Malicious Developers Release Rogue Bad Piggies Versions
It’s a pig-eat-pig world out there – at least on the mobile app threat front. Right after reports of malicious Bad Piggies on Google Chrome webstore circulated, we found that certain developers also released their own, albeit rogue versions of the said gaming app. On the heels of Bad Piggies‘ launch last month, we saw […] more…Malicious Developers Released Rogue Bad Piggies Versions
It’s a pig-eat-pig world out there – at least on the mobile app threat front. Right after reports of malicious Bad Piggies on Google Chrome webstore circulated, we found that certain developers also released their own, albeit rogue versions of the said gaming app. On the heels of Bad Piggies‘ launch last month, we saw […] more…Be A (H)App(y) Mom
Now that we Moms are becoming tech-savvy, it would be cool to be conversant with the terms related to gadgets we use. One term frequently bandied around is that of apps. Quite a few people have hazy notions about an app. So, let’s demystify apps today, shall we? An app or application is basically a […] more…More information
- Hacker gains access to Bush family emails, photos
- DARPA Wants Hardware With Built-in Security
- Microsoft Windows MAPI DLL Loading CVE-2016-0020 Local Privilege Escalation Vulnerability
- Remote code execution bug found in GPON routers, but how bad is it really?
- CISA Calls for Expedited Adoption of Modern Authentication Ahead of Deadline
- Intel Announces New Hardware-based Security Capabilities
- What is pwning?
- Six tips for keeping mobile devices secure at work
- Fugitive John McAfee’s location revealed by photo meta-data screw-up
- RSA Conference 2021 – Summary of Vendor Announcements