Cloak and Dagger: A hole in Android
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.
65 articles
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.
Modern Android users have, on average, 66 apps installed on their devices. Most of these apps start working without users launching them.
Kaspersky Lab researchers disclose vulnerabilities in connected car apps.
Downloaded a program called Netflix Login Generator? Delete it immediately!
Why does a ‘make-over’ app require your location, private data and your phones IMEI number? Something’s not right.
When Google announced Allo, we thought the search giant was finally paying attention to users’ concerns about privacy. Reality turned to be quite different.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
You aren’t the only one to catch the PokémonGo craze. So have criminals.
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
App stores offer all the promise of a virtually unlimited range of games and tools, but are rife with pitfalls too. These include bad apps, ballooning costs, and malicious apps, particularly on Android devices.
Last week, we had a look at private messengers; today, we decided to compile a list of good apps to protect you, your iPhone and its content.
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
Today is National Senior Citizens Day, and what better way to recognize all that seniors have done and still are doing than by helping them be more productive and healthy
We are constantly on our mobile devices or desktops and much of this time is spent using apps or online games. In our latest poll, Kaspersky Lab asks, how much you’ve
Windows Phone doesn’t have the market reach of Android-powered devices, or the slick appeal of the Apple iPhone, but the availability of multiple Windows 8 devices late this year could
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there