CheckPoint has let off a warning about Android malware called HummingWhale that it says was hidden inside 20 apps and could have been downloaded millions of times. HummingWhale is a variant of HummingGad, which was as bad as its name suggests.
HummingWhale is a much more sophisticated thing that the earlier one, and uses its control and command centre to basically kill your phone through shitty fake apps and ads. CheckPoint gave us the warning about Hummingbird last year. That version presented itself within very legitimate applications on the Google Play store, and the security company estimated that perhaps as many as 10 million people have been affected.
Read moreA few hours after President-elect Donald Trump was briefed by intelligence officials about Russian meddling in the election, a reporter called his cellphone seeking an interview. The call went to voicemail and the reporter did not leave a message. About an hour later, Trump called back.
It's hard to imagine many politicians — particularly one about to become president of the United States — calling back an unknown number on their cellphone. With Trump, it's simply how business gets done, whether he's fielding calls from real estate partners and longtime friends or foreign leaders and congressional lawmakers in the weeks after the election.
Read moreSource code for another Android banking malware has been leaked online via an underground hacking forum. This banking Trojan is designed to steal money from bank accounts of Android devices' owners by gaining administrator privileges on their smartphones.
Apparently, it will attract the attention of many cyber criminals who can recompile the source code or can also use it to develop more customized and advanced variants of Android banking Trojans. The malware's source code was posted online, along with the information on how to use it, meaning Android devices are most likely to receive an increasing number of cyber attacks in upcoming days.
Read moreAfter the success of Pokémon Go, Nintendo's "Super Mario Run" has become the hottest game to hit the market with enormous popularity and massive social impact. The game has taken the world by storm since its launch for iOS devices over a week ago.
Can you believe — it was downloaded more than 40 million times worldwide in its first four days of release. But if you have downloaded a Super Mario Run APK for your Android device, Beware! That's definitely a malware. Since Super Mario Run has currently been released only for iOS devices and is not on Google Play, it caused a lot of disappointment among Android users.
Read moreOne of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL looks weird. Weird links are sometimes a sign of danger. If you see, say, fasebook.com instead of facebook.com, that link is weird.
But what if the fake Web page is hosted on the legitimate page? It turns out this scenario is actually plausible — and the bad guys don’t even need to hack the server that hosts the target page. Let’s examine how it works. The trick here is in the way our normal-looking Web page addresses are an add-on to real the IP addresses the Internet works with.
Read moreGoogle will be launching two new flagship smartwatches in the first quarter of next year, according to Jeff Chang, product manager of Android Wear at Google. In an exclusive interview, Chang said that the new watches will be the flagship Android Wear 2.0 devices and will be the first ones to launch with the new platform.
The new smartwatches had been rumored before, but Google confirmed the upcoming launch today as part of a larger effort to convince consumers that wearables — smartwatches specifically — are still in demand. The new models will not have Google or Pixel branding, but will be branded by the company that is manufacturing them.
Read moreDevices running Android are being targeted by a new version of the Tordow malware, which was originally discovered earlier this year and attempts to obtain root privileges to perform a series of actions, such as stealing passwords.
Tordow 2.0 is primarily a mobile banking Android Trojan that attempts to root the device in order to get full control and then perform a series of tasks that include the following: make phone calls, control SMS messages, steal login credentials, access contacts, encrypt files, visit webpages, manipulate banking data, remove security software, reboot a device, rename files, and act as ransomware.
Read moreThe current generation of Android banking trojans are all equipped with ransomware-like features in order to lock the user's device. Despite possessing such dangerous functions, very few Android banking trojans deploy them, focusing on their primary job of collecting login credentials for banking portals and instant messaging applications.
Nevertheless, when the ransomware feature is activated, the crooks behind the banking trojan do it for a very good reason. In most cases, the trojan's ransomware feature is used as a secondary monetization feature, activated on devices where the original banking trojan has failed to collect login credentials or credit card details.
Read moreHere's some bad news for Android users again. Certain low-cost Android smartphones and tablets are shipped with malicious firmware, which covertly gathers data about the infected devices, displays advertisements on top of running applications and downloads unwanted APK files on the victim's devices.
Security researchers have discovered two types of downloader Trojans that have been incorporated in the firmware of a large number of popular Android devices operating on the MediaTek platform, which are mostly marketed in Russia. The Trojans are capable of collecting data about the infected devices, contacting their command-and-control servers.
Read moreYour Google accounts could have been compromised if you own a Android phone, thanks to a new malware variant known as "Gooligan." The malware has infected more than 1 million accounts, according to research, and that figure is growing by a massive 13,000 devices per day.
In August, Gooligan emerged as a complex malware that infects devices after users download apps from third party stores. It was originally related to a malicious app from 2015 named SnapPea. The malware steals authentication tokens that can be used to access data from Google Play, Gmail, Google Docs, Google Drive and more.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland