News

A new mobile crypto-stealing malware called SparkKitty was found in apps on Google Play and the Apple App Store, targeting Android and iOS devices.
Kaspersky estimates the malware has been active since at least March 2024, downloaded an estimated 242,000 times, and mainly ...
This nasty little piece of software is active on both Android and iOS, and it steals the victim's face. Security researchers warn the malware could be used to create deepfake versions of the ...
SparkCat was found embedded in several Android and iOS apps, some of which were available in official app stores. The malware employs a malicious SDK that integrates Google's OCR technology ...
Smart TVs and streaming devices manufactured in China are being compromised by BadBox 2.0 malware before users even power ...
As malware evolves to be more sophisticated, seeing should not always equal believing. A new iteration of the Godfather ...
The malware, believed to have been active since March 2024, operates similarly on Android and iOS devices, secretly utilizing Google's ML Kit for optical character recognition (OCR). It scans the ...
Wes Davis is a weekend editor who covers the latest in tech and entertainment. He has written news, reviews, and more as a tech journalist since 2020. Apps distributed through both Apple and ...
Android has long had a reputation for being more vulnerable to malware than iOS. Although the platform's open nature may have something to do with it, many real threats today are not where most ...
On Android and iOS, things are even worse ... In this case, the site downloads a .TAR archive file, holding malware. This one, too, was flagged by at least five antivirus programs already.
Kaspersky estimates the malware has been downloaded an estimated 242,000 times since it became active around March, mainly targeting Android and iOS users in Europe and Asia. Kaspersky says the ...