An SMS grabbing attack is a widespread attack on Android mobile devices whose goal is to intercept the user's SMS used as a second authentication factor or "account recovery" code.
The WhatsApp vulnerability disclosed a few weeks ago, once again showed how mobile apps are used for embedding surveillance tools on to our handsets.
Back in 2017 we published a report on the increase of RAT samples in the Android ecosystem. Almost two years have passed, and here we are: RAT malware is widespread in the wild!
Exodus is one of the latest spyware’s disguised and distributed through the Google Play Store.
XTN Cognitive Security Platform helps the automotive industry moving towards fully connected vehicles protecting customer from mobile threats and cybercriminals.
A new release of SEAP and MORE mobile SDK is now available for both iOS and Android. Versions 2.1.9 for iOS and 2.3.6 for Android include several upgrades offering better performances, lower resource consumption and improved stability. Customers should have already received the download link to obtain the new version. Contact us for more [...]
Thanks to all who stopped by at the booth and met us. Weren’t you at RSA Conference? Here's the opportunity to download our company overview with the main topics addressed during the event.
This document describes the evolution and trends in Android malware behaviour with a focus on the financial context. After an initial contextualisation and an explanation of the usual anatomy of a mobile malware attack, the current landscape is presented with some interesting statistics. In conclusion, the MORE® malware engine is introduced explaining the benefits of [...]
Android malware is on the rise along with the popularity of Android OS. Malware writers are using novel techniques to create malicious Android applications which severely undermine the capability of traditional malware detectors which are ineffective towards detecting these unknown malicious applications. One of the last malware discovered, dubbed Expensive Wall, has infected about 21 [...]
The analysed malware, internally baptised as PowerFakeToken, has been identified to belong to the Android/FakeToken.A family. In a nutshell, the mentioned malware family pretends to be a mobile token generator, typically used for transaction validation in online banking systems, but in fact it is an application whose purpose is to steal sensitive credentials to perform [...]