Category

Mobile App Monitoring
Info-stealing malware targeting android phone users | Malware Trojan
Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide...
Continue Reading
anti virus malware protection
Mobile phones in today’s generation are still selling like pancakes despite the stiff competition between different mobile phone manufacturers. Needless to say, mobile phones are still part of our daily lives which serves as a multi-functional tool from communication up to almost anything thanks to the applications made for mobile devices. It is well-known that...
Continue Reading
Android apps
Our Mobile Application Monitoring team has been wary of the trend that mobile appstores including iTunes and Google Playstore has been getting malicious apps in their store. Now the deception of mobile apps continue, up to the point that it has reached the stage where it has been pre-installed by your Mobile Phone vendor. Classy...
Continue Reading
Google Play
A malware-bound Android application was discovered hanging around on Google Play for very nearly a year. Amid this time, the malignant application was accessible for download by all Google Play clients. The malware was covered up in an application named “Simple Call Recorder”, distributed by the FreshApps Group.   At the season of disclosure, the...
Continue Reading
Online Dating
In May 2017, Moll and Tactical Tech obtained one million dating profiles from the information representative site USDate, for around $153. USDate asserts on its site that the profiles it’s offering are authentic and that the profiles were made and have a place with genuine individuals effectively dating today and searching for accomplices.   In...
Continue Reading
Social Engineering: Cyber Love gone Phishing Intel
Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication...
Continue Reading
Cheap Android Smartphones discovered to have pre-installed Malware
Unfortunately for Android smartphone users coming from developing countries with usually low privacy protections, a cheap smartphone could come with a hidden cost: Low-end Android smartphone devices mostly sold at developing markets such as Egypt, Brazil, South Africa, Myanmar, etc., contain pre-installed malware. The malware to blame is com.rock.gota, but it masks itself quite ingeniously...
Continue Reading
Money Laundering via Mobile Gaming
For anyone who has played many of the popular smartphone games will definitely agree, the need for in-game currency is essential. Most of the players are hooked upon the notion that in order to advance substantially in the game is to use or purchase their currency. Smartphone gamers often rely but get frustrated with the...
Continue Reading
social media accounts
A popular trend in the mobile app market that recently suffered a data breach is involving fitness apps. Nike Plus, Strava, adidas miCoach and a slew of other apps have been developed to better track the fitness regiments of people globally. Polar, another popular fitness app, tried to up the ante by adding a feature...
Continue Reading
GPS Spoofing: A Growing Threat
With today’s modern technology, long drives are a thing of the past. Traveling and navigating is as easy as typing the location into your mobile device and voila! You now have a clear path towards your destination. It’s all thanks to the good ol’ GPS (Global Positioning System). As long as you have your smartphone...
Continue Reading
1 2 3