We’ve seen ransomware stories popping up left and right this year, detailing how hackers are making money from a scary, yet creative, type of malware. Just as the name of this attack suggests, ransomware encrypts personal files on a computer, demanding a ransom in order to release them back to users. Victims have to pay up a fee and hope that the hackers decrypt their data instead of simply taking the money and running. Sure, you can always refuse to pay the ransom, and you can try to use one of the publicly available tools that can decrypt your files (Microsoft has one too), but hackers have now devised a new method to convince you to pay up: They’ll expose your files online if you don’t. More →
The latest adware outbreak might be the worst yet for Android users.
According to researchers from cybersecurity company Lookout, a new strain of adware is capable of automatically rooting a user’s device, embedding in the system application and becomes nearly impossible to uninstall. More →
Historically, the Mac has been much less prone to various types of malware attacks than Windows machines. Of course, this is largely due to the fact that Windows, on account of its dominant market share, has long been a much more appealing target for hackers. But in recent years, as Apple’s share of the PC market has grown, malware specifically targeting Apple’s Mac platform slowly but surely began to increase. In the process, the types of malware attacks targeting Macs have also became far more insidious and, at times, sophisticated.
Fitbits are popular devices among people who like to track their steps and exercise. But new research reveals that a Fitbit device is unprotected against simple malware attacks. More importantly, the malicious code that can be sent to a Fitbit device without the user’s knowledge can then infect a computer used to sync data collected by the wearable. More →
We’ve become accustomed to malware that invades our browsers — showing us ads we don’t want to see and collecting our information without any warning — but there’s a new scam worth watching out for.
Last Thursday, PCrisk was one of the first sites to warn users about the eFast browser, a malware browser that seeks to replace a user’s Chrome browser entirely, promising more relevant search results and better deals while shopping. More →
Most of the recent malware-related security reports detailed various threats targeting Apple’s iOS ecosystem, but that doesn’t mean hackers have stopped attacking Android. A new report claims that a sneaky type of malware has been found in various app stores, including Google’s official Play Store. Once installed on the device, the malware is very hard to remove. Its purpose is to flood a handset with advertising and hackers behind the attack might make as much as $4 milliom from the fraudulent app installs.
How confident are you that your virtual assistant is only listening to your commands? Think there’s any chance Siri or Google Now could be duped into performing actions on iPhones and Android handsets that you haven’t actually asked for? Yes, it seems some smart hackers have found one more way to compromise the security of iPhones and Androids to either spy on users, or initiate secondary malware activities. More →
Researchers unearth scary new iOS malware, but Apple says it won’t affect devices with iOS 8.4 or later
Gone are the days when iOS malware reports were a rare thing. Following a wave of malware attacks on the iPhone and iPad – including a massive App Store hack and an Apple ID theft operation – a new security report reveals there’s dangerous malware in the wild that can harm any iPhone, iPad or iPod touch regardless of whether they’re jailbroken or not. More →
Hackers looking to steal money from ATMs have targeted your credit cards for years, trying to obtain access to it by hacking online services and retail shops. However, since more and more markets including America are adopting more secure payment methods like chip-and-PIN cards and mobile payments, some talented hackers are adapting their game accordingly.
Rather than trying to steal credit cards, clone them and only then try to obtain cash out of ATMs, some people are simply targeting the machines with malware that makes them spit out cash on command. More →
After setting up a special help page that provides information about the massive XcodeGhost malware hack on its website, Apple has listed the top 25 iOS apps built using the counterfeit version of Xcode that was capable of injecting malware in apps before they were submitted to the App Store. More →
Cunning hackers from China managed to sneak malware into what’s generally thought of as an impenetrable target, Apple’s App Store. They created a custom version of the Xcode program developers use to create iPhone apps, thus injecting the malware payload right into the apps that Apple staff would later approve.
At least 85 legitimate iPhone apps were infected with malware this way (see this list), most of them targeting the Chinese and Asian markets, as that’s where the malicious version of Xcode was made available to developers. However, other security firms say that there may be hundreds or even thousands of genuine iOS apps that may have been targeted this way. More →
iOS is safer than Android when it comes to malware attacks, but that doesn’t mean hackers aren’t successfully targeting the iPhone and iPad with malicious programs supposed to steal sensitive data. Usually, iOS malware reports explain that jailbroken devices are at risk, especially in Asian countries and that only a tiny fraction of Apple’s massive number of customers is affected. However, that’s not the case anymore.
A substantial security threat called XcodeGhost managed to fool App Store security and sneak into the App Store inside real App Store apps potentially affecting hundreds of millions of iPhone and iPad users on both stock and jailbroken devices. The one thing that’s common with recent iOS hacks is that the threat comes from China. More →