You searched for mobile malware/ | SC Media

Your search for mobile malware/ returned 18 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Cybercrime remove

Your search for mobile malware/ returned 18 results

Sort Results:

Relevant Recent
Featured, Finance, Security News, Vulnerabilities

Threats without borders: Brazilian banking trojans go global

This burgeoning trend shows that no cyber threat stays localized forever, placing pressure upon security professionals to stay current on global threat intelligence and assume threats relegated to one corner of the globe will one day migrate.
Coronavirus, Cybercrime, Malware, Mobile Security, Ransomware, Security News

Password found to rescue victims of malicious COVID-19 tracker app

Members of the IT and cybersecurity communities have successfully obtained a password key for victims of CovidLock Android ransomware, which comes disguised as an app that supposedly helps track cases of the coronavirus, but actually locks users’ phones and demands a ransom in order to restore access. The unlock token has been verified as 4865083501.…
Coronavirus, Cybercrime, Malware, Mobile Security, Ransomware, Security News

Coronavirus tracking app locks up Android phones for ransom

A malicious Android app that supposedly helps track cases of the coronavirus actually locks users’ phones and demands a ransom in order to restore access. (Note: a password key has since been published. See follow-up story here.) Dubbed CovidLock, the newly discovered ransomware performs a screen-lock attack by forcing a change in the password required…
Malware, Security News

Agent Smith Android malware infiltrates 25 million devices

A new variant of mobile malware dubbed “Agent Smith” has already infected 25 million devices, 15 million of which are in India. Check Point researchers discovered the malware disguised as a Google-related application that leverages known Android exploits and automatically replaces installed apps with malicious imitations without users’ knowledge or interaction, according to a July…
Cybercrime, IoT, Malware, Security News

Quirky Fbot IoT botnet kills rival, communicates via blockchain-based DNS

There’s an odd new addition to the extended family of Mirai-inspired IoT botnets, and so far its only obvious victim is a competing botnet whose malware is targeted for removal from any infected devices. Dubbed Fbot, the malware is also unusual because rather than using standard DNS to communicate with the command-and-control server, it instead…
Botnet2
IoT

New Mirai botnet variants target ARC processors, cryptomining hosts

A newly discovered variant of the Mirai Internet of Things botnet is specifically designed to attack the ubiquitous 32-bit embedded Argonaut RISC Core processor from ARC International, which can be found in well over a billion storage, home, mobile, automotive, and IoT devices. Word of this troublesome development surfaced just days before researchers revealed that another…
Next post in Malware