It's been more than two years since the existence of the Ghost Push mobile Trojan was made public – but millions of devices are still vulnerable.
The Trojan infected up to 600,000 Android smartphone and tablet users per day at its peak. The malware runs a malicious DEX file after installation, an Android program executable, to root victim devices and run malicious processes on startup. Ghost Push is also able to install unwanted apps and programs, display adverts, spy on users, and steal personal information. The Trojan also pushes ads in the Android notification bar to trick users into paying for additional services," such as porn or other third-party software.
Read moreGoogle Play was recently found to be hosting more than 400 apps that turned infected phones into listening posts that could siphon sensitive data out of the protected networks they connected to.
One malicious app infected with the so-called DressCode malware had been downloaded from 100,000 to 500,000 times before it was removed from the Google-hosted marketplace. Known as Mod GTA 5 for Minecraft PE, it was disguised as a benign game, but included in the code was a component that established a persistent connection with an attacker controlled server. The server then had the ability to bypass so-called network address translation protections.
Read moreDon't miss an important update at the bottom of this article, which includes an official statement from Xiaomi. Do you own an Android Smartphone from Xiaomi, HTC, Samsung, or OnePlus?
If yes, then you must be aware that almost all smartphone manufacturers provide custom ROMs like CyanogenMod, Paranoid Android, MIUI and others with some pre-loaded themes and applications to increase the device's performance. But do you have any idea about the pre-installed apps and services your manufacturer has installed on your device?, What are their purposes? And, Do they pose any threat to your security or privacy?
Read moreSometimes Android users have to download murky apps from Google Play. By “murky” we mean unfamiliar apps, apps from small publishers, and so forth — not the likes of Evernote, Dropbox, banking apps, or other popular programs. It might be a specialized engineering calculator, for example, or an alternative music player.
Many such apps exist in the Google Play store — thousands of them, in fact. And choosing isn’t easy. Seasoned Android users recommend going with the apps that have been downloaded the most times, the highest-rated apps, or the apps reviewed by the most people. It seems to make perfect sense.
Read moreThe Check Point mobile threat prevention research team discovered a new Android malware on Google Play, called “DressCode,” which was embedded into more than 40 apps, and found in more than 400 additional apps on third party app stores.
Check Point notified Google about the malicious apps, and some have already been removed from Google Play. The oldest apps were uploaded to Google Play on April 2016, where they remained undetected until recently. Some of the apps reached between 100,000 and 500,000 downloads each. Between 500,000 and 2,000,000 users downloaded the malicious apps from Google Play.
Read moreGoogle has removed an Android app from the Play Store after security researchers from Symantec noticed the application was secretly scanning and stealing personal photos and videos from users' devices.
The app is HTML Source Code Viewer, and it was developed by a developer named Sunuba Gaming. At the time Google removed it, the application had between 1,000 and 5,000 installs. The app's moniker is self-explanatory, and it allowed users to view the source code of a Web page. Users only had to enter a URL, and the application retrieved that site's source code and printed it on the screen. According to Symantec, the app did a little more than that.
Read moreWhen it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough for them to accomplish their goals.
For example, some crooks have been using AirDroid — a powerful app for remote smartphone management — to steal money from freelancers. The scheme is simple. Criminals start by finding a potential victim on a website where employers look for freelancers and freelancers look for work. A crook claims to be an employer in search of a specialist for a simple project.
Read moreRansomware is found not only on desktops, but also on mobile devices — and it is also on the rise there. Today let’s discuss the most prevalent types of mobile ransomware. What is mobile ransomware?
A lot of people already know what ransomware is — and awareness is only growing. The most widespread — and most annoying — type of desktop ransomware is the cryptolocker, malware that encrypts your data and offers to restore it if you pay ransom. Another type of ransomware, the blocker, blocks either browsers or operating systems from working and demands a ransom to return access.
Read moreThe Marcher Android banking trojan received a significant update last month and is now capable of targeting UK banks, along with its usual list that has until now included banks from Germany, Austria, France, Australia, Turkey, and a few other more.
To better understand why the trojan is now extremely dangerous and why UK users should be very wary of what they install on their phones, a short lesson in Marcher history is needed. The malware first appeared in late 2013, and in the beginning, it was only able to show overlays on top of the user's Google Play app, asking them to enter their credit card details.
Read moreCritical security flaws impacting LG devices could be exploited to compromise user devices, leading to device hijacking and data theft, researchers have discovered. Researchers from Check Point disclosed two vulnerabilities which "can be used to elevate privileges on LG mobile devices to attack them remotely."
The vulnerabilities are unique to LG devices. In 2016, according to comScore, LG accounted for a 28.5 percent share in the smartphone market in the United States, settling behind Apple and Samsung. Check Point mobile security researcher said the first security weakness was discovered in LG's privileged service.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland