One can argue that for any adult right now, the smartphone is highly likely the most personal piece of technology he or she owns. Indeed, there are a lot of reasons supporting this idea -- after all, we carry our smartphones just about everywhere we go, and our handsets basically carry all sorts of very personal information, including passwords, bank and credit card information, contact information of family, friends, and colleagues, and loads of potentially sensitive pictures. It is no surprise then that hackers now are looking to hack our mobile devices more than our personal computers.
A research team from Netlab360, a company that specializes in developing cybersecurity solutions, has found that hackers are transforming thousands of Android powered mobile devices and smart TVs into miners for the Monero cryptocurrency. As reported by ZDNet, these hackers have successfully breached 7,000 handsets in China alone.
According to a research team from Kaspersky Lab, a Russia based company that specializes in developing and selling cybersecurity solutions, 2017 saw at least 1.2 million users who own mobile devices powered by Google’s Android mobile operating system encounter malware that were disguised as pornographic content. The firm estimates that 4.9 million people had suffered from malware attacks last year, which meant that around a quarter of that volume got malware disguised as porn.
Apple has said this week that Meltdown and Spectre, the two newly discovered processor security vulnerabilities, can impact almost all of its devices, including iPhones, iPad tablets, and even Mac computers. But the tech giant is also taking the opportunity to point out that risk can be reduced significantly if Apple users make sure to download the newest software updates, which come with fixes for one of the flaws.
This week, Check Point revealed that a malware called CopyCat has managed to infect over 14 million Android powered mobile devices across the globe. According to Check Point researchers, the malware’s M.O. was to root handsets and hijack mobile apps in order to generate millions of cash through fraudulent advertising.
According to security firm Check Point, a certain malware called Googlian has apparently already affected over a million Google accounts, and the number of infected accounts is growing by the day. Basically, what this piece of malicious software does is steal the authentication tokens used by handsets and then use them to gain unauthorized access to private and sensitive information stored on Google Play, Gmail, Google Photos, Google Docs, G Suite, and Google Drive, among many other programs. As explained by Check Point via a blog post, Googlian is infecting users at a rate of 13,000 mobile devices each day.
According to a report released by security firm Kryptowire, certain commercial firmware preloaded on a number of Android powered mobile devices released in the United States smartphone market are actually transmitting personal information to a third party in China. The personal information being sent consisted of mobile users’ contacts lists, phone call logs, text messages, data on app usage, and even location information. Perhaps one of the most pressing questions right now is which devices exactly have this firmware preinstalled?
Android mobile users might be glad to know that the crew behind Google’s mobile security has taken the opportunity to roll out an Android update that should fix a couple of security flaws that could potentially put Android handsets at risk if cybercriminals had taken advantage of them. As told by Google to Ars Technica, the first was only designed for the purpose of doing some research, but would have been harmful if modified, plus it was easy to detect and use for malicious purposes.
After experts in web security discovered that an iPhone unit belonging to a prominent Arab activist has been targeted with spyware, Apple has decided to immediately upgrade its iOS mobile operating system. As reported by net security company Lookout and Internet watchdog group Citizen Lab, specially designed spyware can be used in order to exploit a trio of previously unrevealed vulnerabilities in Apple’s OS, collected called Trident.
Wirefly Is America's Most Trusted Source For All Cell Phones, Plans, TV, and Internet Deals
Wirefly offers great deals on a large selection of smartphones, cell phones, tablets, mobile hotspots, and other wireless devices for the nation's most popular carriers. Use Wirefly’s innovative cell phone and plan comparison tools to ensure you are getting the best deal on the market. Shop with confidence knowing that Wirefly wants to help you find the best prices on cell phones, cell phone plans, TV, and Internet service.