While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices. The convoluted tricks used to increase the effectiveness of their attacks can be grouped into two distinct categories: First, Social Engineering strategies that seek to … More Tricks that cybercriminals use, to hide in your phone
2017 was without a doubt the year of ransomware. Users and businesses worldwide had to cope with the fallout of massive campaigns such as Petya or WannaCryptor, and put up with damages that surpassed the multibillion mark. However, it wasn’t just PC ransomware that made headlines, as authors of Android malware were also looking for new … More Android ransomware in 2017: Innovative infiltration and rougher extortion
It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have … More Are mobile devices insecure by nature?
Fresh from peering into our crystal ball and outlining some of the trends that we expect to dominate the cyber-landscape in the coming year, we will now offer a snapshot of 2017. In a way, this year may be seen as a ‘year of wake-up calls’. Alarm bells barely stopped ringing as we kept waking up to … More Cybersecurity review of 2017: The year of wake-up calls
Cybercrime and other forms of “cyber-badness” affect different professions in different ways. Recently I participated in a panel about the cybersecurity concerns of journalists and the news media, hosted by the Inter America Press Association (IAPA). An account of the panel was published on WeLiveSecuritylast month but in this article I want to pass along some of the … More Cybersecurity for journalists and the news media
Users of the popular cryptocurrency exchange Poloniex have been the target of two credential stealing apps, discovered on Google Play disguised as legitimate Poloniex mobile apps. Apart from harvesting Poloniex login credentials, the fake apps also try to trick victims into making their Gmail accounts accessible to the attackers. Poloniex is one of the world’s leading cryptocurrency … More Fake cryptocurrency trading apps on Google Play
Cybercriminals have developed an innovative ransomware that is based on the foundations of a particular banking Trojan to misuse Android accessibility services. Discovered by ESET malware researcher, Lukáš Štefanko, DoubleLocker, has two powerful tools for extorting money from its victims, and includes a combination that has not been seen previously in the Android ecosystem. WeLiveSecurity sat down … More DoubleLocker Android ransomware explained