Archive for April, 2012

Symantec Releases Internet Security Threat Report, Volume 17

MOUNTAIN VIEW, Calif. – April 30, 2012- Symantec Corp. (Nasdaq: SYMC) today announced the findings of its Internet Security Threat Report, Volume 17, which shows that while the number of vulnerabilities decreased by 20 percent, the number of malicious attacks continued to skyrocket by 81 percent. In addition, the report highlights that advanced targeted attacks are spreading to organizations of all sizes and variety of personnel, data breaches are increasing, and that attackers are focusing on mobile threats.

Read more detailed blog posts:
* The 2011 Internet Security Threat Report – There Is No Panacea to Protect Against All Attacks
* Keep Your SMB Safe from Internet-Based Threats

Malicious Attacks Continue to Grow Rapidly Symantec blocked more than 5.5 billion malicious attacks in 2011, an increase of 81 percent over the previous year. In addition, the number of unique malware variants increased to 403 million and the number of Web attacks blocked per day increased by 36 percent.

At the same time, spam levels fell considerably and new vulnerabilities discovered decreased by 20 percent. These statistics, compared to the continued growth in malware, paint an interesting picture. Attackers have embraced easy to use attack toolkits to efficiently leverage existing vulnerabilities. Moving beyond spam, cyber criminals are then turning to social networks to launch their attacks. The very nature of these networks makes users incorrectly assume they are not at risk and attackers are using these sites to target new victims. Due to social engineering techniques and the viral nature of social networks, it’s much easier for threats to spread from one person to the next.

Advanced Targeted Attacks Spread to Organizations of All Sizes Targeted attacks are growing, with the number of daily targeted attacks increasing from 77 per day to 82 per day by the end of 2011. Targeted attacks use social engineering and customized malware to gain unauthorized access to sensitive information. These advanced attacks have traditionally focused on public sector and government; however, in 2011, targeted attacks diversified.

Targeted attacks are no longer limited to large organizations. More than 50 percent of such attacks target organizations with fewer than 2,500 employees, and almost 18 percent target companies with fewer than 250 employees. These organizations may be targeted because they are in the supply chain or partner ecosystem of a larger company and because they are less well-defended. Furthermore, 58 percent of attacks target non-execs, employees in roles such as human resources,, public relations, and sales. Individuals in these jobs may not have direct access to information, but they can serve as a direct link into the company. They are also easy for attackers to identify online and are used to getting proactive inquiries and attachments from unknown sources.

Rise of Data Breaches, Lost Devices Concern for the Future
Approximately 1.1 million identities were stolen per data breach on average in 2011, a dramatic increase over the amount seen in any other year. Hacking incidents posed the greatest threat, exposing 187 million identities in 2011-the greatest number for any type of breach last year. However, the most frequent cause of data breaches that could facilitate identity theft was theft or loss of a computer or other medium on which data is stored or transmitted, such as a smartphone, USB key or a backup device. These theft-or loss-related breaches exposed 18.5 million identities.

As tablets and smartphones continue to outsell PCs, more sensitive information will be available on mobile devices. Workers are bringing their smartphones and tablets into the corporate environment faster than many organizations are able to secure and manage them. This may lead to an increase in data breaches as lost mobile devices present risks to information if not properly protected. Recent research by Symantec shows that 50 percent of lost phones will not be returned and 96 percent (including those returned) will experience a data breach.

Mobile Threats Expose Businesses and Consumers Mobile vulnerabilities increased by 93 percent in 2011. At the same time, there was a rise in threats targeting the Android operating system. With the number of vulnerabilities in the mobile space rising and malware authors not only reinventing existing malware for mobile devices, but creating mobile-specific malware geared to the unique mobile opportunities, 2011 was the first year that mobile malware presented a tangible threat to businesses and consumers. These threats are designed for activities including data collection, the sending of content, and user tracking.

Click to Tweet: Symantec blocked more than 5.5 billion attacks in 2011: Click to Tweet: #ISTR 1.1 million identities stolen per breach last year: Click to Tweet: Hackers exposed 187 million identities in 2011: Click to Tweet: Mobile vulnerabilities increased by 93% in 2011, #ISTR: Click to Tweet: Advanced targeted attacks spread to organizations of all sizes and information workers:


“In 2011 cybercriminals greatly expanded their reach, with nearly 20% of targeted attacks now directed at companies with fewer than 250 employees,” said Stephen Trilling, Chief Technology Officer, Symantec. “We’ve also seen a large increase in attacks on mobile devices, making these devices a viable platform for attackers to leverage in targeting sensitive data. Organizations of all sizes need to be vigilant about protecting their information.”

* Video: Did You Know: Internet Security Threat Report, Volume 17
* Podcast: Symantec Internet Security Threat Report Volume 17
* Webcast: Threat Update: Top Trends to Focus on for 2012
* SlideShare: Symantec Internet Security Threat Report 2011, Volume 17, April 2012
* Infographic: 2011 in Numbers
* Infographic: 2011 by Month

* Full Report Home Page: Internet Security Threat Report, Volume 17
* Internet Security Threat Report Press Kit
* Build Your Own Customizable Version of the Internet Security Threat Report
* Blog Post: The 2011 Internet Security Threat Report – There Is No Panacea to Protect Against All Attacks
* Blog Post: Keep Your SMB Safe from Internet-Based Threats
* The Symantec Smartphone Honey Stick Project

Connect with Symantec
* Follow Symantec ThreatIntel on Twitter
* Follow Symantec on Twitter
* Join Symantec on Facebook
* Join Norton on Facebook
* View Symantec’s SlideShare Channel
* Read Industry Trends on Delicious
* Subscribe to Symantec News RSS Feed
* Visit Symantec Connect Business Community

About the Symantec Internet Security Threat Report The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in attacks, malicious code activity, phishing, and spam.

About Security Technology and Response
The Security Technology and Response (STAR) organization, which includes Security Response, is a worldwide team of security engineers, threat analysts and researchers that provides the underlying functionality, content and support for all Symantec corporate and consumer security products. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and updates several thousand times every second. This network monitors attack activity in more than 200 countries and territories and tracks more than 47,000 vulnerabilities affecting more than 40,000 products from more than 15,000 vendors. Spam, phishing and malware data is captured through a variety of sources, including the Symantec Probe Network, Skeptic, and a number of other Symantec security technologies. The team uses this vast intelligence to develop and deliver the world’s most comprehensive security protection.

About Symantec
Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at or by connecting with Symantec at:

Article source:


No Comments

OAIC updates data breach guidelines

The Office of the Australian Information Commission (OAIC) has updated its voluntary data breach guidelines as a means of encouraging organisations to notify the public in the advent of a data breach.

The new guidelines, entitled Data breach notification, update the August 2008 Guide to handling personal information security breaches.

Information Commissioner, John McMillian, launched the guidelines in Sydney to coincide with Privacy Awareness Week.

In-depth: Privacy Act reforms–the implications for the digital environment.

McMillian said that the government is still considering the data breach notification framework, despite a recommendation in 2008 by the Australian Law Reform Commission (ALRC) in its report, For your information: Australian Privacy Law and Practice, that it should be a legal requirement to notify customers of a data breach in Australia.

“Legal obligation, aside, there is strong support for the notion that government and industry should treat data breach notification as an obligatory privacy practice,” he said.

“A survey due to be released by ebay this week has found that 85 per cent of Australian customers want data breach notifications to be mandatory.”

McMillian added that the tide was “turning internationally” to mandatory data breaches, notably in the European Union, the United States and the United Kingdom.

“The Australian government is aware of those developments and I expect the data breach notification framework will continue to be considered,” he said.

The updated guidelines outline four reasons as to why organisations should notify the public about data breach notification. These reasons include security safeguards, openness about privacy practices, restoring control over personal information and rebuilding public trust.

“The OAIC strongly encourages notification in appropriate circumstances as part of good privacy practice, and in the interest of maintaining a community in which privacy is valued,” the guideline documents state.

The guidelines also state that while the OAIC conducts its investigations in private, it will publish the outcomes of its investigations in consultation with the affected organisation.

“In some circumstances, consistent with its role of education and enforcement, the OAIC may publicise information about the information management practices of an agency or organisation,” the guideline documents state.

However, the four data breach notification steps from 2008 remain the same.

  • Step 1: Contain the breach and make a preliminary assessment.

  • Step 2: Evaluate the risks for individuals associated with the breach.

  • Step 3: Consider breach notification.

  • Step 4: Review the incident and take action to prevent future breaches.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU

Article source:


No Comments

Group Offers Suggestions on How To Respond to Utah Health Data Breach

The Utah Health Policy Project has teamed up with community-based groups and consumer credit counseling agencies to provide state agencies with recommendations on how to restore trust in the security of state health programs after a recent data breach at the Utah Department of Health, the Salt Lake City Deseret News reports.

UHPP warns that the breach could result in an increasing number of eligible families not applying for Medicaid or the Children’s Health Insurance Program because of concerns about the security of their personal information (Schwarz, Salt Lake City Deseret News, 4/28).

Background on Data Breach

According to UDOH, the breach occurred on March 30 as Utah Department of Technology Services technicians were exchanging computer servers.

Stephen Fletcher — executive director of UDTS — said it appeared that “very sophisticated” hackers used passwords to access a server, but officials are uncertain about how the hackers bypassed security (iHealthBeat, 4/12).

The breach affected the personal information of about 800,000 Medicaid and CHIP beneficiaries. The stolen information included about 280,000 Social Security numbers.


To help restore trust in the security of state health programs, UHPP recommended:

  • Issuing new Social Security numbers to children affected by the breach;
  • Establishing a long-term plan to provide counseling and assistance to affected residents;
  • Creating a step-by-step guide on how to apply for a credit freeze;
  • Creating an advisory committee to advocate for individuals who have limited or no English proficiency, those with mental illnesses, seniors and those living in nursing homes or residential facilities; and
  • Launching a marketing and outreach campaign with public service announcements (Salt Lake City Deseret News, 4/28).

 Next Article

  • Sign in or register to share your thoughts on this article.

Readers are also invited to send feedback to: [email protected]


Readers are invited to send feedback to:


Article source:


No Comments

BlueCross BlueShield’s Data Breach Leads to Costly HITECH Infraction

  • Email
  • Print
  • Comments
  • RSS
  • <!– Official Twitter Button


For anyone who might have fancied that the Health Information Technology for Economic and Clinical Health (HITECH) Act — an Act that addresses the privacy and security concerns associated with the electronic transmission of health information – is a paper tiger, ask BlueCross BlueShield of Tennessee, which last month paid a $1.5 million settlement after losing data on more than 1 million customers as a result of a 2009 burglary.

The resolution of the case is significant when one considers that the patient data at the time of the theft was outside the control of BlueCross. The patient information was on 57 hard drives kept in a secured closet at a former call center that BlueCross had vacated three months earlier.

The penalty, which was the result of a negotiation with U.S. Department of Health and Human Services’ Office of Civil Rights, was the first since the HITECH Act was passed. But the fine was less than 10 percent of the true cost to BlueCross, which so far has spent $17 million in corrective actions.

Fortunately for BlueCross, the thief or thieves who stole the hard drives in an after-hours burglary in Chattanooga, TN, on Oct. 2, 2009, apparently were more interested in the hardware than they were in the data it contained. To date there is no evidence that the information on the drives — which according to the federal civil rights office contained names of members, social security numbers, diagnosis codes, birth dates, and health plan identification numbers – has been compromised, BlueCross said in a statement.

The hard drives were “encoded but not encrypted,” according to a statement by BlueCross. “The retrieval of member data from these drives would require highly specialized expertise and software,” it said in a later statement.

While the value of the hard drives was estimated to be in the thousands of dollars, the actual cost of the burglary to BlueCross, so far $17 million, has made it in the words of one newspaper possibly the “costliest caper” in Chattanooga history.

“Since the theft, we have worked diligently to restore the trust of our members by demonstrating our full commitment to limiting their risks from this misdeed and making significant investments to ensure their information is safe at all times,” said Tena Roberson, deputy general counsel and chief privacy officer for BlueCross. Following the burglary, BlueCross had to recover the lost data from backups, identify the customers and providers affected, and then notify each one of the security breach and what actions were available to them. It spent $7 million implementing tighter IT security throughout its operation, including encryption of all at-rest data, which the insurer claims exceeds all current industry standards for security.

The BlueCross data theft is a cautionary tale for other health care providers and insurers, not only as proof that the Health and Human Services’ civil rights office will seek redress for information security violations to HITECH, but also for how much care organizations must take with their data.

What enabled the burglary to occur in the first place was that BlueCross had relocated its staff to another building, vacating the office space, but had left behind servers in a locked network closet. At the end of June prior to the theft, BlueCross had turned over security of the closet to the property management company until the servers could be moved, which was scheduled for November. Even though the closet was secured with biometric and keycard security system (which operated a magnetic lock) and a keyed lock, the thieves were able to get access.

The health insurer was deemed responsible by the Office of Civil Rights even though the data was in the care of another company outside BlueCross. While BlueCross admits no liability as a result of the theft, it agreed to pay the $1.5 million settlement “to avoid the burden and additional expense of investigation and litigation,” according to the resolution agreement with HHS. It also agreed to a “corrective action plan” that it must complete over the next 450 days.

Article source:


No Comments

NHS gets first data breach fine as £70000 penalty handed down

The Information Commissioner‘s Office (ICO) has handed out its first fine to an NHS organisation.

The Aneurin Bevan Health Board in Wales was fined £70,000 after sending a report containing sensitive information about a patient’s health to another person.

The mistake occurred in March last year, when the report was sent to a former patient with a very similar name to the intended recipient.

The mix-up came after a doctor emailed a letter to a secretary for formatting, and included both the correct spelling and a misspelling of the patient’s name.

The secretary then checked the health board’s electronic patient record system to find the patient’s details, but without enough information in the letter to identify the right patient, such as an NHS number, meaning the report was sent to the wrong individual.

The health board has now signed an undertaking to improve its data protection practices, including giving staff training on storing and using personal data, undertaking compliance monitoring on IT security and data protection policies, and ensuring new processes are in place to confirm a patient’s identity before information is sent out.

Stephen Eckersley, the ICO’s head of enforcement, said the mistake could have been prevented if the information had been checked before being sent out.

“We are pleased that the health board has now committed to taking action to address the problems highlighted by our investigation; however organisations across the health service must stand up and take notice of this decision if they want to avoid future enforcement action from the ICO,” he said.

This article is published by Guardian Professional. For weekly updates on news, debate and best practice on public sector IT, join the Guardian Government Computing network here.

Article source:


No Comments

Google staff knew of Street View data breach, finds FCC

Monday, April 30, 2012

Article source:


No Comments

RuggedCom Rugged Operating System Vulnerability

DNSChanger Malware

Tuesday, April 24, 2012 at 2:20 pm

US-CERT encourages users and administrators to ensure their systems are not infected with the DNSChanger malware by utilizing tools and resources available at the DNS Changer Working Group (DCWG) website. Computers testing positive for infection of DNSChanger malware will need to be cleaned of the malware in order to maintain continued internet connectivity beyond July 9, 2012.

On November 8, 2011, the FBI, NASA-OIG, and Estonian police arrested several cyber criminals in “Operation Ghost Click.” The criminals operated under the company name “Rove Digital,” and distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ, and TDL4 viruses.

Additional information about Operation Ghost Click and the DNSChanger malware is available at the FBI website.

Article source:

, ,

No Comments

HTML5 security: Will HTML5 replace Flash and increase Web security?

Despite being installed on nearly every Internet-connected computer, it looks like Flash, Adobe’s long-troubled format for Web multimedia, will soon be replaced by the upcoming standard HTML5. In Adobe’s own words, “HTML5 is now universally supported on major mobile devices, in some cases exclusively. This makes HTML5 the best solution for creating and deploying content in the browser across mobile platforms.” members gain immediate and unlimited access to breaking industry news, virus alerts, new hacker threats, highly focused security newsletters, and more — all at no cost. Join me on today!

    Michael S. Mimoso, Editorial Director

This is surely sad news for enterprise attackers. In recent years, Flash has been a popular target for malicious hackers. According to security research firm WhiteHat Security Inc., Flash Player-related vulnerabilities accounted for approximately 14% of all the Web application vulnerabilities they discovered.

So is the demise of Flash good news for security? Will HTML5 replace Flash, and if so, how does HTML5 security stack up against Flash? And how should security pros prepare for the rollout of HTML5 Web content? That’s what we’ll discuss in this tip.

HTML5 enjoys the support of the Internet’s biggest players, including Facebook, Google and PayPal. In fact, it’s on course to becoming the future standard for Internet video and should supplant non-standard formats, such as Flash and Microsoft’s Silverlight. Flash is a binary format for multimedia content using the object-oriented development language ActionScript and requires an Adobe plug-in. HTML5, on the other hand, is an open source markup language that does not require a plug-in to run its applications. Removing the need for proprietary plug-ins in order to play video certainly closes a common attack vector, and because HTML5 updates are delivered through browser updates, they’re far more likely to be applied than patches for plug-ins. However, HTML5 provides far more access to a computer’s resources, including local data storage, which potentially opens up new opportunities for cybercriminals.

My main concern with HTML5 is that developers will rush to incorporate it into enterprise websites without taking the time to fully understand its new features and how to securely implement them. As an example, cross-origin resource sharing (CORS) permits a Web server to allow its resources to be accessed by a webpage from a different domain. CORS relaxes the Same Origin Rule, which is one of the fundamental security controls built into Web browsers. Unless developers know how CORS works, they can easily make erroneous assumptions and allow attackers access to content that should not be shared. The same holds true for HTML5 cross-document messaging. It is secure when properly used, but if developers don’t check to ensure that messages originate from their own sites, malicious code from other sites can spoof rogue messages. It’s a basic security tenet that data from the browser should be considered untrusted and therefore must be validated. Current validation processes and filters should be reviewed during the Web application development process as new HTML5 elements and attributes may cause unexpected results. Whitelisting-based filters built into the applications should prove more resilient.

Security weaknesses can appear in any technology when developers use it for reasons other than those for which it was originally intended. For example, the HTML5 Web Storage specification provides developers with a more flexible alternative to cookies for storing data in the browser. Of course, there is the risk it’s used to store sensitive user data that could be compromised by a cross-site scripting (XSS) attack, but sites are already using it to store scripts so pages load faster. Consider this example: In order to save time and bandwidth, the former Web service Apture used a localStorage object to cache its application-logic code, but a page on the same domain as those scripts had a reflected XSS vulnerability, which could be used to inject malicious code in the cache. The malicious code turned the vulnerability into a persistent, client-side XSS attack across all domains using the Apture service. Pulling data or scripts from third-party sources creates an implicit trust relationship. Developers must be aware of the potential risks and understand how to sanitize this content before including it in their own sites.

Pushing a technology beyond its original purpose can lead to other errors. HTML5 is an asynchronous technology, but developers are using JavaScript to make it appear synchronous. When a transaction requires a response before it can move on to the next stage, business logic controls should be reviewed to ensure processes such as database transactions can only occur in the correct order.

Security teams will need to assess the use of the WebSocket API, which replaces the need for a browser to poll a Web server for the latest data. The server only pushes information out when it is new, which reduces unnecessary traffic between server and browser. However, WebSocket thwarts a number of important network security controls, including traditional packet headers used by firewalls to block suspicious traffic. Reputation-based defenses are also less effective. This increases the need for a firewall with deep content inspection that can handle data flowing through a WebSocket to be able to assess the content, structure and intent of the traffic. Again, whitelisting will prove to be more effective.

Explore Web browser security

Does Internet Explorer security now surpass Firefox?

Discover the risks involved with delaying upgraded Firefox deployments.

The HTML5 standards bodies, as well as browser vendors, have thoroughly thought about how best to eradicate certain security and privacy issues. However, HTML5 is still evolving as a standard and is certainly not a multimedia Web development security cure-all for developers that lack the wherewithal to code securely. Even for those developers that do code securely, phishing, malware and denial-of-service attacks will still exist. Replacing your site’s applications and code with HTML5 is a big undertaking and things will invariably break. Restore processes should be tested thoroughly prior to work commencing and critical functions should initially be run in parallel. To provide additional protection against various attacks, I recommend moving the site to HTTPS only as part of any upgrade.

Penetration tests must accompany any HTML5 development effort, and should include the sophisticated presentation layers that can be created using HTML5 to ensure they are performing as intended. Attackers will certainly test browser vendors’ implementations of new functionalities and data formats, such as canvas, video and their attributes for coding errors that may allow buffer overflows and other attacks. This means security teams and developers need to remain aware of vendor updates to ensure patches and mitigating security controls can be put in place sooner rather than later.

HTML5 means developers can now incorporate multimedia into their sites using an open standard. This is a far better situation than using an assortment of third-party plug-ins. As long as developers take the time to learn how to use its many new features securely, the security industry can look forward to a richer and more secure Internet. However, history shows that this is unlikely, so the need for robust perimeter defenses and pen tests is not going to disappear any time soon.

About the author:
Michael Cobb, CISSP-ISSAP, is a renowned security author with more than 15 years of experience in the IT industry and another 16 years of experience in finance. He is the founder and managing director of Cobweb Applications Ltd., a consultancy that helps companies to secure their networks and websites, and also helps them achieve ISO 27001 certification. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. Michael is also a Microsoft Certified Database Administrator and a Microsoft Certified Professional.

This was first published in April 2012

Article source:

, ,

No Comments

Flashback Trojan Infecting Snow Leopard Macs Most, Attacking Via Twitter

Apple Mac(Photo: Apple)

The Flashback Trojan continues to compromise Macs, according to a report by security firm Dr. Web. The Trojan can infect Macs with or without a user’s permissions and is dominating Snow Leopard systems. The attacks seem to be directed via Twitter.

The original version of the virus – which emerged around April 6 – was unsophisticated in comparison to its current variant/form. In its analysis, Dr. Web found that the malware is using an exploit in Java, which is configured with a list of servers through which it receives commands and configuration updates. The malware asks a user for permission, though installs regardless in the home directory.

Like Us on Facebook :

“The download malignant program application interacts with two types of control servers. Servers belonging to the first category intercept web search traffic and redirect the user to malicious sites controlled by criminals. The second group issues commands to bots to perform backdoor tasks in the compromised system. Doctor Web analysts managed to take over control server domain names known to Backdoor. Flashback payload malware and analysed requests sent to bots by servers,” Dr. Web reported.

Additionally, if the malware doesn’t get a correct response from a server on its internally generated lists it will search Twitter for posts containing a string of text using the current date. The string serves as a hash tag in a search, using

“For example, some Trojans generated a string of the “rgdgkpshxeoa” format for the date 04.13.2012 … If the Trojan manages to find a Twitter message containing bumpbegin and endbump tags enclosing a control server address, it will be used as a domain name,” the firm added. Dr. Web took over domains of this category on April 13 to try and halt the hacker, but its Twitter account was blocked the following day.

63.4 percent of the infected Macs are running Snow Leopard, not the most recent version of OS X – Lion. Snow Leopard is the newest version of Apple’s operating system that comes with Java. Snow Leopard also maintained the largest share of OS X last month, according to Net Applications.

Leopard is the second most-used Flashback-infected operating system, Dr. Web said, installed on 25.5 percent of the 90,000 infected Macs. OS X 10.5 released in Oct 2007.

(reported by Jonathan Charles, edited by Dave Clark)

Article source:

, ,

No Comments

ESET Launches Mobile Anti-Malware Suite for Android

Security specialist ESET, developers of the popular NOD32 anti-virus application have announced the launch of their first security suite for Android smartphones and tablets. ESET Mobile Security is designed to protect mobile devices from viruses, spam and secure the device in case of theft.

Features include real-time scanning of downloaded applications, files, folders, and memory cards for viruses and spyware. Anti-theft security includes the ability to remotely locate, lock and wipe your device should it go missing, as well as preventing unauthorised use of the phone via SIM registration – an SMS message is sent to an alternate phone if another SIM is inserted into the device.

Also included is an in-built task manager and security audit feature which monitors your phone functions (battery, free space, running processes) which allows you to easily kill rogue processes, and anti-spam protection which provides the ability to blacklist and block messages and calls from unknown numbers.

android1 150x150 ESET Launches Mobile Anti Malware Suite for Android

android2 150x150 ESET Launches Mobile Anti Malware Suite for Android

android3 150x150 ESET Launches Mobile Anti Malware Suite for Android

android4 150x150 ESET Launches Mobile Anti Malware Suite for Android

android5 150x150 ESET Launches Mobile Anti Malware Suite for Android

android6 150x150 ESET Launches Mobile Anti Malware Suite for Android

android7 150x150 ESET Launches Mobile Anti Malware Suite for Android

android8 150x150 ESET Launches Mobile Anti Malware Suite for Android

Product Photo 150x150 ESET Launches Mobile Anti Malware Suite for Android

Devices running Android 2.0 through to 2.3 are supported, with what the company called “experimental” support available for 3.0 and 3.1.

Pricing is set at $9.99 with a 30 day free trial available.

DownloadESET Mobile Security

Article source:

, ,

No Comments