The Latest in IT Security

1

Android smartphones in a number of countries around the world have been targeted by powerful PREDATOR spyware, researchers from Google’s Threat Analysis Group (TAG) have warned. The company’s recent report says that the spyware, allegedly developed by a commercial entity – a company called Cytrox, headquartered in Skopje, North Macedonia – is capable of recording […]

Read more ...

1

Cybersecurity researchers have discovered a way to run malware on Apple’s iPhones, even when the device is switched off. A report published by the Technical University of Darmstadt in Germany details an exploit that takes advantage of the iPhone’s low-power mode (LPM) to track location and perform various malware attacks. LPM allows certain smartphone facilities […]

Read more ...

1

More than 200 Android apps masquerading as fitness, photo editing, and puzzle apps have been observed distributing spyware called Facestealer to siphon user credentials and other valuable information. “Similar to Joker, another piece of mobile malware, Facestealer changes its code frequently, thus spawning many variants,” Trend Micro analysts Cifer Fang, Ford Quin, and Zhengyu Dong […]

Read more ...


Categories

TUESDAY, MAY 24, 2022
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments