Google will check apps by new developers more thoroughly
In an attempt to thwart Android developers who are set to distribute malicious apps through Google Play, Google will be taking more time when reviewing apps by developers with …
The privacy risks of pre-installed software on Android devices
Many pre-installed apps facilitate access to privileged data and resources, without the average user being aware of their presence or being able to uninstall them. On the one …
Android Q will come with improved privacy protections
Android Q, the newest iteration of Google’s popular mobile OS, is scheduled to be made available to end users at the end of August. While we still don’t know what …
Two thirds of Android antimalware apps are ineffective or unreliable
Choosing an effective Android antimalware app is a shot in the dark for many users and they may end up in more danger of malicious apps, not less. In fact, as the results of …
Researchers expose massive mobile adware and data stealing campaigns with 250 million downloads
Check Point Research has uncovered two massive mobile adware and data stealing campaigns, which have already had over 250 million downloads combined globally. Both target …
Businesses believe they should be patching their Android devices more frequently
The use of Android tablets and handhelds are on the rise in business but security remains a concern. On average, 72% of tablets and handheld devices in businesses (excluding …
Adiantum: A new encryption scheme for low-end Android devices
Google has created an alternative disk and file encryption mode for low-end Android devices that don’t have enough computation power to use the Advanced Encryption …
The problem with vulnerable IoT companion apps
There’s no shortage of exploitable security holes in widely used Internet of Things devices, so it shouldn’t come as a surprise that the communication between many …
Android Trojan steals money from victims’ PayPal account
ESET researchers have unearthed a new Android Trojan that tricks users into logging into PayPal, then takes over and mimics the user’s clicks to send money to the attacker’s …
November 2018: Most wanted malware exposed
Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the Index’s top 10 ranking after researchers …
FlawedAmmy: Dangerous RAT enteres most wanted malware list
The latest Check Point Global Threat Index reveals that while cryptomining malware continues to dominate the rankings, a remote access Trojan has reached the top ten’s list …
Vulnerable controllers could allow attackers to manipulate marine diesel engines
Researchers have found several authentication and encryption vulnerabilities in the firmware of marine diesel engine controllers by Norwegian company Auto-Maskin, as well as …
Featured news
Resources
Don't miss
- The defense industrial base is a prime target for cyber disruption
- Everyone uses open source, but patching still moves too slowly
- Cybersecurity in cross-border logistics operations
- SecureClaw: Dual stack open-source security plugin and skill for OpenClaw
- Design weaknesses in major password managers enable vault attacks, researchers say