September 5, 2016 By Michael Ambrose 2 min read

August has been an eventful month for mobile security. We saw product launches, new threats and some snippets providing insight into upcoming trends. Here is a roundup of the top five headlines from last month.

Apple Cuts Down Trident Exploits With Security Update

This news made headlines all across the world. Although most publications spun a negative side of this story, I prefer to see the glass half-full.

So what happened here? Miscreants were trying to jailbreak devices through a malicious link delivered through a text message. But this attack was aimed at delivering a notorious spyware, Pegasus, which has been used for high-level corporate espionage.

This attack was three-pronged, thus the new name Trident. Infosecurity Magazine noted that it delivered the spyware through three different routes:

  1. A kernel base mapping vulnerability that leaks info, revealing the kernel’s location in memory;
  2. A kernel-level flaw enabling an attacker to install spyware on the device; and
  3. A Safari Webkit bug that encourages a user to click on a link that would allow an attacker to compromise the device.

What makes this malware so dangerous that Apple patched it within 10 days of being notified? The malware allows a remote attacker to monitor emails, texts, location, browsing history, device settings, phone calls, calendar records and anything else a victim may do on the device.

Twitter-Controlled Android Botnet

In August, a new Android botnet, known as Twitoor to some, used Twitter to infect devices instead of a traditional server.

The botnet is delivered through a malicious link in a message. It receives commands from the targeted Twitter account, enabling it to steal information and install additional malware. If the Twitter account is reported and blocked, the botnet is smart enough to simply switch to another Twitter account, thus making it very difficult to trace.

This is a significant development since cybercriminals can be expected to leverage this method in the future to compromise devices through other social media platforms, such as Facebook, LinkedIn and SnapChat.

Samsung Launches Galaxy Note 7: A New Era of Mobile Security

This launch from Samsung was significant because it introduced new device-level security features for the first time: Mobile devices can now scan users’ eyes to grant access. While they are not yet capable of retina scans, iris scans are the next best thing. Samsung is taking security to the next level. Now it is up to Apple to respond with its September launch.

Quadrooter Strikes: Over 1 Billion Android Devices Vulnerable

Security researchers uncovered Quadrooter, a set of vulnerabilities that affect Android devices running Qualcomm chipsets, in August. The attack is carried out through software that talks to the chipset and the OS. By exploiting these, the attacker can gain access to the device and steal data and communication that goes through it. The only fix is a security patch that the service providers can send to affected customers.

Google Password Fill

Google constantly strives to improve security on its Android devices. To help in that effort, the company developed something similar to single sign-on, called YOLO, or You Only Log in Once. It launched a password security open source API with the hopes that the industry’s top security companies can contribute to developing this further.

By doing so, Google aimed to eliminate the threat that attackers use to lock down controls behind security PIN screens. This is something to look forward to with next flavor of Android 7.0 Nougat.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today