Triada: organized crime on Android
You know how armies typically move: first come the scouts to make sure everything is ok. Then the heavy troops arrive; at least that was how it used to be
225 articles
You know how armies typically move: first come the scouts to make sure everything is ok. Then the heavy troops arrive; at least that was how it used to be
It seems that there is now a typical scenario for malware evolution. First cybercriminals release a skeleton with basic functions — that piece of malware behaves quietly, showing almost no
At the Security Analyst Summit 2016 our Global Research and Analysis Team (GReAT) has published extensive research on the Adwind Remote Access Tool (RAT). This malicious tool is also known
Nowadays, it seems like every company has a smartwatch. They can do everything from tracking your heart rate to making phone calls and gasp telling time. But did you know
Today a smartphone has become an integral part of our life. We constantly use phones for work, study, travel, and they are increasingly starting to know more about us than
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it
There was a time when Google was simply a search engine. Albeit one that we always knew collected a lot of data to make search results — and ads —
British scientists proved that Android devices are highly dangerous when it comes to you and your data. It’s no joke — researchers at the University of Cambridge did serious research
What if you could be sure that your kids use Internet safely while their smartphones are protected from fraud, unwanted calls and SMS? Moreover, what if you could find your
I wonder what will happen when there are no more infosec problems. Will our Threatpost.com news blog convert to a digest of kitty cats? Is this bright future feasible at
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
“Three billion human lives ended on August 29, 1997. The survivors of the nuclear fire called the war Judgment Day. They lived only to face a new nightmare: the war
What a dreadful week this one has been for the infosec industry, my friends. Following an amusing week of discovering bugs, zero-days and other researcher-coveted curios, here comes the painful
We all know that cybercriminals would love to infect your PC or Laptop with a virus or trick you to install a malware. What you might not know is that
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Threatpost journalists Chris Brook and Brian Donohue discuss security and privacy at Google I/O conference, the IRS and Carefirst BlueCross BlueShield Data Breach, Sections 215 of the PATRIOT Act and
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
According to a survey conducted by Kaspersky Lab and B2B International over a 12-month period, 22% of parents polled indicated that their children were affected by cyber incidents. Examples of these
For children, modern phones and tablets often serve predominantly as universal game consoles. While there are hundreds of thousands of games to choose from, not all games are suitable for children: some
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.