{"id":27096,"date":"2013-08-27T11:17:46","date_gmt":"2013-08-27T10:17:46","guid":{"rendered":"http:\/\/www.pcvesti.com\/?p=27096"},"modified":"2013-08-27T11:17:46","modified_gmt":"2013-08-27T10:17:46","slug":"2q-security-pregled-propusti-mobilnim-sistemima-uzrokuju-trajne-sigurnosne-probleme","status":"publish","type":"post","link":"https:\/\/www.pcvesti.com\/?p=27096","title":{"rendered":"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme"},"content":{"rendered":"<p style=\"text-align: center;\" align=\"center\"><i>Pretnje na mobilnim platformama, ure\u0111ajima i aplikacijama su sve prisutnije tokom proteklih godina, ali su u ovom tromese\u010dju one kona\u010dno dostigle pun zamah. Sajber-kriminalci su prona\u0161li prefinjenije na\u010dine da zaobi\u0111u za\u0161titu mobilnih ure\u0111aja i to ne vi\u0161e samo uz pomo\u0107 zlonamernih aplikacija.<\/i><i><\/i><\/p>\n<p style=\"text-align: justify;\"><b><i>A\u017euriranja Androida kasne, korisnici trpe ozbiljne propuste<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">Dokaz o Androidovoj \u201e<a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/trend-micro-solution-for-vulnerability-affecting-nearly-all-android-devices\" target=\"_blank\">Master Key<\/a>\u201d ranjivosti porastao je sa otkri\u0107em da sajber-kriminalci mogu iskoristiti propust da a\u017euriraju originalne aplikacije sa zlonamernim sadr\u017eajem. Sa druge strane, vi\u0161ekomponentni <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cybercriminals-improve-android-malware-stealth-routines-with-obad\" target=\"_blank\"> OBAD<\/a> malver koristi administrativne propuste da bi pokrenuo slo\u017eene i nevidljive procese koji se dalje \u0161ire.<\/p>\n<p style=\"text-align: justify;\">Krpljenje ovih kriti\u010dnih ranjivosti pokazalo se kao problemati\u010dno zbog sporog procesa a\u017euriranja Android sistema. Zbog Androidovih <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-android-fragmentation-problem\/\" target=\"_blank\"> problema sa fragmentacijom<\/a> sigurnosne zakrpe prolaze kroz spore veze proizvo\u0111a\u010da i projektanata programa pre nego \u0161to do\u0111u u kontakt sa korisnicima.<\/p>\n<p style=\"text-align: justify;\">Uz sve to, broj zlonamernih i visoko rizi\u010dnih Android aplikacija nastavlja da obara rekorde sa ukupno 718.000 u ovom tromese\u010dju. Korisnici ovog OS-a mogu o\u010dekivati da \u0107e sajber-kriminalci nastaviti dalje da rade znaju\u0107i da je u toku samo \u0161est meseci, broj malver aplikacija porastao za 350.000\u2014 to je podvig za koji je nekad bilo potrebno <a href=\"http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/reports\/rpt-repeating-history.pdf\" target=\"_blank\"> tri godine<\/a> da bi se postigao.<\/p>\n<p style=\"text-align: justify;\"><!--more-->Doga\u0111aji sa mobilnim ure\u0111ajima u ovom tromese\u010dju \u0107e sigurno uzrokovati trajne sigurnosne probleme. Ne poma\u017ee ni \u010dinjenica da iskustvo sa mobilnim ure\u0111ajima uklju\u010duje u velikoj meri i ljudski faktor, odakle i poti\u010du mnoge kobne nesigurne navike.<\/p>\n<p style=\"text-align: justify;\"><b><i>Porast malvera u internet bankarstvu, vi\u0161e rekonstruisanih pretnji<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">U ovom tromese\u010dju broj pretnji u internet bankarstvu porastao je gotovo za tre\u0107inu u odnosu na poslednje tromese\u010dje. Ove pretnje je prijavila ve\u0107ina njihovih \u017ertava iz Sjedinjenih Ameri\u010dkih Dr\u017eava, Brazila, Australije i Francuske.<\/p>\n<p style=\"text-align: justify;\">Mnogobrojne velike pretnje koje su poznate industriji vra\u0107aju se sa rekonstruisanim postavkama i trikovima. Posmatraju\u0107i crno tr\u017ei\u0161te, stru\u010dnjaci su videli da cena malver paketa opada tokom vremena. Neki od njih, kao \u0161to je SpyEye, mogu se dobiti za d\u017eabe ukoliko <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-crimeware-in-bancos-paradise\/\" target=\"_blank\"> kupite neke od drugih poznatih alata<\/a>. Blackhole Exploit Kit (BHEK) koristi novu FAREIT varijantu malvera koja je poznata po tome \u0161to krade akreditive protokola za prenos datoteka (FTP) i ostale li\u010dne informacije sa ciljanog ra\u010dunara. Ciljane kampanje, kao \u0161to je <a href=\"http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-safe-a-targeted-threat.pdf\" target=\"_blank\"> Safe<\/a>, nastavljaju da napadaju kompanije. Aplikacije na strani servera, Plesk, Ruby on Rails i ColdFusion\u00ae, imaju ranjivosti koje su bile iskori\u0161\u0107ene. Pretnje preko dru\u0161tvenog povezivanja sada su usmerene na servise sa pristupom vi\u0161estrukim nalozima, kao \u0161to je Digsby i koriste brojne platforme za blogove kao la\u017ene stranice za protok informacija.<\/p>\n<p style=\"text-align: justify;\">Ove promene na polju pretnji zahtevaju proaktivna, jasna i prilago\u0111ena za\u0161titna re\u0161enja. Saznajte vi\u0161e o mobilnim pretnjama, sajber-kriminalu, APT i drugim pretnjama ovog tromese\u010dja u na\u0161em <a href=\"http:\/\/about-threats.trendmicro.com\/us\/security-roundup\/2013\/2Q\/mobile-threats-in-full-throttle\" target=\"_blank\"> TrendLabs 2Q 2013 Security pregledu, Mobilne pretnje u punom zamahu: propusti na ure\u0111ajima vode ka rizi\u010dnom putu<\/a>. Pogledajte klju\u010dna otkri\u0107a iz svih istra\u017eivanja ura\u0111enih u 2. kvartalu i saznajte sve detalje u na\u0161em <a href=\"http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/reports\/rpt-2q-2013-trendlabs-security-roundup.pdf\" target=\"_blank\"> potpunom izve\u0161taju<\/a>.<\/p>\n<p style=\"text-align: justify;\">U video zapisu koji sledi pogledajte \u0161ta \u0161ef tehnolo\u0161kog odseka kompanije Trend Micro, Raimund Genes govori vi\u0161e o va\u017enim ta\u010dkama u Security pregledu.<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.youtube.com\/watch?v=eHm_PVDQHOU\" target=\"_blank\">http:\/\/www.youtube.com\/watch?<wbr \/>v=eHm_PVDQHOU<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pretnje na mobilnim platformama, ure\u0111ajima i aplikacijama su sve prisutnije tokom proteklih godina, ali su u ovom tromese\u010dju one kona\u010dno dostigle pun zamah. Sajber-kriminalci su prona\u0161li prefinjenije na\u010dine da zaobi\u0111u za\u0161titu mobilnih ure\u0111aja i to ne vi\u0161e samo uz pomo\u0107 zlonamernih aplikacija. A\u017euriranja Androida kasne, korisnici trpe ozbiljne propuste Dokaz o Androidovoj \u201eMaster Key\u201d ranjivosti porastao je sa otkri\u0107em da sajber-kriminalci mogu iskoristiti propust da a\u017euriraju originalne aplikacije sa zlonamernim sadr\u017eajem. Sa&#8230; <\/p>\n<div class=\"more-container\"><a class=\"more-link\" href=\"https:\/\/www.pcvesti.com\/?p=27096\" itemprop=\"url\">Continue reading<\/a><\/div>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"seo_booster_metabox":"","ngg_post_thumbnail":0,"slim_seo":{"title":"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme - PCVesti","description":"Pretnje na mobilnim platformama, ure\u0111ajima i aplikacijama su sve prisutnije tokom proteklih godina, ali su u ovom tromese\u010dju one kona\u010dno dostigle pun zamah. Saj"},"footnotes":""},"categories":[5,12],"tags":[],"class_list":["post-27096","post","type-post","status-publish","format-standard","hentry","category-pc-vesti","category-pdamobile"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme - PCVesti<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcvesti.com\/?p=27096\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme - PCVesti\" \/>\n<meta property=\"og:description\" content=\"Pretnje na mobilnim platformama, ure\u0111ajima i aplikacijama su sve prisutnije tokom proteklih godina, ali su u ovom tromese\u010dju one kona\u010dno dostigle pun zamah. Sajber-kriminalci su prona\u0161li prefinjenije na\u010dine da zaobi\u0111u za\u0161titu mobilnih ure\u0111aja i to ne vi\u0161e samo uz pomo\u0107 zlonamernih aplikacija. A\u017euriranja Androida kasne, korisnici trpe ozbiljne propuste Dokaz o Androidovoj \u201eMaster Key\u201d ranjivosti porastao je sa otkri\u0107em da sajber-kriminalci mogu iskoristiti propust da a\u017euriraju originalne aplikacije sa zlonamernim sadr\u017eajem. Sa... Continue reading\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcvesti.com\/?p=27096\" \/>\n<meta property=\"og:site_name\" content=\"PCVesti\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-27T10:17:46+00:00\" \/>\n<meta name=\"author\" content=\"newsmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"newsmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=27096#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=27096\"},\"author\":{\"name\":\"newsmaster\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#\\\/schema\\\/person\\\/d1e384f7c138a1fcda7af7425e55a6b2\"},\"headline\":\"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme\",\"datePublished\":\"2013-08-27T10:17:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=27096\"},\"wordCount\":564,\"articleSection\":[\"PC Vesti\",\"PDA\\\/Mobile\\\/Camera\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=27096\",\"url\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=27096\",\"name\":\"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme - PCVesti\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#website\"},\"datePublished\":\"2013-08-27T10:17:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#\\\/schema\\\/person\\\/d1e384f7c138a1fcda7af7425e55a6b2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=27096#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcvesti.com\\\/?p=27096\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=27096#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcvesti.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#website\",\"url\":\"https:\\\/\\\/www.pcvesti.com\\\/\",\"name\":\"PCVesti\",\"description\":\"www.pcvesti.com\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcvesti.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#\\\/schema\\\/person\\\/d1e384f7c138a1fcda7af7425e55a6b2\",\"name\":\"newsmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/avatar_user_5_1537115954-96x96.jpeg\",\"url\":\"https:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/avatar_user_5_1537115954-96x96.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/avatar_user_5_1537115954-96x96.jpeg\",\"caption\":\"newsmaster\"},\"url\":\"https:\\\/\\\/www.pcvesti.com\\\/?author=5\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme - PCVesti","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcvesti.com\/?p=27096","og_locale":"en_US","og_type":"article","og_title":"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme - PCVesti","og_description":"Pretnje na mobilnim platformama, ure\u0111ajima i aplikacijama su sve prisutnije tokom proteklih godina, ali su u ovom tromese\u010dju one kona\u010dno dostigle pun zamah. Sajber-kriminalci su prona\u0161li prefinjenije na\u010dine da zaobi\u0111u za\u0161titu mobilnih ure\u0111aja i to ne vi\u0161e samo uz pomo\u0107 zlonamernih aplikacija. A\u017euriranja Androida kasne, korisnici trpe ozbiljne propuste Dokaz o Androidovoj \u201eMaster Key\u201d ranjivosti porastao je sa otkri\u0107em da sajber-kriminalci mogu iskoristiti propust da a\u017euriraju originalne aplikacije sa zlonamernim sadr\u017eajem. Sa... Continue reading","og_url":"https:\/\/www.pcvesti.com\/?p=27096","og_site_name":"PCVesti","article_published_time":"2013-08-27T10:17:46+00:00","author":"newsmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"newsmaster","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcvesti.com\/?p=27096#article","isPartOf":{"@id":"https:\/\/www.pcvesti.com\/?p=27096"},"author":{"name":"newsmaster","@id":"https:\/\/www.pcvesti.com\/#\/schema\/person\/d1e384f7c138a1fcda7af7425e55a6b2"},"headline":"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme","datePublished":"2013-08-27T10:17:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcvesti.com\/?p=27096"},"wordCount":564,"articleSection":["PC Vesti","PDA\/Mobile\/Camera"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pcvesti.com\/?p=27096","url":"https:\/\/www.pcvesti.com\/?p=27096","name":"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme - PCVesti","isPartOf":{"@id":"https:\/\/www.pcvesti.com\/#website"},"datePublished":"2013-08-27T10:17:46+00:00","author":{"@id":"https:\/\/www.pcvesti.com\/#\/schema\/person\/d1e384f7c138a1fcda7af7425e55a6b2"},"breadcrumb":{"@id":"https:\/\/www.pcvesti.com\/?p=27096#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcvesti.com\/?p=27096"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcvesti.com\/?p=27096#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcvesti.com\/"},{"@type":"ListItem","position":2,"name":"2Q Security pregled: Propusti u mobilnim sistemima uzrokuju trajne sigurnosne probleme"}]},{"@type":"WebSite","@id":"https:\/\/www.pcvesti.com\/#website","url":"https:\/\/www.pcvesti.com\/","name":"PCVesti","description":"www.pcvesti.com","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcvesti.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.pcvesti.com\/#\/schema\/person\/d1e384f7c138a1fcda7af7425e55a6b2","name":"newsmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcvesti.com\/wp-content\/uploads\/2018\/09\/avatar_user_5_1537115954-96x96.jpeg","url":"https:\/\/www.pcvesti.com\/wp-content\/uploads\/2018\/09\/avatar_user_5_1537115954-96x96.jpeg","contentUrl":"https:\/\/www.pcvesti.com\/wp-content\/uploads\/2018\/09\/avatar_user_5_1537115954-96x96.jpeg","caption":"newsmaster"},"url":"https:\/\/www.pcvesti.com\/?author=5"}]}},"_links":{"self":[{"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/posts\/27096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27096"}],"version-history":[{"count":0,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/posts\/27096\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=27096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=27096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}