Fake Apps Used As Surveillance Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,... BLOG Malicious Apps Pose as Cryptocurrency Firm June 20, 2019 Security researchers discovered Android apps impersonating a Turkish cryptocurrency exchange. The malicious apps were discovered by ESET exploiting Google’s SMS... iOS Masque Attack: A Worrisome Attack Targeting iOS 7+ Devices November 11, 2014 Are you an iPhone or an iPad user? A worrisome vulnerability within iOS allows attackers to install impostor apps on your device and steal sensitive information.
Fake Apps Used As Surveillance Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,...
BLOG Malicious Apps Pose as Cryptocurrency Firm June 20, 2019 Security researchers discovered Android apps impersonating a Turkish cryptocurrency exchange. The malicious apps were discovered by ESET exploiting Google’s SMS... iOS Masque Attack: A Worrisome Attack Targeting iOS 7+ Devices November 11, 2014 Are you an iPhone or an iPad user? A worrisome vulnerability within iOS allows attackers to install impostor apps on your device and steal sensitive information.
Malicious Apps Pose as Cryptocurrency Firm June 20, 2019 Security researchers discovered Android apps impersonating a Turkish cryptocurrency exchange. The malicious apps were discovered by ESET exploiting Google’s SMS...
iOS Masque Attack: A Worrisome Attack Targeting iOS 7+ Devices November 11, 2014 Are you an iPhone or an iPad user? A worrisome vulnerability within iOS allows attackers to install impostor apps on your device and steal sensitive information.