
Don’t trust the reviews and ratings on Google Play
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
227 articles
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
Criminals are stealing money from freelancers — by offering them a job.
Apple no longer encrypts the kernel of its iOS operating system. It seems that this is another step towards turning iOS into something similar to Android.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
Charging your smartphone’s battery over USB can be dangerous: Thieves can steal your files, infect your smartphone with something nasty — or even brick it.
Check if your PC is infected with the help of our free security tools.
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
At SAS 2016 our GReAT experts talk about a Java-based multi platform malware used by hundreds of cybercriminals for a handful of purposes
Researcher shows that using data from motion sensors built into a smartwatch one can recognize numbers you press on a numerical pad. How can that affect your security?
What does Google know about you and me? Let’s check it with the new “About me” tool.
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Which brain mechanisms are in charge of our memory? Kaspersky Lab analyzed why we forget information stored on our devices.
At Google I/O 2015 software giant have presented a whole bunch of new features and services. Let’s take a first look at customizable app permissions, Android Pay, Now on Tap and others.
While surfing the Internet, children may come across web pages containing inappropriate infor-mation. IT solutions can help protect children from such content.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.