The price of a cheap mobile phone may include your privacy

Credit to Author: Chen Yu| Date: Tue, 02 Oct 2018 15:00:28 +0000

Inexpensive mobile phones may be subject to “supply chain compromise,” with Trojaned third party apps. We look at a phone that shipped with factory-installed malware<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/9yo1mhq-MZc” height=”1″ width=”1″ alt=””/>

Read more

Cryptojacking apps return to Google Play Market

Credit to Author: Pankaj Kohli| Date: Mon, 24 Sep 2018 16:01:30 +0000

At least 25 Android apps on the official Google Play store contain code that mines cryptocurrencies in the background.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/F8aH5rlcN50″ height=”1″ width=”1″ alt=””/>

Read more

Spearphishers tool up for attack targeting builders

Credit to Author: Andrew Brandt| Date: Fri, 27 Jul 2018 06:01:24 +0000

A sophisticated spearphishing attack targets construction contractors in Boulder County, Colorado in the latest iteration of a months-long campaign.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jUtfsWaE0Zc” height=”1″ width=”1″ alt=””/>

Read more