An ongoing influx of questionable developers submitting fake Android apps on Google Play Store increased its scale, hinting at a widespread malicious group dedicated in mobile theft-terrorism. These fake apps exploit the mobile downloader feature and covertly install BankBot Anubis malware on their victims. How did they got pass Google Play Store’s defense? Hackers up...Continue Reading
Recent research shows, with the widespread use of Apple devices, Mac-specific malware and viruses are now widespread. Apple Macs were once thought to be safer than Windows. Hackers found it more worthwhile to target Windows based operating systems with malware and viruses. A recent study conducted by a veritable IT security firm reported Mac-specific malware...Continue Reading
What is the Triada Android Malware? It is a modular mobile device Trojan which specifically targets the Android platform. It is capable of penetrating the firmware itself that actively uses root access to alter system files. It exists mainly on the device’s RAM, which is why it is almost impossible to detect or remove. Triada...Continue Reading
A wonderful serenity has taken possession of my entire soul, like these sweet mornings of spring which I enjoy with my whole heart. I am alone, and feel the charm of existence in this spot, which was created for the bliss of souls like mine. I am so happy, my dear friend, so absorbed in...Continue Reading
Phishing attacks in the cyber world is relentless as ever, because of new vulnerabilities with the evolution of technology. We can’t deny that these threats exist, because victims are gaining in numbers and falling prey to Android Banking Malware which is being used for phishing activities. It is not a surprise that techniques are combined...Continue Reading
Recently there has been a new Android malware which runs rampant that targets your bank credentials straight right off your fingertips. This is not a new case where phishing apps pretend to be a legitimate banking app just to steal your credentials. However, this time it keeps evolving and gets more deceitful. Adaptive nature of...Continue Reading
On the 17th of August, a lot of content providers and delivery network companies were attacked by a botnet called WireX. A multitude of Android devices was being used to launch the attack to the targeted victims through malicious applications on the devices that are running in the background and is programmed to create DDoS...Continue Reading
SMiShing – a phishing based threat against the Mobile Channel. SMiShing is a phishing based attack that leverages the Short Message Service (SMS) or phone based text message. SMiShing or Smishing has been around for many years now so it is not a new threat but a persistent threat that is evolving. With...Continue Reading
Mobile applications afford a seamless user experience, however, Unofficial, Unauthorised, Rogue, Malicious Mobile Apps provide an emerging threat for cybercrime and brand abuse. Phishing and malware attacks have evolved to target the mobile device and Mobile Apps are a main vector in the delivery of phishing based apps and the delivery of malicious payloads. Mobile...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.