Hacking Team Remote Control System: Spy Software “Galileo” can hack any mobile devices Hackers from Italy said that they could hack any smartphone. There is a tool in the software market, that can spy the owners of devices running iOS, Android, Windows Phone, BlackBerry, as well as Mac and PC. Italian hackers from Hacking Team […]
Search Results
Galileo is a tool that can spy all kinds of mobile devices
Posted: January 24, 2014 in IT Security NewsTags: Android, BlackBerry, Hacking Team, iOS, mobile devices, mobile spy app, Remote Control System, Windows Phone
F-Secure Mobile Security
Posted: September 14, 2013 in Antivirus and Security SoftwareTags: F-Secure, Mobile Security, Parental Control, Secure browser
F-Secure Mobile Security is a premium security suite for your smartphone or tablet. F-Secure Mobile Security provides complete security for smartphones and tablets Android from malicious applications and Internet threats: malicious and unwanted websites. The solution also guarantees the integrity of sensitive data in case of loss or theft of the device. The Parental Control […]
The number of mobile malware for Android in the first half of 2013 increased of 180 percent
Posted: August 20, 2013 in IT Security NewsTags: Android, G Data, mobile malware
Mobile viruses are rapidly evolving, and in the first half of 2013, their number an increase of 180 percent 180%. According to experts of the German anti-virus company G Data, for the first 6 months of this year, it was discovered more than 519 thousand new malicious programs for the Android, while in the second […]
Aspects and perspectives of the development of information security of mobile devices
Posted: December 11, 2012 in ArticlesTags: information security, mobile devices security
Every day, numbers users of mobile platforms is increasing. Most recently, Google celebrated the activation of the 500 millionth device platform Android, Apple by the numbers a little bit behind – 365 million devices. But you must agree that the numbers and dynamics of development is impressive. Smartphones and tablets are increasingly part of our […]
In 2013, the number of malware for Android has reached its peak
Posted: February 11, 2014 in IT Security NewsTags: Android malware, Kaspersky Lab, mobile botnet, mobile malware, mobile threats, Security Bulletin, threats report
According to Kaspersky Lab’s analysis report, in 2013, the number of malware for Android has reached its absolute peak. In late January 2014 in the Google Play experts found 200 thousand unique samples of malicious software for mobile platforms. For the Android platform, there are over 10 million malicious applications, noted Kaspersky Lab experts, in […]
Cyber Security Threats 2013: F-Secure H1 2013 Threat Report
Posted: September 24, 2013 in ArticlesTags: cyber security, F-Secure, Security Threats
Of special interest this half year: the increasing use of exploit-based attacks targeted against the Java development platform. Four of five most frequently exploited vulnerabilities are present in Java. Java was the most targeted development platform for exploit attacks during the first half of the year. Finnish antivirus developer F-Secure has published a report on […]
Trend Micro Report: the number of threats for Android to reach 1 million
Posted: January 28, 2013 in Articles, IT Security NewsTags: cyber security, cybercriminals, mobile platforms, safety problems, Security Roundup Report, threats for Android, Trend Micro
In 2012, the Android platform is five times ahead of Windows on the number of created malicious software for it – this is one of the key findings of new studies prepared by analysts Trend Micro Marlow, United Kingdom, January 28, 2013. According to reports from Trend Micro, dedicated to the study of trends and […]
Detected botnet of one million smartphones
Posted: January 22, 2013 in IT Security NewsTags: Android-botnet, malware for Android, mobile botnet, mobile trojans
Explorers of the site BBC, referring to the Chinese news agency Xinhua, reported the discovery of the largest to date mobile botnet, which includes more than a million smart phones belonging to the Chinese people. Used for the rapid spread of ‘Trojan’ application that unnoticed for smartphones and tablets during the installation of new programs. […]
TOP-6 information threats – predictions for 2013 from Fortinet
Posted: December 22, 2012 in ArticlesTags: Advanced Persistent Threats, APT-attacks, FortiGuard Labs, Fortinet, information threats, information threats predictions, sandbox bypassing, Two-factor authentication
Among the key risks – sophisticated targeted attacks on mobile devices and applications, active use of malicious IPv6 shelters and exploits. 1. The purpose of APT attacks will be mobile users APT attacks, the so-called sophisticated targeted threats (Advanced Persistent Threats), named No. 1 threat because of their ability to use a variety of techniques […]
In addition to the basic functions of protection and security features and data encryption, iOS devices provide a wide range of network security features to securely transmit data over the network to both individual and corporate users. For corporate users, it is important that they can access corporate data from anywhere in the world. No […]