Even after many efforts made by Google last year, malicious apps always somehow manage to make their ways into Google app store. Security researchers have now discovered a new piece of malware, dubbed GhostTeam, in at least 56 applications on Google Play Store that is designed to steal Facebook login credentials and aggressively display pop-up advertisements to users. Discovered independently by two cybersecurity firms, Trend Micro and Avast, the malicious apps disguise as various
We talk about VPNs (virtual private networks) a lot and how important they are to information security. But we rarely discuss how they work or what they’re doing. So today, we’re going to dive in a little deeper and attempt to visualize the process to get a better understanding of why we all should use VPNs, especially on public networks. VPNs For Beginners VPNs are subscription-based services that encrypt your
2017 brought new challenges for personal security, and 2018 will likely do the same. While we have little control over major data breaches as individuals, we do have control over our own personal security processes. Here are five common cybersecurity mistakes to avoid in the coming year and beyond. Connecting Everything That Can Be Connected How important is it to you that your eating utensil measures how quickly you consume food?
As a result of the open source platform, Android apps are more vulnerable to security threats than their iOS counterparts. It’s no wonder Google is devoting significant attention to keeping up-to-date with newly discovered vulnerabilities, publishing regular news and security patches about compromised elements of the popular mobile software. The problem with cyber security threats is that tackling past mistakes is not enough. Mobile app developers need to think of