You searched for mobile malware/ | SC Media

Your search for mobile malware/ returned 10 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Malware remove

Your search for mobile malware/ returned 10 results

Sort Results:

Relevant Recent
Coronavirus, Malware, Mobile Security, Security News

Spyware disguised as COVID-19 tracker app actually keeps track of users

Another malicious actor has weaponized an otherwise legitimate, interactive coronavirus tracking map created by Johns Hopkins University — this time to deliver Android spyware as part of a campaign that originates out of Libya and seemingly targets individuals within that country. The surveillanceware, known as SpyMax, comes packaged in a trojanized application named “corona live…
Coronavirus, Cybercrime, Malware, Mobile Security, Ransomware, Security News

Password found to rescue victims of malicious COVID-19 tracker app

Members of the IT and cybersecurity communities have successfully obtained a password key for victims of CovidLock Android ransomware, which comes disguised as an app that supposedly helps track cases of the coronavirus, but actually locks users’ phones and demands a ransom in order to restore access. The unlock token has been verified as 4865083501.…
Coronavirus, Cybercrime, Malware, Mobile Security, Ransomware, Security News

Coronavirus tracking app locks up Android phones for ransom

A malicious Android app that supposedly helps track cases of the coronavirus actually locks users’ phones and demands a ransom in order to restore access. (Note: a password key has since been published. See follow-up story here.) Dubbed CovidLock, the newly discovered ransomware performs a screen-lock attack by forcing a change in the password required…
Malware, Security News

Agent Smith Android malware infiltrates 25 million devices

A new variant of mobile malware dubbed “Agent Smith” has already infected 25 million devices, 15 million of which are in India. Check Point researchers discovered the malware disguised as a Google-related application that leverages known Android exploits and automatically replaces installed apps with malicious imitations without users’ knowledge or interaction, according to a July…
Cybercrime, IoT, Malware, Security News

Quirky Fbot IoT botnet kills rival, communicates via blockchain-based DNS

There’s an odd new addition to the extended family of Mirai-inspired IoT botnets, and so far its only obvious victim is a competing botnet whose malware is targeted for removal from any infected devices. Dubbed Fbot, the malware is also unusual because rather than using standard DNS to communicate with the command-and-control server, it instead…
Malware

Exploit kits, Slammer worm top April’s most wanted malware list, Check Point

Enterprises are increasingly being hit with exploit kits, especially Rig EK, and the Slammer worm has resurfaced, according to Check Point’s latest monthly Global Threat Impact Index. After a lull, Slammer has wormed its way back into Check Point’s list of the top three malware families, affecting four percent of businesses. The worm– which exploits…
Next post in Malware