Gone are the days when iOS malware reports were a rare thing. Following a wave of malware attacks on the iPhone and iPad – including a massive App Store hack and an Apple ID theft operation – a new security report reveals there’s dangerous malware in the wild that can harm any iPhone, iPad or iPod touch regardless of whether they’re jailbroken or not. More →
Hackers looking to steal money from ATMs have targeted your credit cards for years, trying to obtain access to it by hacking online services and retail shops. However, since more and more markets including America are adopting more secure payment methods like chip-and-PIN cards and mobile payments, some talented hackers are adapting their game accordingly.
Rather than trying to steal credit cards, clone them and only then try to obtain cash out of ATMs, some people are simply targeting the machines with malware that makes them spit out cash on command. More →
After setting up a special help page that provides information about the massive XcodeGhost malware hack on its website, Apple has listed the top 25 iOS apps built using the counterfeit version of Xcode that was capable of injecting malware in apps before they were submitted to the App Store. More →
Cunning hackers from China managed to sneak malware into what’s generally thought of as an impenetrable target, Apple’s App Store. They created a custom version of the Xcode program developers use to create iPhone apps, thus injecting the malware payload right into the apps that Apple staff would later approve.
At least 85 legitimate iPhone apps were infected with malware this way (see this list), most of them targeting the Chinese and Asian markets, as that’s where the malicious version of Xcode was made available to developers. However, other security firms say that there may be hundreds or even thousands of genuine iOS apps that may have been targeted this way. More →
iOS is safer than Android when it comes to malware attacks, but that doesn’t mean hackers aren’t successfully targeting the iPhone and iPad with malicious programs supposed to steal sensitive data. Usually, iOS malware reports explain that jailbroken devices are at risk, especially in Asian countries and that only a tiny fraction of Apple’s massive number of customers is affected. However, that’s not the case anymore.
A substantial security threat called XcodeGhost managed to fool App Store security and sneak into the App Store inside real App Store apps potentially affecting hundreds of millions of iPhone and iPad users on both stock and jailbroken devices. The one thing that’s common with recent iOS hacks is that the threat comes from China. More →
Apple will release the final version of iOS 9 later today, and the software update will bring several new features and performance improvements. On top of that, the new release will fix a massive iOS vulnerability that would allow a third-party to gain control of a user’s iPhone. The bug also affects Macs, and will be squashed in the upcoming El Capitan release (set to launch on September 30th). More →
A security company found what’s believed to be the largest known Apple account theft caused by malware, and it’s developed an online tool that can help you check out whether you were affected already exists. More →
In the realm of antivirus software, few companies are as respected as Kaspersky Lab. Based out of Moscow, Kaspersky over the years has garnered a lot of praise for detecting and detailing some of the more sophisticated pieces of malware the world has ever seen, including the famed Stuxtnet computer worm and an even complex piece of malware known as Flame.
A recent report from Trustwave on the state of malware relays that online crime, unfortunately, does pay. The report, originally cited by Net Security, relays that attackers on average enjoy a 1,425% return on investment, with the average return checking in at $84,100 on an average initial investment of $5,900.
We might be entering a whole new era of malware, one where even those who lack any semblance of deep technical expertise will be able to acquire and disseminate viruses and the like on the fly.
Speaking to this point, security researchers at McAfee recently discovered a new piece of software which makes it exceedingly easy for anyone to create their own ransomware. The online software, which runs on TOR, is called Tox and, believe it or not, is completely free to use. The developers of the software aim to make money on the back end by taking a cut of any successful ransomware campaigns its users run.
Here’s how it all works.
Security researchers at Symantec recently discovered a new piece of malware that, believe it or not, incorporates a number of themes from the hit TV show Breaking Bad. The malware itself primarily affects users in Australia and represents a new strain of an existing ransomware trojan dubbed Trojan.Cryptolocker.S.
The ransomware, which only targets Windows machines, operates by encrypting all of a user’s files and subsequently demanding a timely payment of $450 Australian Dollars (about $355 in U.S. dollars) to decrypt them. Failure to promptly make the $450 payment results in the decryption fee rising to $1000 Australian Dollars.
Malware is never an easy subject for Android device owners. Savvy users usually say the matter is overblown and that they know how to protect themselves against such threats, though that’s not always the case. Google acknowledges the matter but usually minimizes it, though it’s also constantly coming up with better means for protecting the safety of users. Meanwhile millions of Android devices fall prey to malware, and most of the time users don’t even know what’s going on.
New research from Palo Alto Networks has brought to light a terrifying vulnerability in Android that could be used for secretly installing malware apps on a device on almost 50% of existing devices, Business Insider reports.