How the Necro Trojan attacked 11 million Android users
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.
86 articles
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
Hackers are distributing the QBot trojan through business correspondence.
Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
Another modification of WhatsApp has turned out to be malicious. We explain what’s happened and how to stay protected.
We explain how the NullMixer dropper can download numerous Trojans onto a device.
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
We explain how the Harly Trojan subscriber targets Android users.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
We explain how attackers can steal your credentials and how you can prevent it.