Mobile Menace Monday: Securing your privacy on Android

If you work at a company that allows you to use your mobile device to login email, access company data, and/or connect to company Wi-Fi, you could be more of a risk than you think.
Categories:
Cybercrime
Mobile
Tags: AndroidcybersecurityMobileprivacy… Continue reading Mobile Menace Monday: Securing your privacy on Android

Mobile Menace Monday: Preinstalled adware and sometimes worse

BLU manufactured mobile devices have been discovered with preinstalled adware known as Android/Adware.YeMobi.
Categories:
Cybercrime
Mobile
Tags: adwareAndroidGoogle PlayMobilepreinstalledsystem apptriple m

(Read more…)

The post Mobile Menace Mo… Continue reading Mobile Menace Monday: Preinstalled adware and sometimes worse

Mobile Menace Monday: Facebook Lite infected with Spy FakePlay

A lite version of the popular mobile app Facebook has been infected with Android/Trojan.Spy.FakePlay.
Categories:
Cybercrime
Mobile
Tags: AndroidfacebookFacebook LiteGoogleMobilemobile menace mondaytriple mtrojan

(Read more…)

The post Mobile Men… Continue reading Mobile Menace Monday: Facebook Lite infected with Spy FakePlay

Mobile Menace Monday: AndroRAT Evolved

An increasing amount of mobile malware known as Android/Trojan.AndroRAT has been seen in the wild lately.  AndroRAT is a contraction of Android and RAT (Remote Access Tool).  This piece of malware is far from new, but has gradually become more evolved over the years. AndroRAT History As the story goes (according to its GitHub page),…

Categories:

Tags:

(Read more…)

Continue reading Mobile Menace Monday: AndroRAT Evolved

Mobile Menace Monday: Adups, old and new

Recently, Kryptowire discovered a malicious app found on China-made mobile devices running the Android OS. This is a baked-in system app used to update the device’s firmware but is found to also steal personal information, among other things.

Categories:

Tags:

(Read more…)

Continue reading Mobile Menace Monday: Adups, old and new

Mobile Menace Monday: How dare that rootin’ Dirty COW

If you follow cybersecurity news, you may have heard of the latest Linux exploit referenced under CVE-2016-5195, which has been dubbed Dirty COW. The name is derived based on the exploitation of the copy-on-write (COW) mechanism in Linux.Categories: Cy… Continue reading Mobile Menace Monday: How dare that rootin’ Dirty COW

Mobile Menace Monday: Beware of monitoring apps

We mobile researchers sometimes classify apps in order to warn users of its presence because of its potential harm, but leave it up to the users’ discretion to remove. This is the case when it comes to a subcategory of PUPs called monitors. Monitoring … Continue reading Mobile Menace Monday: Beware of monitoring apps