Mobile beasts and where to find them — part one
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
357 articles
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Adult content is an ace in the hole for cybercriminals attacking Android devices.
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
In October 2017, Kaspersky Lab initiated a thorough review of our telemetry logs in relation to alleged 2015 incidents described in the media. These are the preliminary results.
In the modern threat landscape, passive security strategy should be reinforced with new methods, such as endpoint detection and response solutions.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
Applications that offer to pay you for installing other applications tend to shove malware at you.