We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.
A fix was rolled out for a WhatsApp vulnerability, which was used to inject spyware into mobile devices and target a human rights lawyer.
We all want those Instagram likes and followers. But what if the app that’s supposed to be assisting you is also stealing your username and password? As a matter of fact, that’s exactly what we found in three fake Instagram assistance apps found on Google Play.
We are now seeing malware authors target system apps that are required for mobile devices to function properly. By injecting malicious code within these necessary apps, threat actors have reshaped the landscape of pre-installed malware for the worse.
Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.
Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.