Mobile Menace Monday: How dare that rootin’ Dirty COW

If you follow cybersecurity news, you may have heard of the latest Linux exploit referenced under CVE-2016-5195, which has been dubbed Dirty COW. The name is derived based on the exploitation of the copy-on-write (COW) mechanism in Linux.

Read more

Mobile Menace Monday: beware of monitoring apps

We mobile researchers sometimes classify apps in order to warn users of its presence because of its potential harm, but leave it up to the users’ discretion to remove. This is the case when it comes to a subcategory of PUPs called monitors. Monitoring apps are those that can be great tools if you lose your phone, but could also be easily used to spy on an unsuspecting target.

Read more

Mobile Menace Monday: Pokemon NO NO

A new mobile Trojan has been found using the popular game Pokémon Go as bait. Rest assured that this won’t be the last mobile malware exploiting Pokémon Go.

Read more

Malware uses Google Talk to make malicious phone calls

We found a new piece of mobile malware using Google Talk to make your phone make unwarranted and malicious outgoing calls.

Read more

Android Trojan FakeApp masquerading as legitimate

A variant of Android/Trojan.FakeApp is stealing the identities of popular applications (apps) such as TrueCaller and Torque Pro. As soon as the FakeApp is installed a shortcut with an icon stolen from one of these popular apps is created, and a notification pops up. The notification also appears whenever the shortcut icon is clicked.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language