A new version of the Android malware “Godfather” creates isolated virtual environments on mobile devices to steal account data and transactions from legitimate banking apps. […] Go to Source Author: Bill Toulas
Category Archives: Mobile
Auto Added by WPeMatico
The latest version of the ‘Crocodilus’ Android malware has introduced a new mechanism that adds a fake contact on the infected device’s contact list to deceive victims. […] Go to Source Author: Bill Toulas
The Russian government has introduced a new law that makes installing a tracking app mandatory for all foreign nationals in the Moscow region. […] Go to Source Author: Bill Toulas
Wisconsin wireless provider Cellcom has confirmed that a cyberattack is responsible for the widespread service outage and disruptions that began on the evening of May 14, 2025. […] Go to Source Author: Lawrence Abrams
Google is announcing improvements for the Advanced Protection feature in Android 16 that strengthen defenses against sophisticated spyware attacks. […] Go to Source Author: Bill Toulas
Google has released the May 2025 security updates for Android with fixes for 45 security flaws, including an actively exploited zero-click FreeType 2 code execution vulnerability. […] Go to Source Author: Bill Toulas
Microsoft has announced that it will discontinue the password storage and autofill feature in the Authenticator app starting in July and will complete the deprecation in August 2025. […] Go to Source Author: Bill Toulas
A new Android malware has been discovered hidden inside trojanized versions of the Alpine Quest mapping app, which is reportedly used by Russian soldiers as part of war zone operational planning. […] Go to Source Author: Bill Toulas
A new malware-as-a-service (MaaS) platform named ‘SuperCard X’ has emerged, targeting Android devices via NFC relay attacks that enable point-of-sale and ATM transactions using compromised payment card data. […] Go to Source Author: Bill Toulas
Google is rolling out a new security mechanism on Android devices that will automatically reboot locked, unused devices after three consecutive days of inactivity, restoring memory to an encrypted state. […] Go to Source Author: Bill Toulas
