How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router
Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...
So You Think Your Phone Is Hacked—Here’s What to Do
Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...
Android Banking Trojan Asks for Selfie With Your ID
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial...
Everyone Loves Selfies, Including Malware!
This blog was written by Bruce Snell. I was talking with some of my coworkers the other day about why...
How Do I Live Safe?
This blog was written by Bruce Snell. You may have seen #HowILiveSafe floating around on Twitter. We thought it would...
Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware
As smartphones get more sophisticated, it’s easy to forget their humble origins. Through today’s mobile apps, we can manage...
The Android Photo Hack: A Picture Says a Thousand Commands
Most people have heard the story of the Trojan horse. We’ve learned the moral of that story: don’t trust gifts...
80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety
Let’s imagine you traveled back in time, smartphone in pocket. Let’s say a medieval peasant sees you using this strange...
Obfuscated Malware Discovered on Google Play
The McAfee Labs Mobile Malware Research team found early this week on Google Play a set of malware published by...
‘Cat-Loving’ Mobile Ransomware Operates With Control Panel
Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a...