Malware
MysteryBot – Powerful Android Banking Trojan Launch Keylogger, Overlay & Ransomware in Single Attack
Newly Discovered Android-based MysteryBot Trojan launches various attack such as overlay, keylogger, and Ransomware in a single attack to perform various malicious activities.Based on...
Mobile Attacks
InvisiMole – A Powerful Spyware Turn On Your Camera & Record Video, Audio, Take Picture
Newly discovered powerful InvisiMole Spyware attack targeted computer to turn on the video camera and record the videos, audio to hear whatever things happening to surround...
Malware
Hackers Earning Money from Invisible Ads using Android Trojan that Downloads 6.5 Million Times via Google Play
A powerful Android Trojan distributed through Google Play store apps that posed as Fashion and game apps to generate a huge revenue using malicious invisible...
Mobile Attacks
Serious iOS Bug – A Single Text Character Can Crash any Apple iPhone, Mac or iPad
A single character can crash iPhone if it simply pasted in the text field, received as a message via apps like Facebook Messenger, WhatsApp, etc...
Malware
New “GnatSpy” Mobile Malware Stealing data Such as Images, Text messages, Contacts, and Call History
A newly emerging mobile malware GnatSpy capable of abusing infected mobile and stealing various type of data such Images, Text messages, Contacts, and Call...
Malware
New Android Banking Trojan “RED ALERT 2.0” Targeting 60 Banks and Social Apps
A new Banking Trojan called "RED ALERT 2.0" Targeting Around 60 Banks and Social Media Android Apps by using overlay attacks same as Most...
Malware
A Mobile Ransomware Called “LeakerLocker” Found in Google Play Store Which Leaks Phone’s Sensitive Information and Demand to Pay
Mobile Ransomware called LeakerLocker Found in Google Playstore which infect the Android Mobile user and steals the information such as contact Phone numbers, Phone...
Mobile Attacks
Millions of Android Phones including latest Versions Vulnerable to Cloak & Dagger attack
Cloak & Dagger attack discovered by security experts from Georgia Institute of Technology, which allows attackers to get complete control over your device.These attack...