We are now seeing malware authors target system apps that are required for mobile devices to function properly. By injecting malicious code within these necessary apps, threat actors have reshaped the landscape of pre-installed malware for the worse.
Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.
Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.
Could it be that our dream job awaits via a random SMS message? On the contrary, this SMS phishing attack could cause nightmares for unsuspecting job hunters.
We take a look at what’s going with gaming juggernaut Fortnite’s decision to snub the Google Play store, why allowing installs from unknown sources on Android is a bad idea, and what the future might bring if such a setup ever catches on.
With its release around the corner, we take a close look at the Android P security improvements and how the newest version of Android will better protect the privacy and data of its users.