
Mobile banking Trojans, explained
Everything you need to know about mobile banking Trojans and how to fight them.
655 articles
Everything you need to know about mobile banking Trojans and how to fight them.
Criminals are stealing money from freelancers — by offering them a job.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
Your smartphone knows everything about you: whom you call and what messages you send, which websites you visit and what photos you take, including even when and where you do it. This data may be used against you.
A pirate app store that has tricked Apple and passed its code review is now stealing user’s credentials using FairPlay Man-in-the Middle attack.
Kaspersky Lab’s Anti-malware Research Team reported detection of “one of the most dangerous Android banking Trojans ever seen”, called Acecard.
Researcher shows that using data from motion sensors built into a smartwatch one can recognize numbers you press on a numpad. How can that affect your security?
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
With all of the security improvements, criminals find and exploit various ways of circumventing them to deliver their malicious creations to end-users’ phones, which puts at risk both the device owners and the businesses they are involved with.
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers to this question.
With an increasing amount of people using mobile devices for work, security of the data stored therein has become a hot topic. And since people also use mobile devices to access their finances, that makes them a prime target for cybercriminals. Android is the most popular mobile OS in the world right now, and the most targeted. How are users attacked and what is the current security status of Android?
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Let’s identify the main IT security and protection trends at MWC 2015.
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
Whether you’re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.