
Transatlantic Cable podcast, episode 25
On this episode of podcast, Jeff and David discuss a vulnerability in baby monitors, password re-use in Britain’s GenZ, and more.
215 articles
On this episode of podcast, Jeff and David discuss a vulnerability in baby monitors, password re-use in Britain’s GenZ, and more.
Adult content is an ace in the hole for cybercriminals attacking Android devices.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss a vulnerability in Sonic the Hedgehog, a woman who has a habit of sneaking onto flights and more.
Our infographics will help you find the security solution that suits you best.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Alexa ads and helping police, Intel’s “meltdown,” and more.
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
Google’s new E-Screen Protector prompts users when prying eyes are on their smartphone screen. Is this technology useful?
Can’t resist the convenience of free Wi-Fi? Here’s a way to make it secure.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Modern smartphones are fast, powerful, and capable of practically anything. There is one catch, though: Give them a task and the battery charge evaporates.
Many users of Android devices sooner or later are tempted to root them. Here we discuss the advantages and disadvantages of having root permissions on Android devices — and if your device should be rooted at all.
Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious actors can steal data including passwords; install applications with a full set of permissions; and monitor what the user is interacting with or typing on a keyboard on any Android smartphone or tablet. We repeat: This is not a drill…
Updated October 9, 2018: Google has changed app permission settings in Android Oreo, adding a new group called “Special app access.” More details are available in “App permissions in Android
Meitu, the ‘anime-makeover’ app is doing something that users perhaps didn’t realize they’d signed up to. It’s been found to be harvesting all sorts of data on users, including your
Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Our experts discovered the Trojan several days ago and immediately reported it to Google.
Sometimes Android users have to download murky apps from Google Play. By “murky” we mean unfamiliar apps, apps from small publishers, and so forth — not the likes of Evernote,
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
ACCEPT AND CLOSE
Notifications