Loapi — this Trojan is hot!
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
230 articles
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
Google’s new E-Screen Protector prompts users when prying eyes are on their smartphone screen. Is this technology useful?
Can’t resist the convenience of free Wi-Fi? Here’s a way to make it secure.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Modern smartphones are fast, powerful, and capable of practically anything. There is one catch, though: Give them a task and the battery charge evaporates.
Many users of Android devices sooner or later are tempted to root them. Here we discuss the advantages and disadvantages of having root permissions on Android devices — and if your device should be rooted at all.
Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious actors can steal data including passwords; install applications with a full set of permissions; and monitor what the user is interacting with or typing on a keyboard on any Android smartphone or tablet. We repeat: This is not a drill…
Updated October 9, 2018: Google has changed app permission settings in Android Oreo, adding a new group called “Special app access.” More details are available in “App permissions in Android
Meitu, the ‘anime-makeover’ app is doing something that users perhaps didn’t realize they’d signed up to. It’s been found to be harvesting all sorts of data on users, including your
Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Our experts discovered the Trojan several days ago and immediately reported it to Google.
Sometimes Android users have to download murky apps from Google Play. By “murky” we mean unfamiliar apps, apps from small publishers, and so forth — not the likes of Evernote,
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it can be
Nowadays, it seems like every company has a smartwatch. They can do everything from tracking your heart rate to making phone calls and gasp telling time. But did you know that they
Today a smartphone has become an integral part of our life. We constantly use phones for work, study, travel, and they are increasingly starting to know more about us than we
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it and said, “man
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
The most scandalous threat is tickling the nerves of Android phones owners: Zimperium zLabs reported six gaping hole in Google OS in April 2015. They also told Forbes that while