A group of security researchers have discovered an alarming vulnerability in Apple’s mobile and desktop operating systems.
A research group has explained how it tested a series of attacks that were able to bypass security checks, steal passwords, and even critical app data. The vulnerability was discovered to exist in Apple devices including the iPhone, iPad, and Mac computers.
Due to the way Apple built apps to communicate with each other, the paper writes, researchers were able to “steal such confidential information as the passwords for iCloud, email and bank, and the secret token of Evernote.”
A new mobile Trojan horse has been discovered. It comes pre-loaded onto low-cost Chinese-made Android smartphones popular in Asia and Africa.
The trojan, dubbed DeathRing, is a Chinese Trojan that masquerades as a ringtone app and comes pre-installed. DeathRing malware app cannot be uninstalled or removed by the end user or by antimalware software….
The triple whammy of seasonal parties, end of year work deadlines and festive gift buying is enough to distract anyone online. The bad news is that those online criminals sitting at the other end of the internet are well aware of this, and are more than primed and ready to strike….
The popular ride-sharing service Uber has been hit by various controversies lately, but now things have gone even worse for the company: A security researcher made a worrying discovery this week and claims, “Uber’s app is literally malware.”
The ride-hailing company is in disputes of handling privacy of its customers data. A Phoenix-based security researcher Joe Giron found that a surprising amount of users’ data is being collected by the company’s mobile application for Android.
It really seems strange and unnecessary to collect access to the camera, phone calls, Wi-Fi, accounts….
Mobile security firm Lookout warned that Android-powered smartphones or tablets are being targeted with malicious software that puts them at the mercy of hacker overlords.
The persistence and sophistication of malware dubbed NotCompatible is another sign that cyber criminals are hitting smartphones and tablets with tactics and tenacity once reserved for desktop computers, according to Lookout security researcher Jeremy Linden.
“Mobile is becoming the dominant computing platform and, because it is so ubiquitous, we are seeing heightened malware targeting it,” Linden told AFP.
Mobile malware is becoming very advanced and rapidly reaching parity with PC malware. Information that can be mined from hacked smartphones includes where people have been, pictures taken and call logs.
“It is the jackpot when it comes to valuable data, so obviously bad guys are doing a lot of work to get at it,” Linden said.
Often, free apps have a privacy cost. When you install an app, you probably never read the app’s terms and conditions. You merely click “Agree.” In the terms and conditions, the app developer typically reveals what data you are voluntarily handing over to them such as your online activities, location, contact list, text messages, and more….