Apple also claims to have foiled US$1.5 billion worth of potentially fraudulent transactions
The malware sends automated replies to messages on WhatsApp and other major chat apps
The malware can grab login credentials for more than 450 apps and bypass SMS-based two-factor authentication
“Download This application and Win Mobile Phone”, reads the message attempting to trick users into downloading a fake Huawei app
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds
Attackers could have exploited the flaw to steal victims’ login credentials or install malware on their devices
Watch out for attacks attempting to take advantage of the lockdown-induced surge in mobile banking use
From the humble passcode to biometric authentication, there are quite a few options to lock your Android phone. But which of them are more secure than the others?
Hot on the heels of his research into an attack that attempted to take down ESET’s website, Lukas Stefanko sheds more light on threats posed by mobile botnets
Losing your smartphone can be expensive, but the cost of the device may not be the final price you’ll be paying
With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that your personal information remains safe
Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the number of highly critical bugs reported increased.
Are you in the 26% of people who use one of these PIN codes to unlock their phones?
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year
Malware in the official Google store never stops appearing. For cybercriminals, sneaking their malicious applications into the marketplace of genuine apps is a huge victory.
While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.
Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.
This short feature aims to draw attention to some of the key things you should be doing to bolster your tablet security to keep cybercriminals at bay.
What awaits us in terms of mobile security trends? Throughout this article, we will discuss how risks might develop in the near future.
ESET's Cameron Camp takes a closer look at security by design for mobile device manufacturers, assessing where we are and where we are heading.