Threats

All Attacks Exploit kits Malware Mobile Other Detections

SMS Trojan

These Trojans use the SMS (text) messaging services of a mobile device to send and intercept messages. The user is usually unaware of the behavior.

CONTINUE READING

Mobile spyware

Mobile spyware hides in the background (no shortcut icon is created) on a mobile device and steals information such as incoming/outgoing SMS messages, incoming/outgoing call logs, contact lists, emails, browser history, and photos. They can also potentially record inputted keystrokes, record anything within the distance of the device’s microphone, secretly take pictures in the background, and track the device’s location using GPS. In some cases, spyware apps can even control devices via commands sent by SMS messages and/or remote servers. Stolen information can be sent via data transfer to a remote server or through email.

CONTINUE READING

Mobile ransomware

Mobile ransomware uses scare tactics to pressure victims into paying fees to unlock their mobile device and restore lost data.

CONTINUE READING

Mobile PUP

PUPs use the mobile platform and trusting nature of users to install an app which might have cool functionality but comes bundled with unwanted features such as draining the battery, leaking data, and aggressive advertising. These apps aren’t necessarily malicious but users might want to reconsider installing due to performance hits or bad reputation.

CONTINUE READING

Mobile Bank Trojan

With mobile devices and SMS messaging becoming more mainstream, banks looked to capitalize and offer customers a way to access accounts and authentication transactions.

CONTINUE READING


Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language