The Internet of Things is a panoply of ingenious new devices making our future more convenient and sophisticated – until the machines turn on us and the whole thing comes crashing down.
Imagine your worst Internet of Things nightmare: Your smart devices attack you. Now imagine a bigger nightmare: Your dependable “smart” coffee maker stops serving your morning brew.
Android users – and I’m one – are well-advised to be constantly vigilant about the types of cyberthreats directed, at any given time, at the world’s most popular mobile device operating system.
Using Avast’s mobile threat intelligence platform, apklab.io, we discovered 50 adware apps on the Google Play Store. The installations of the apps range from 5K to 5M installations. The adware can be very annoying as it persistently displays full scree…
Social media networks are a great way for people to connect, keep in touch, update friends and family, but also a great place to spread fraudulent offers. Cybercriminals continuously take advantage of social media networks, like Facebook, to make money…
In February 2019, Avast’s mobile threat intelligence platform (MTIP), apklab.io, discovered a number of “selfie beauty apps” on the Google Play Store posing as legitimate apps, but in reality were filled with adware and spyware. The three apps we found…
Recently, Avast has discovered that a new fake mobile CCleaner app has been published in the China Baidu App Store (??????) and it’s specified as Certified Official Version (???).
Authored by: Luigino Camastra, Jan Širmer, Adolf St?eda and Lukáš Obrdlík
Recently, an interesting vulnerability was discovered by French security researcher, Elliot Alderson, in the Android app ES File Explorer (version 4.1.9.7.4 and below). ES File Explorer is a file manager, which has been downloaded more than 100,000,000…
A chain is only as strong as its weakest link. This is also true in the world of security. This year, we tracked a growing threat trend — that when just one device in a home or small business (usually the router) is compromised, then the rest of the de…