An Android Banking Trojan with an already extensive toolkit recently gained a ransomware module. While banking malware is an all too prevalent a threat for mobile devices, ransomware isn’t a technique commonly deployed against mobile devices, making this particular piece of malware notable. Banking trojans come in the... Read more...
Google is engaged in a never ending game of cat and mouse with threat actors on its Play Store who employ different techniques to sneak malware-ridden apps onto the app store. We fairly regularly write about newly discovered batches of malicious apps that went unrecognized as such long enough to infect hundreds of... Read more...
It seems these days that security researchers are sounding the alarm on malicious Androids apps in Google Play at an alarming rate. So it goes again with a fresh reporting highlighting over two dozen Android apps packaged with malware, and which have collectively been downloaded and installed 10 million times. Suffice... Read more...
It's that time again, time for the listing of apps that you might have downloaded that contain malware or methods in which to plant malware on your phone. Specifically for those who utilize Android and the Google Play Store these apps flew under the radar just long enough to wreak havoc on at least 300,000 devices. We... Read more...
Most of us likely babysat, mowed lawns, or worked part-time jobs to earn money as teens. However, teens in 2022 have some rather interesting and unexpected ways to make some extra cash. Minors are reportedly developing, discussing, and selling malware through a Discord server. What happened to paper... Read more...
If you're in the business world you've heard of Cisco. If you're in the consumer world, you probably still have heard of Cisco, or at least have probably used one of the company's products, especially considering it acquired about 218 organizations since 1993. The most well known consumer product organization acquired... Read more...
Facebook does not have the best track record when it comes to its privacy. However, there are a few things you can do as a user which can help protect your account and personal information from other users. Social media apps have become the hub where people go to connect to both old and new friends alike. Being... Read more...
Last week, Google introduced its new data safety section for the Play Store, which states that Android application developers have until July 20th to fully disclose their data collection, sharing, and safety practices. A new analysis of popular Android apps shows why this kind of data collection transparency is... Read more...
We’ve recently covered a number of sophisticated phishing scam techniques, including fake animated windows designed to steal passwords and automated call bots that trick victims into giving away multi-factor authentication codes. While ransomware attacks are currently on track to surpass phishing attacks as the number... Read more...
Cybersecurity news can seem like a never-ending stream of new vulnerabilities and a single prevailing message: “make sure to patch your devices.” Nonetheless, this message bears repeating. While we may keep up with updates on devices that receive over-the-air (OTA) updates on a semi-regular basis, we can still forget... Read more...
Always be wary of installing apps on your mobile device, regardless of where that app comes from. Many people use their mobile devices for banking and other financial transactions, because they're always with us, always connected, and easy to use. Unfortunately, because of their ubiquity and ease of use, mobile phones... Read more...
Researchers say you should upgrade a popular WordPress plugin sooner than later, or else you could end up losing access to your website, and potentially your web server! If you exist on the internet, you likely know of or have seen at least one WordPress site. The content-management software is likely the most... Read more...
A security researcher who goes by the name “RyeLv” recently discovered an elevation of privilege vulnerability in Windows. Microsoft has publicly disclosed the vulnerability and registered it in the Common Vulnerabilities and Exposures (CVE) system with the name CVE-2022-21882. The National Institute of Standards and... Read more...
The Raspberry Pi is terrific for plenty of uses, from retro-style gaming to running an extremely low-cost server. A team of researchers have discovered another new use for Raspberry Pi: hands-off malware detection. While most virus and malware detection depends on file signatures and behaviors, this new project... Read more...
In the past, we have seen incidents of text messages being rerouted to steal two-factor authentication codes to breach peoples’ accounts. Now, criminal hackers are being more direct in potentially using SIM swap attacks by getting a carrier—in this case, T-Mobile—to switch a customer’s number to an attacker-controlled... Read more...
With data breaches and malware on the rise, millions are turning on two-factor authentication (2FA) to try and protect themselves from an attack. One of the most popular apps to use with 2FA, Google Authenticator, has just hit a very big milestone because of it. People have been bombarded with headlines about... Read more...
If you're a regular HotHardware reader, you probably make contactless payments now and again. You might even do it using Apple Pay, and if you live in a big city with mass transit, there's a decent likelihood that you have Express Transit enabled. If you use a Visa card for it, you may want to reconsider that based on... Read more...
Attention fellow iPhone users, if you have any precious photos nestled inside text messaging threads, be careful not to delete those threads, even if you have saved those photos to your camera roll. Otherwise, you risk losing those pictures forever. The culprit is a weird bug in iOS 15 and/or iCloud, and as of the... Read more...
T-Mobile came under fire after a recent data breach exposed the private data of nearly 50 million customers. Shortly after the attack was made public, T-Mobile issued a boilerplate public response confirming many of the incident's details. "We take our customers' protection very seriously and we will continue to work... Read more...
Earlier this week, it was alleged that T-Mobile suffered a devastating data breach that resulted in the leak of personal data from over 100 million customers. Today, T-Mobile confirmed the breach, but the number of affected individuals is less than half of what was previously reported. The confirmed 47 million... Read more...
T-Mobile is now investigating a massive customer data breach claim that could affect up to 100 million users. The leak, which appeared on a leak and database selling forums on Saturday, claimed to have 30 million unique social security numbers and driver's license information. In the samples provided, it also... Read more...
Hopefully you are not one of the millions of people who have installed an app called PIP Photo onto your Android device. Why is that? While it may seem like a harmless and handy image editing app, it contains malware designed to covertly swipe a person's login credential for Facebook. Same goes for a handful of other... Read more...
1 2 3 4 5 Next