What Master Key? – Android Signature Bypass Vulnerability
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...
Internet Browser Cookies: Not What Grandma Used To Make
Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look...
Does Kik Messenger Pose a Danger to Your Kids?
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular...
McAfee Hidden Device Admin Detector – Free Protection from Android Malware
A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating system (OS). What...
Mobile Malware Plays Hide and Seek
Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve...
Smart Perimeter – A Security Fence For Your Digital Devices
Everyone has experienced that gut-wrenching feeling when you look around and realize that one of your prized possessions is missing. ...
Obad.a – What You Need to Know About the Latest Android Threat
With the convenience of our mobile apps, we increasingly rely on our phones for work and play. But did you...
Six Easy Steps to Help Keep Hackers at Bay
Cybercriminals are adopting complex and powerful techniques to “hack,” or take control of online accounts belonging to other people or...
Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble
It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram...
Fake Vertu App Infects Korean and Japanese Android Users
A new threat has surfaced targeting users in Korea and Japan, but this attack, unlike others making the news, is...