Apple Execs chose to keep 128 million iPhones quiet
September 2015, Apple managers had a dilemma at hand: Should 128 million iPhone users be notified of whether or not they had the worst massive iOS compromise on record? In the end, all the evidence shows that they chose to remain silent.
Ars Technica
This story first appeared Ars Technica, a reliable source for technology news, technology policy analysis, reviews, and more. Ars is the parent company of WIRED, Condé Nast.
The researchers first created a massive hack 40 App Store found malicious apps, that’s the number mushroom up to 4,000 while there were more researchers. The apps contained code that was part of a botnet that stole information about potentially sensitive iPhone and iPad users.
Cybercriminals are encouraging users to send the “offers” via WhatsApp to their friends as well.
Malicious Android apps disguised as TikTok and offers for free Lenovo laptops are being used in ad-stuffing attacks underway against devices on the Jio telecom network in India, security researchers warn.
Researchers from Zscaler report this threat actor has been operating various phishing scams since March 2020, all using recent headlines as lures.
Their most recent socially engineered messages try to convince users to download their fake version of TikTok by saying the app, which is banned in India, is now available, the report found. Another scam misleads victims into thinking they’re eligible for a free Lenovo laptop courtesy of the Indian government.
minute read
Share this article:
A never-before-seen malware-dropper, Clast82, fetches the AlienBot and MRAT malware in a savvy Google Play campaign aimed at Android users.
A malware dropper that paves the way for attackers to remotely steal data from Android phones has been spreading via nine malicious apps on the official Google Play store, according to researchers.
The malware is part of a campaign aimed at lifting victims’ financial information, but which also allows eventual takeover of mobile phones, according to Check Point Research.
The dropper, dubbed Clast82, was disguised in benign apps, which don’t fetch a malicious payload until they have been vetted and cleared by Google Play Protect. Google Play Protect is the store’s evaluation mechanism, meant to weed out apps with ill intent and malicious functions.