DoubleLocker Android ransomware explained
The infection mechanism works well – which is crucial for determining how big of a deal a piece of malware is.
The infection mechanism works well – which is crucial for determining how big of a deal a piece of malware is.
DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them - a combination that has not been seen previously in the Android ecosystem.
Android malware is an increasing problem ... but worry not – n this infographic, we highlight some of the key things you should be aware of.
Android users are exposed to a new malicious app imitating Adobe Flash Player and serving as an entrance gate for potentially any kind of dangerous malware
ESET researchers have discovered fake Prisma apps of different types, including several dangerous trojan downloaders. The Google Play security team has since removed them.
ESET has discovered eight fake applications on Google Play, which were promising to boost the number of followers on users’ social network profiles. Our security software is detecting these as Android/Fasurke.
Researchers in Israel have come across a new way of exploiting the Stagefright vulnerability that was uncovered last year, and which affects the library that Android uses to analyze multimedia files.
Exactly seven years ago to the day (September 23rd), after much speculation, Google finally lifted the lid on its secret project, one which would go onto change the mobile world.
ESET recently discovered an interesting stealth attack on Android users, an app that is a regular game but with an interesting addition: the application was bundled with another application.
Google has announced it is to pay out research grants to security researchers seeking out potential bugs, even if they turn up empty-handed, reports ZDNet.
So far, wearable tech has been of interest mainly to fitness fiends - but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even 'three-factor security'. Can a watch really keep secrets?
Nearly a billion users of a dozen chat apps for Android including popular apps such as Instagram, Oovoo, OKCupid and Grindr could be at risk from eavesdroppers and snoopers after University of New Haven researchers found serious data leakage problems.
Seventeen mysterious cellphone towers have been found in America which can only be identified by a heavily customized handset built for Android security - but seem to be built to spy on passing cellphone users, according to Popular Science.
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play store, where malware does show up from time to time but is much better controlled, thanks to the Google Bouncer, than on alternative app stores.
A new Android flaw potentially affecting up to 80% of users could leave handsets vulnerable to rogue apps - leapfrogging the defenses used to ensure malicious developers are kept out.
Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…
Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German security researchers.
A feature in newer Android phones puts users' privacy at risk - effectively broadcasting an accurate location history over the air even when the handset's screen is turned off, according to the Electronic Frontier Foundation.
ESET LiveGrid® telemetry has indicated several new infection vectors used by Android/Simplocker. The “typical” ones revolve around internet porn, or popular games like Grand Theft Auto: San Andreas.
Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android by our detection engineers.