ESET research reveals that common Android stalkerware apps are riddled with vulnerabilities that further jeopardize victims and expose the privacy and security...
Apple also claims to have foiled US$1.5 billion worth of potentially fraudulent transactions
The malware sends automated replies to messages on WhatsApp and other major chat apps
The malware can grab login credentials for more than 450 apps and bypass SMS-based two-factor authentication
“Download This application and Win Mobile Phone”, reads the message attempting to trick users into downloading a fake Huawei app
Building an app today doesn’t end with finding the right technologies and implementing features in a user-friendly user interface. Today, creating an...
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds
Are you concerned your child or employee is engaging in risky or compromising chats? Worry no more, today you can spy on...
Instagram is a popular social networking site where the users post personal information and photos that can be liked by double-tapping on...
Attackers could have exploited the flaw to steal victims’ login credentials or install malware on their devices
Recently, Samsung has rolled out security updates for its mobile devices to fix some critical security vulnerabilities. Samsung has published the official...
Watch out for attacks attempting to take advantage of the lockdown-induced surge in mobile banking use
From the humble passcode to biometric authentication, there are quite a few options to lock your Android phone. But which of them...
Hot on the heels of his research into an attack that attempted to take down ESET’s website, Lukas Stefanko sheds more light...
Losing your smartphone can be expensive, but the cost of the device may not be the final price you’ll be paying
With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that...
Nowadays, employees, customers, and stakeholders at all levels are adopting BYOD onboarding practices. Fortunately, it’s entirely possible for companies to restrict network...