Gambling Apps Sneak into Top 100: How Hundreds of Fake Apps Spread on iOS App Store and Google Play
...By Todd Han and Junzhi Lu (Mobile Threats Analysts) Google Play and iOS App store are no strangers to fake apps trying to trick users into downloading ad-... more…Leaking ads
...When we use popular apps with good ratings from official app stores we assume they are safe. This is partially true – usually these apps have been developed... more…PUA Operation Spreads Thousands of Explicit Apps in the Wild and on Legitimate App Stores
...Marcher Trojan targeting users through porn sites, and the year before that popular porn apps were used as lures to compromise millions of mobile users in South Korea. Recently, another... more…Apps’ Battery Consumption Issue in Japan (Part 3)
...assurance of device’s components e.g. from device’s operating system up to its apps. With smartphones, users can install third-party apps that are less dependent on the devices and their respective... more…Ztorg: money for infecting your smartphone
...detected the malware as Trojan.AndroidOS.Ztorg.ad. After some searching, I found some other similar infected apps that were being distributed from the Google Play Store. The first of them, called Privacy... more…Threats From “Free” Android Apps in Japan (Part 2)
...able to download a wide variety of apps, many of which are either inexpensive or free. Not all of these actually meet what users expect in terms of features, and... more…Are third party apps for you?
...across it?” “Why, your Mom shared a post on Facebook about being cautious while using third party apps. I have been searching for a while but can’t find one. So,... more…Bundled OpenSSL Library Also Makes Apps and Android 4.1.1 Vulnerable to Heartbleed
...In an earlier blog post, we mentioned that mobile apps are also affected by the Heartbleed vulnerability. This is because mobile apps may connect to servers affected by the... more…The Severe Flaw Found in Certain File Locker Apps
...smartphones. While users may use the built-in privacy and security settings of their devices, others take it a step further and employ security and privacy protection apps. One of the... more…Fake Apps Take Advantage of Super Mario Run Release
...Earlier this year, we talked about how cybercriminals took advantage of the popularity of Pokemon Go to launch their own malicious apps. As 2016 comes to a close, we... more…AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play
...The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes WAP billing... more…Adware Campaign Identified From 182 Game and Camera Apps on Google Play and Third-Party Stores Like 9Apps
...(detected by Trend Micro as AndroidOS_HiddenAd.HRXAA and AndroidOS_HiddenAd.GCLA) concealed in 182 free-to-download game and camera apps, majority of which were found on the Google Play Store and collectively had millions... more…Why Kids Use Secret Decoy Apps and Why Parents Should Care
...a natural part of growing up. Today, however, some kids hide their private lives behind locked decoy apps catapulting those harmless secret crushes to a whole new level. A decoy... more…Good App/Bad App: Is Investigating Mobile Apps Necessary?
...of consumers’ time on mobile devices apps is spent in apps for gaming, news, productivity, utility, social networking, and more. Apps and Risky Taps We are currently seeing 10.7 million... more…A Look At Repackaged Apps and its Effects in the Mobile Threat Landscape
...Repackaged applications, which are a category of fake applications, play a crucial role in the proliferation of mobile malware. Like fake apps, repackaged apps use social engineering tactics, displaying... more…iOS URL Scheme Susceptible to Hijacking
...This was created to contain damage if an app was compromised, and all apps distributed through the App Store adopt it. However, because of this access control, communication between apps... more…Kam dál?
- Squid Multiple Security Vulnerabilities
- CyanogenMod Installer comes to the Mac in beta form
- Helping Kids Think Critically About Influencers They Follow Online
- Laptops stolen from office more frequently than from airports or restaurants
- Taking Stock of Trump’s Cybersecurity Executive Order So Far
- It’s Out of Cycle Patch Friday
- Microsoft Internet Explorer CVE-2016-3245 Security Bypass Vulnerability
- Apple cofounder Steve Wozniak expounds on his hacking shenanigans and online mischief
- Apple reportedly in talks with major healthcare providers over HealthKit partnerships
- Microsoft Windows Graphics Component CVE-2016-3209 Information Disclosure Vulnerability