Malware managed to sneak into Apple's official App Store after devs used a spiked version of Xcode, Apple's official app development tool, downloaded from third party sites.
A new malware called Key Raider has been found stealing Apple account credentials from iOS devices. The good news is that it only affects jailbroken iPhones. Is jailbreaking still worth it?
Online banking is not without risks. As much as it offers ease and convenience, when it comes to security, fraudsters and cybercriminals are very much on the lookout for unknowing users they can steal from.
Major software and OS vulnerabilities and the prevalence of adware and potentially unwanted apps make up the most notable stories of the mobile threat landscape over the first half of 2015.
What is the RCSAndroid spying tool capable of? Who is affected? Which devices are vulnerable? Here are some quick facts you need to know about the Hacking Team’s leaked mobile malware suite:
Attackers are finding more security gaps to abuse, whether they're in existing public-facing technologies or in new developments in the Internet of Things.
Earlier this year, a PoC malware that could infect Apple Macs through a Thunderbolt accessory was introduced. The sequel to the “Thunderstrike“ exploit doesn’t need physical access and can now be delivered online—just like PC threats.