mobile

The Twitter account of the popular security expert John McAfee was hacked

The official Twitter account of popular cyber security expert John McAfee was hacked today, hackers used it to promote alternative cryptocurrencies. The official…

8 years ago

Three fake Bitcoin wallet apps were removed from the official Google Play

Researchers from the mobile security firm Lookout have discovered three fake Bitcoin wallet apps in the official Play store, Google promptly…

8 years ago

A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number…

8 years ago

Dark Web – The median price range for Android ransomware kits hits $200

According to the firm Carbon Black, Android ransomware kits are very popular in the dark web, and the median price range for them…

8 years ago

Android Janus vulnerability allows attackers to inject Malware into legitimate apps avoiding detection

Google fixed a bug dubbed Janus that could be exploited by attackers to inject malicious code into Android apps without affecting an…

8 years ago

Major Banking Applications were found vulnerable to MiTM attacks over SSL

Security experts discovered a critical vulnerability in major mobile banking applications that left banking credentials vulnerable to hackers. A group…

8 years ago

31 Million of client records belonging to the virtual keyboard app AI.type leaked online

Another day, another clamorous data breach, this time let's discuss a data breach that exposes personal data collected by the Keyboard…

8 years ago

Google Unwanted Software Policy – It’s a fight against snooping apps

Google has expanded enforcement of Google's Unwanted Software Policy waring Android developers to explicitly declare data collection behaviors. A few days…

8 years ago

Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once again

Researchers from security firm ESET, discovered a multi-stage Malware dubbed Android/TrojanDropper.Agent.BKY that evaded Google Play detection. Security experts at ESET have discovered…

8 years ago

TOASTAMIGO – the first known strain of malware that uses the Toast Overlay exploit

Trend Micro spotted TOASTAMIGO, the first known malware that uses the recently patched vulnerability that ties with the Toast Overlay attacks.…

8 years ago

This website uses cookies.