The SMSZombie trojan is taking over administrator privileges of smartphone users in China to steal money through SMS messages.
Kaspersky Lab researchers say they have detected five new variants of a mobile trojan known as ZitMo, and four of them target BlackBerry devices, which typically have gone untouched by hackers. Users in Europe are being targeted.
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
While many mobile applications do what they're supposed to, countless others carry malware.
2011 was marked by a rise in hacktivism, an evolution in cyber crime toolkits, a preponderance of mobile malware -- namely on the Android -- and increased risks in social media. This resulted in "unprecedented public attention to [these] problems," said James Lyne, director of technology strategy at Sophos. In this video, Lyne describes how organizations can use this newfound cyber awareness to best respond to the challenges.
Android users have taken to Twitter to air their grievances about their phones, prompted by an unusual offer from a Microsoft employee
Rogue developers uploaded malicious versions of at least a dozen popular games to the Android Market.
Mobile malware authors have skipped the rudimentary phase and are immediately creating threats that mimic complex malicious code common in the traditional PC environment. But defense technologies are countering with sophistication of their own.
Twitter has acquired a start-up that makes security and management solutions for Android devices.
Google's open source programs manager launched a written tirade against mobile anti-virus companies, which he called "charlatans" and "scammers."
In this interview, Harry Sverdlove, CTO of Bit9, describes to SC Magazine Executive Editor Dan Kaplan what the bring-your-own-device revolution means for organizations, and how they should best address the threat posed by endpoints such as the Android.
Three out of every four new malware strains created during the third quarter was a trojan, says a new report from PandaLabs.
A new piece of mobile malware targets Russian users of Symbian and Windows Mobile phones, and an Android strain may be in development.
A malicious app, masquerading as the online streaming video service Netflix, aims to steal information from Android users, according to Symantec research.
The "bring your own device" revolution means that skilled malware writers are going to pay more and more attention to pushing their wares on mobile endpoints. How should businesses respond?
Securing Android - or any mobile device - will go beyond standard protection methods, says Gareth Maclachlan COO, AdaptiveMobile.
A variant of the SpyEye trojan is targeting the Google Android operating system.
A new, malicious Android app disguises itself as Google+ and is capable of stealing data, as well as answering and recording incoming phone calls.
Researchers have discovered a new variant of the insidious Zeus trojan designed to run on Google Android smartphones, but the threat is minimal in the United States.
Employee emails, contact lists, authentication credentials and sensitive company documents are some of the primary assets that must be protected on mobile devices.
On the heels of an invasion of malicious apps in Google's Android market that occurred in early March, a new variant was detected over the weekend.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- IBM will invest $3 billion in new IoT unit
- Infostealer Laziok targets energy companies
- 30 percent of practitioners say they would pay cyber extortionists to retrieve their data
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down