WhatsApp warns users: Fake versions of WhatsApp are trying to steal your personal info

Credit to Author: Christopher Boyd| Date: Wed, 13 Jul 2022 15:09:44 +0000

We take a look at warnings of malware-infested WhatsApp downloads offered outside of the Google Play store.

The post WhatsApp warns users: Fake versions of WhatsApp are trying to steal your personal info appeared first on Malwarebytes Labs.

Read more

Drop, crack, d'oh! My broken Android phone epiphany

Credit to Author: JR Raphael| Date: Wed, 13 Jul 2022 03:00:00 -0700

Man, I had one hell of a streak.

All these years — approximately 7,967 since I first started using and writing about Android — and somehow, rather miraculously, I’d never outright broken a phone.

Impressive, I know. But don’t let yourself get wrapped in awe yet, my fellow drop-dreading denizen: My streak of impeccable Android phone protection has officially come to a crashing halt.

Now, I didn’t technically drop my phone, mind you. And I didn’t technically break it myself, either. But it was definitely broken. And it happened on my watch.

To read this article in full, please click here

Read more

Amazon Photos vulnerability could have given attackers access to user files and data

Credit to Author: Jovi Umawing| Date: Thu, 30 Jun 2022 15:25:24 +0000

The retail giant patched a serious flaw in its Amazon Photos app that left user access token exposed to potential attackers.

The post Amazon Photos vulnerability could have given attackers access to user files and data appeared first on Malwarebytes Labs.

Read more

Toll fraud malware: How an Android application can drain your wallet

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 30 Jun 2022 14:00:00 +0000

Toll fraud malware, a subcategory of billing fraud in which malicious applications subscribe users to premium services without their knowledge or consent, is one of the most prevalent types of Android malware – and it continues to evolve.

The post Toll fraud malware: How an Android application can drain your wallet appeared first on Microsoft Security Blog.

Read more

Hermit spyware is deployed with the help of a victim’s ISP

Credit to Author: Jovi Umawing| Date: Wed, 29 Jun 2022 10:03:54 +0000

A new commercial spyware for governments, called Hermit, has spotted in the wild. It affects iOS and all Android versions.

The post Hermit spyware is deployed with the help of a victim’s ISP appeared first on Malwarebytes Labs.

Read more

The surveillance-as-a-service industry needs to be brought to heel

Credit to Author: Jonny Evans| Date: Fri, 24 Jun 2022 09:40:00 -0700

Here we go again: another example of government surveillance involving smartphones from Apple and Google has emerged, and it shows how sophisticated government-backed attacks can become and why there’s justification for keeping mobile platforms utterly locked down.

What has happened?

I don’t intend to focus too much on the news, but in brief it is as follows:

  • Google’s Threat Analysis Group has published information revealing the hack.
  • Italian surveillance firm RCS Labs created the attack.
  • The attack has been used in Italy and Kazakhstan, and possibly elsewhere.
  • Some generations of the attack are wielded with help from ISPs.
  • On iOS, attackers abused Apple’s enterprise certification tools that enable in-house app deployment.
  • Around nine different attacks were used.

The attack works like this: The target is sent a unique link that aims to trick them into downloading and installing a malicious app. In some cases, the spooks worked with an ISP to disable data connectivity to trick targets into downloading the app to recover that connection.

To read this article in full, please click here

Read more

Android apps with millions of downloads exposed to high-severity vulnerabilities

Credit to Author: Katie McCafferty| Date: Fri, 27 May 2022 16:00:00 +0000

Microsoft uncovered high-severity vulnerabilities in a mobile framework used by multiple large mobile service providers in pre-installed Android System apps that potentially exposed users to remote or local attacks.

The post Android apps with millions of downloads exposed to high-severity vulnerabilities appeared first on Microsoft Security Blog.

Read more

AirTag stalking: What is it, and how can I avoid it?

Credit to Author: Christopher Boyd| Date: Tue, 17 May 2022 14:12:25 +0000

AirTag stalking is in the news as bills look to close loopholes used by stalkers. What are AirTags, and how can they be used to track people?

The post AirTag stalking: What is it, and how can I avoid it? appeared first on Malwarebytes Labs.

Read more

Beware – Banking Trojans using enhanced techniques to spread malware.

Credit to Author: Akshay Singla| Date: Fri, 13 May 2022 12:46:13 +0000

In our Open-Source Threat Hunting, Quick Heal Security Researchers encountered a banking Trojan named Aberebot capable of stealing…

The post Beware – Banking Trojans using enhanced techniques to spread malware. appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more