Another set of malicious apps has made it into the official Android app store. Detected by ESET security systems as Android/TrojanDropper.Agent.BKY, these apps form a new family of multi-stage Android malware, legitimate-looking and with delayed onset of malicious activity. We have discovered eight apps of this malware family on Google Play and notified Google’s security … More Multi-stage malware sneaks into Google Play
Users of the popular cryptocurrency exchange Poloniex have been the target of two credential stealing apps, discovered on Google Play disguised as legitimate Poloniex mobile apps. Apart from harvesting Poloniex login credentials, the fake apps also try to trick victims into making their Gmail accounts accessible to the attackers. Poloniex is one of the world’s leading cryptocurrency … More Fake cryptocurrency trading apps on Google Play
Google has been forced to remove almost 300 apps from its Play Store after learning that apps were being hijacked for DDoS attacks, an attack that ESET warned its followers on social media about in early August. The botnet, named WireX, is estimated to have possibly infected close to 70,000 devices before Google took action. Once they … More Google removes 300 Android apps following DDoS attack
By 2020, the number of Internet of Things devices is estimated to surpass 20 billion. From smart fridges to coffee makers and Barbie dolls, connected things will soon fill our households. Many of these devices are, and will continue to be, accessed via our smartphones. While this is very convenient for users, there are weaknesses in smartphone security that can be exploited to turn … More Are smartphones threatening the security of our IoT devices?
What is the impact of social media and the way it is used by businesses across the world? Social media use has skyrocketed for businesses all over the world, with many companies using it as a way of strengthening their brands and reaching out to new and existing customers. It’s clear that social media is … More Workplace social media security: 5 questions answered
Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities similar to any desktop. It is clear today that our smartphones and tablets have evolved beyond this point, creating new means of technological interaction not previously imagined. For more detail, check out Denise Giusto Bilic’s piece here.
In between dreams, you hear the alarm on your mobile phone ring. You open your eyes and turn it off from your smartwatch. Your smart TV welcomes you with the daily news and you look for the weather forecast: it is a freezing winter’s morning. Your car is waiting outside, just like any other day, … More Trends 2017: Ransomware of Things