Business Takeaways Cyber-criminals are using emails & social engineering to infiltrate your network Your team
More informationEMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012 This report provides information about software releases, including release dates, any announced
More information