Cellular networks under fire from Soft Cell attacks
We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.
Mobile stalkerware: a long history of detection
Does Malwarebytes detect stalkerware? Absolutely, and for good reason. Moreover, we’ve been doing so for a long time—but it’s time to up our efforts.
WhatsApp fix goes live after targeted attack on human rights lawyer
A fix was rolled out for a WhatsApp vulnerability, which was used to inject spyware into mobile devices and target a human rights lawyer.
Fake Instagram assistance apps found on Google Play are stealing passwords
We all want those Instagram likes and followers. But what if the app that’s supposed to be assisting you is also stealing your username and password? As a matter of fact, that’s exactly what we found in three fake Instagram assistance apps found on Google Play.
A week in security (March 25 – 31)
A roundup of news stories from March 25 – 31, including phishing, hacking, Government studies, mobile dangers on official stores and more.
Awakening the beast: BatMobi adware
BatMobi is an Advertisement Software Developer Kit (Ad SDK) that was once clean and safe to use, but suddenly began serving adware in January. Learn more about this elusive threat, including how to clean it off pre-installed apps on mobile devices.
Apple pulls Facebook enterprise certificate
After an app using an internal-only certificate from Facebook made its way into the outside world, Apple has responded by pulling Facebook’s developer certificate with immediate consequences for the social media giant.
The new landscape of pre-installed mobile malware: malicious code within
We are now seeing malware authors target system apps that are required for mobile devices to function properly. By injecting malicious code within these necessary apps, threat actors have reshaped the landscape of pre-installed malware for the worse.
All the reasons why cybercriminals want to hack your phone
Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.
Something else is phishy: How to detect phishing attempts on mobile phones
Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.