Google Play, the official store for Android, distributed over a period of one year more than 200 malicious applications, which cumulatively counted nearly eight million downloads. […] Go to Source Author: Bill Toulas
Category Archives: Mobile
Auto Added by WPeMatico
Forty new variants of the TrickMo Android banking trojan have been identified in the wild, linked to 16 droppers and 22 distinct command and control (C2) infrastructures, with new features designed to steal Android PINs. […] Go to Source Author: Bill Toulas
Fake trading apps on Google Play and Apple’s App Store lure victims into “pig butchering” scams that have a global reach. […] Go to Source Author: Bill Toulas
A widespread Verizon outage is causing iPhones and Android devices to enter SOS mode, preventing them from making mobile calls unless they use WiFi calling. […] Go to Source Author: Mayank Parmar
A new version of the Octo Android malware, named “Octo2,” has been seen spreading across Europe under the guise of NordVPN, Google Chrome, and an app called Europe Enterprise. […] Go to Source Author: Bill Toulas
A new version of the Necro Trojan malware for Android was installed on 11 million devices through Google Play in malicious SDK supply chain attacks. […] Go to Source Author: Bill Toulas
A new Android malware named SpyAgent uses optical character recognition (OCR) technology to steal cryptocurrency wallet recovery phrases from screenshots stored on the mobile device. […] Go to Source Author: Bill Toulas
Google has released the September 2024 Android security updates to fix 34 vulnerabilities, including CVE-2024-32896, an actively exploited elevation of privilege flaw that was previously fixed on Pixel devices. […] Go to Source Author: Bill Toulas
The Russian state-sponsored APT29 hacking group has been observed using the same iOS and Android exploits created by commercial spyware vendors in a series of cyberattacks between November 2023 and July 2024. […] Go to Source Author: Bill Toulas
A new Android malware named NGate can steal money from payment cards by relaying to an attacker’s device the data read by the near-field communication (NFC) chip. […] Go to Source Author: Bill Toulas
