The Latest in IT Security

Posts Tagged ‘mobile equipment’

Android Smartphones are under attack again by rogue applications that once installed are reading information from the phone and sending it back to a pre-assigned location. According to mobile security firm Lookout, as many as 120,000 users may have been infected from a cafeteria selection of at least two dozen applications from the Android Market. […]

Read more ...

We recently received a sample of Android malware currently circulating in the Web, known as DroidDreamLight. Once executed on an infected device, this malware steals mobile-specific information and uses this data for malicious activities. Similar to previous info-stealing Android malware, DroidDreamLight (detected as ANDROIDOS_DORDRAE.L) gathers the following specific information from the affected phone: Device model […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments