Banned Chinese Qvod Lives on in Malicious Fakes
Qvod used to be a popular video player and developer in China. Due to piracy allegations and a threatened fine,...
Pre-Installed Malware on Android Devices Expose Flaws in Supply Chain
Pencils come with erasers, books come with pages, and taxes (most of the time) come with returns. People like it...
iOS Users Aren’t So Immune to Threats After All
10 years ago, Fergie and Gwen Stefani were at the top of the charts, and Juno had just been...
How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router
Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...
So You Think Your Phone Is Hacked—Here’s What to Do
Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...
Android Banking Trojan Asks for Selfie With Your ID
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial...
Everyone Loves Selfies, Including Malware!
This blog was written by Bruce Snell. I was talking with some of my coworkers the other day about why...
How Do I Live Safe?
This blog was written by Bruce Snell. You may have seen #HowILiveSafe floating around on Twitter. We thought it would...
Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware
As smartphones get more sophisticated, it’s easy to forget their humble origins. Through today’s mobile apps, we can manage...
The Android Photo Hack: A Picture Says a Thousand Commands
Most people have heard the story of the Trojan horse. We’ve learned the moral of that story: don’t trust gifts...