A cloned banking application targeting customers of a large bank in Israel has been removed from Google Play after it was discovered to be stealing users’ log-in credentials.
Browsing Category: Mobile Security
There’s a vulnerability in the way that PayPal handles certain requests from mobile clients that can allow an attacker to bypass the two-factor authentication mechanism for the service and transfer money from a victim’s account to any recipient he chooses.
Researchers from Kaspersky Lab and Citizen Lab released a report today with extensive details on the HackingTeam’s controversial RCS spyware, in particular its extensive global command infrastructure and mobile malware.
Google and Microsoft will implement ‘kill switches’ into their mobile offering in response to petitions from elected officials claiming that a similar Apple feature has deterred theft and violent crime.
Geohot’s latest Android rooting tool relies on a privilege root access, escalation vulnerability affecting the majority of commercial Android builds.
AT&T has notified some of its mobile customers that employees of one of its contractors accessed some customer information, including birth dates and Social Security numbers, in an effort to generate codes that could be used to unlock devices. The company did not specify how many customers were affected by the breach, and it doesn’t appear[...]
It’s difficult to remember now–and seems quaint even if you can recall it–but there was a time in the not-so-distant past when industry analysts and security experts were worried about the coming mobile malware apocalypse. Self-replicating malware would soon be flooding our phones, deleting our coveted ringtones and preventing us all from playing Snake. Mobile phones[...]
Google Play’s new app permissions arrive with some privacy concerns.
The hackers behind last month’s iPhone ransomware campaign – in which many users were asked to pay $100 to unlock their devices – may be behind bars now.
Researchers at Kaspersky Lab reported the first strain of Android ransomware that encrypts the contents of a device. The malware communicates either over Tor, or via HTTP and SMS.