Semi-annual balance of mobile security

For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year. Mobile security plays an increasingly important role in the protection of information assets, and this applies to both home and corporate users. So, this publication will focus on analyzing the … More Semi-annual balance of mobile security

Going on vacation? Five things to do before you leave

You’ve set up an out-of-office auto-responder and packed your stuff, but have you done all of your “homework” before you rush out the front door for that well-deserved time off? You’re probably taking the vacation to unwind, but it is certainly not the time to put cybersecurity on the back burner. On the contrary, being … More Going on vacation? Five things to do before you leave

Android users: Beware these popularity-faking tricks on Google Play

Tricksters have been misleading users about the functionality of apps by displaying bogus download numbers. It seems that tricksters on Google Play have found another way to make their deceptive apps appear more trustworthy to users – that is, at least at first sight. The trick takes advantage of the fact that apart from the app icon … More Android users: Beware these popularity-faking tricks on Google Play

Over 3,300 Android apps may be violating kids’ privacy, study says

Researchers find that a great portion of popular children’s apps may run afoul of US privacy legislation by improperly collecting data – albeit often probably unintentionally. A response from Google to the unflattering findings wasn’t long in coming. More than 3,300 children-oriented Android apps on Google Play are possibly gathering kids’ data in an improper … More Over 3,300 Android apps may be violating kids’ privacy, study says

Tricks that cybercriminals use, to hide in your phone

While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices. The convoluted tricks used to increase the effectiveness of their attacks can be grouped into two distinct categories: First, Social Engineering strategies that seek to … More Tricks that cybercriminals use, to hide in your phone

Android ransomware in 2017: Innovative infiltration and rougher extortion

2017 was without a doubt the year of ransomware. Users and businesses worldwide had to cope with the fallout of massive campaigns such as Petya or WannaCryptor, and put up with damages that surpassed the multibillion mark. However, it wasn’t just PC ransomware that made headlines, as authors of Android malware were also looking for new … More Android ransomware in 2017: Innovative infiltration and rougher extortion