Rooting your Android: Advantages, disadvantages, and snags
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
219 articles
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.
The most sophisticated attack ever seen on any endpoint, this modular spyware lurks on Android and iOS.
As our research shows, the actual costs of a cybersecurity incident to a financial institution in the United States can add up to as much as $1,165,000.
Modern Android users have, on average, 66 apps installed on their devices. Most of these apps start working without users launching them.
Why does a ‘make-over’ app require your location, private data and your phones IMEI number? Something’s not right.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
Criminals are stealing money from freelancers — by offering them a job.
Apple is no longer going to encrypt the kernel of its iOS operating system. This looks like another step toward turning iOS into something similar to Android.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
Charging your smartphone’s battery over USB can be dangerous: Thieves can steal your files, infect your smartphone with something nasty — or even brick it.
Check if your PC is infected with the help of our free security tools.
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
What if you could be sure that your kids are using the Internet safely and that their mobile phones are protected from fraud, unwanted calls and SMS? Kaspersky Safe Kids can help.
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
Acecard is one of the most advanced banking trojans. It’s capable of overlaying more than 30 banks’ and financial systems’ apps and is spread via Google Play.
At SAS 2016 our GReAT experts talk about a Java-based multi platform malware used by hundreds of cybercriminals for a handful of purposes
Researcher shows that using data from motion sensors built into a smartwatch one can recognize numbers you press on a numpad. How can that affect your security?