Tag: Mobile Development
-
Android ransomware in 2017: Innovative infiltration and rougher extortion
2017 was without a doubt the year of ransomware. Users and businesses worldwide had to cope with the fallout of massive campaigns such as …
-
AndroRAT – A Remote Access Trojan Compromise Android Devices and Inject Root Exploits
A Newly discovered Android Remote Access Trojan called AndroRAT targeting unpatched Android Devices that exploit the publicly disclosed …
-
Not forgotten: Windows 10 Mobile gets new Cumulative Update (changelog)
Microsoft has rolled out a new Windows 10 Mobile cumulative build for all supported Windows Phones taking the OS to build 15254.248. This …
-
Facebook’s free VPN acts like spyware to iOS users in the U.S.
You would think that if a free VPN were being offered to the masses, then safeguarding so many users’ privacy would be a great thing. …
-
Millions of Android Users Hacked by Dangerous Drive-by Cryptomining Attack to Mine Monero
A newly discovered Cryptoming campaign called Drive-by Cryptomining targeted million of Android user to mine Monerocoins and this campaign …
-
Millions of Android devices forced to mine Monero for crooks
No device is safe from criminals looking to make it stealthily mine cryptocurrency for them. However weak its processing power is, it still …
-
Can Android for Work Redefine Enterprise Mobile Security?
Google’s new enterprise mobility management framework Android for Work (AfW) allows employers to effectively manage and mobilize all …
-
Panic attack: Apple scams apply pressure
We’ve seen a number of Apple-related phishes in circulation over the last few days. While most of them already lead to deactivated …
-
Kotlin-based malicious apps penetrate Google market
An open-source programming language, Kotlin is a fully-supported official programming language for Android. Google boasts that Kotlin …
-
Drive-by cryptomining campaign targets millions of Android users
Malvertising and online fraud through forced redirects and Trojanized apps—to cite the two most common examples—are increasingly …
-
Apple knew about iOS source code leak that could have compromised the iPhone’s security
An Apple employee told technology website Motherboard that the company knew of the leak before it was posted on GitHub but the employee did …
●●●