The SMSZombie trojan is taking over administrator privileges of smartphone users in China to steal money through SMS messages.
Kaspersky Lab researchers say they have detected five new variants of a mobile trojan known as ZitMo, and four of them target BlackBerry devices, which typically have gone untouched by hackers. Users in Europe are being targeted.
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
While many mobile applications do what they're supposed to, countless others carry malware.
2011 was marked by a rise in hacktivism, an evolution in cyber crime toolkits, a preponderance of mobile malware -- namely on the Android -- and increased risks in social media. This resulted in "unprecedented public attention to [these] problems," said James Lyne, director of technology strategy at Sophos. In this video, Lyne describes how organizations can use this newfound cyber awareness to best respond to the challenges.
Android users have taken to Twitter to air their grievances about their phones, prompted by an unusual offer from a Microsoft employee
Rogue developers uploaded malicious versions of at least a dozen popular games to the Android Market.
Mobile malware authors have skipped the rudimentary phase and are immediately creating threats that mimic complex malicious code common in the traditional PC environment. But defense technologies are countering with sophistication of their own.
Twitter has acquired a start-up that makes security and management solutions for Android devices.
Google's open source programs manager launched a written tirade against mobile anti-virus companies, which he called "charlatans" and "scammers."
In this interview, Harry Sverdlove, CTO of Bit9, describes to SC Magazine Executive Editor Dan Kaplan what the bring-your-own-device revolution means for organizations, and how they should best address the threat posed by endpoints such as the Android.
Three out of every four new malware strains created during the third quarter was a trojan, says a new report from PandaLabs.
A new piece of mobile malware targets Russian users of Symbian and Windows Mobile phones, and an Android strain may be in development.
A malicious app, masquerading as the online streaming video service Netflix, aims to steal information from Android users, according to Symantec research.
The "bring your own device" revolution means that skilled malware writers are going to pay more and more attention to pushing their wares on mobile endpoints. How should businesses respond?
Securing Android - or any mobile device - will go beyond standard protection methods, says Gareth Maclachlan COO, AdaptiveMobile.
A variant of the SpyEye trojan is targeting the Google Android operating system.
A new, malicious Android app disguises itself as Google+ and is capable of stealing data, as well as answering and recording incoming phone calls.
Researchers have discovered a new variant of the insidious Zeus trojan designed to run on Google Android smartphones, but the threat is minimal in the United States.
Employee emails, contact lists, authentication credentials and sensitive company documents are some of the primary assets that must be protected on mobile devices.
On the heels of an invasion of malicious apps in Google's Android market that occurred in early March, a new variant was detected over the weekend.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards