Asia Fresh News

Asia Fresh Stories

Archive for April 20th, 2017

Vietnamese People Spent Billions of Dollars on Imported Cosmetics

leave a comment »

HO CHI MINH CITY, Vietnam /PRNewswire/ — Organised by UBM Asia, the largest exhibition organiser in Asia, vietbeauty 2017 will return this year from 23-25 August 2017 at Saigon Exhibition and Convention Center (SECC), Ho Chi Minh.

Being the only beauty tradeshow in the region, focuses on trading, marketing, educating and industry development in Vietnam, vietbeauty has garnered impressive success in 2016. It is set to be the most comprehensive beauty platform for beauty industry professionals to expand their businesses in the promising imported cosmetics market.

According to data from Trade Map of the International Trade Center (ITC) and the World Bank (WB), the value of imported cosmetics coming into the Vietnam market has increased from less than USD500 million in 2011 to over USD1.1 billion in 2016. This figure is forecasted to double, to about USD2.2 billion in 2020.

These figures were confirmed as Euromonitor International, a market research company, also reported that the market size of Vietnam’s cosmetic industry has surpassed USD1 billion in two years, 90% of which are imports, and with annual growth rates often reaching two figures.

According to data from the ITC, Singapore, EU, Thailand and Korea are the biggest cosmetics importers to Vietnam. Meanwhile from the euro zone, the rate of cosmetics imported from France and Italy has recently declined with a turns ratio of 16% and 3%; Spain, Germany and Ireland are quickly replaced with a 2-16% growth.

Data from the General Administration of Customs said that in the first two months alone in 2017, the value of imported perfumes, cosmetics and toilet preparations from Singapore reached nearly USD30 million. Italy, France, Korea and Thailand gained from USD2 to USD7 million.

Topping the list of cosmetics products imported into Vietnam are perfumes (55%) and makeup (21%). The remaining product lines, such as haircare, shaving creams and oils account for 2-8%.

According to the International Trade Center, perfume and makeup products in the Vietnam market have the strongest appreciation trend, reaching 27% and 10%, respectively.

According to the EU-Vietnam Business Network (EVBN), South and South Central are leading the country in terms of consumer trends and beauty products, with a scale of more than 67% of the market; the northern region accounts for nearly 30%, whilst North Central is only about 3.13%.

With 20 million aged 15 to 39 (40% of the female population), Vietnamese women today receive better education, knowledge and access to different sources of information to build their knowledge about a product. They are updated of market trends faster than ever. Vietnam has become one of the most prominent beauty markets for players in the beauty industry.

vietbeauty 2017 is expected to receive participants from more than 200 leading beauty brands from Vietnam, Japan, Korea, Malaysia, Singapore, Thailand, Philippines, India, Indonesia, mainland China, Taiwan, the USA and European countries.

There has never been a better time to enter the Vietnamese market and develop your business in the beauty industry than today. Come be a part of this exciting platform and transform your business.

For more information on special privileges, please contact UBM staff to discuss your business needs and how you can make the most of your participation. You may email vietbeauty@ubm.com or call +84 866810202.

For more information on vietbeauty 2017, please view its website at www.vietbeautyshow.com.

Notes to the Editor:

About UBM Asia (www.ubmasia.com)

Owned by UBM plc listed on the London Stock Exchange, UBM Asia is Asia’s leading exhibition organiser and the biggest commercial organiser in mainland China, India and Malaysia. Established with its headquarters in Hong Kong and subsidiary companies across Asia and in the US, UBM Asia has a strong global presence in 25 major cities with 30 offices and over 1,400 staff.

With a track record spanning over 30 years, UBM Asia operates in 21 market sectors with 160 dynamic face-to-face exhibitions, 75 high-level professional conferences, 28 targeted trade publications, 18 round-the-clock vertical portals and virtual event services for over 1,000,000 quality exhibitors, visitors, conference delegates, advertisers and subscribers from all over the world. We provide a one-stop diversified global service for high-value business matching, quality market news and online trading networks.

UBM Asia has extensive office networks in China, Southeast Asia and India, three of the world’s fastest growing B2B events markets. UBM China has 11 offices in the major cities in mainland China, including Beijing, Shanghai, Guangzhou, Hangzhou, Guzhen and Shenzhen, where we organise more than 70 exhibitions and conferences. In ASEAN, UBM Asia operates from its offices in Malaysia, Thailand, Indonesia, Singapore, Vietnam and the Philippines with over 60 events in this region. UBM India teams in Mumbai, New Delhi, Bangalore and Chennai organise 20 exhibitions and 60 conferences every year across the country.

Logo – http://photos.prnasia.com/prnh/20170418/1827598-1LOGO-a
Logo – http://photos.prnasia.com/prnh/20170418/1827598-1LOGO-b

Source: UBM Asia

Written by asiafreshnews

April 20, 2017 at 5:35 pm

Posted in Uncategorized

Turn the light on and give me your passwords

leave a comment »

/PRNewswire/ — ESET researchers have discovered another banking trojan on Google Play — this time disguised as a Flashlight widget and targeting a potentially unlimited number of apps. Android users were the target of another banking malware with screen locking capabilities, masquerading as a flashlight app on Google Play. Unlike other banking trojans with a static set of targeted banking apps, this trojan is able to dynamically adjust its functionality. Aside from delivering promised flashlight functionality, the remotely controlled trojan comes with a variety of additional functions aimed at stealing victims’ banking credentials. Based on commands from its C&C server, the trojan can display fake screens mimicking legitimate apps, lock infected devices to hide fraudulent activity and intercept SMS and display fake notifications in order to bypass 2-factor-authentication. The malware can affect all versions of Android. Because of its dynamic nature, there might be no limit to targeted apps — the malware obtains HTML code based on apps installed on the victim’s device and uses the code to overlay the apps with fake screens after they’re launched. The trojan, detected by ESET as Trojan.Android/Charger.B, was uploaded to Google Play on March 30 and got installed by up to 5000 unsuspecting users before being pulled from the store on ESET’s notice on April 10 How does it operate? As soon as the app is installed and launched, it requests device administrator rights. Users with Android 6.0 and above also need to manually permit usage access and drawing over other apps. With the rights and permissions granted, the app hides its icon, appearing on the device only as a widget. The actual payload is encrypted in the assets of the APK file installed from Google Play, evading detection of its malicious functionality. The payload is dropped, decrypted and executed when the victim runs the app. The Trojan first registers the infected device to the attackers’ server. Apart from sending device information and a list of installed applications, the malware gets up close and personal with its victims — it also attaches a picture of the device owner taken by the front camera. If the sent information indicates the device is located in Russia, Ukraine or Belarus, the C&C commands the malware to stop its activity — most likely to avoid prosecution of the attackers in their home countries. Based on the apps found installed on the infected device, the C&C sends corresponding fake activity in the form of a malicious HTML code. The HTML is displayed in WebView after the victim launches one of the targeted apps. Legitimate activity is then overlaid by a fake screen requesting victim’s credit card details or banking app credentials. However, like we mentioned before, specifying what apps qualify as “targeted” is tricky, as the requested HTML varies based on what apps are installed on the particular device. During our research, we’ve seen fake screens for Commbank, NAB and Westpac Mobile Banking, but also for Facebook, WhatsApp, Instagram and Google Play. The credentials inserted into the fake forms are sent unencrypted to the attackers’ C&C server. Page 2 of 3 © 2017 Factiva, Inc. All rights reserved. As for the device locking, we suspect this function enters the picture when cashing out the compromised bank accounts. The attackers can remotely lock devices with a fake update lookalike screen to hide fraudulent activity from victims, as well as to ensure they can’t interfere. To communicate with C&C, the Trojan misuses Firebase Cloud Messages (FCM), which is the first time we’ve seen Android malware using this communication channel. Based on our research, the app is a modified version of Android/Charger, first discovered by Check Point researchers in January 2017. Unlike the first version that primarily extorted victims by locking their devices and demanding ransom, the attackers behind Charger are now trying their luck with phishing for banking credentials – an evolution rather rare in the world of Android malware. With its fake login screens and locking capabilities, Android/Charger.B also bears some resemblance to the banking malware we discovered and analyzed in February. What makes this latest discovery more dangerous, however, is the fact that its target can be dynamically updated, as opposed to being hardcoded in the malware — opening unlimited options for future misuse. Has my device been infected? How do I clean it? If you’ve recently downloaded a Flashlight app from Google Play, you might want to check if you haven’t accidentally reached for this trojan. The malicious app can be found in Setting > Application Manager/Apps > Flashlight Widget. While locating the app is simple, uninstalling it is a whole another story. The trojan tries to prevent getting uninstalled by not allowing victims to turn off the active device administrator – a necessary step for removing the app. When trying to deactivate the rights, the pop-up screen doesn’t go away until you change your mind and click “activate” again. In such a case, the app can be uninstalled by booting your device into Safe mode, which will enable you to go through the two steps of removing the malicious app. How to stay safe To avoid dealing with the consequences of mobile malware, prevention is always the key. Whenever possible, opt for official app stores when downloading apps. Although not flawless, Google Play does employ advanced security mechanisms to keep malware out, which doesn’t have to be the case with alternative stores. When in doubt about installing an app, check its popularity by number of installs, ratings and, most importantly, content of reviews. After running anything you’ve installed on your mobile device, pay attention to what permissions and rights it requests. If an app asks for permissions that don’t seem adequate to its function — like device administrator rights for a Flashlight app — you might want to rethink your choice. Last but not least, use a reputable mobile security solution to protect your device from latest threats. About ESET For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint and mobile security, to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real-time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D centers worldwide, ESET becomes the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003. For more information visit www.eset.com or follow us on LinkedIn, Facebook and Twitter.

Written by asiafreshnews

April 20, 2017 at 4:25 pm

Posted in Uncategorized