What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Android

S3 Ep38: Clop busts, destructive Linux hacking, and rooted bicycles [Podcast]

by Paul Ducklin [05’06”] Ukrainian cops bring out the BFG (Big Fearsome Grinder) and cut open some doors.  [10’23”] A repeated request for destructive Linux code enters its 15th year.  [19’39”] Peloton exercise bicycles found to be rootable.  [28’43”] What’s the point of paying ransomware money?   [33’53”] Oh! No! of the week With Kimberly Truong, Doug Aamoth and . . . Read more

Tempted by cryptocoins? Fake trading apps get personal…

by Paul Ducklin Remember how ransomware started? It was all about volume. The CryptoLocker gang, for example, raked in millions of dollars, perhaps even hundreds of millions, by scrambling your files and then extorting you for $300 to unscramble them again. These days, however, the big-money ransomware gangs take a . . . Read more

S3 Ep31: Apple zero-days, Flubot scammers and PHP supply chain bug [Podcast]

by Paul Ducklin We look into Apple’s recent emergency updates that closed off four in-the-wild browser bugs. We explain how the infamous “Flubot” home delivery scam works and how to stop it. We investigate a recent security bug that threatened the PHP ecosystem. With Doug Aamoth and Paul Ducklin. Intro . . . Read more

Naked Security Live – Beware ‘Flubot’: the home delivery scam with a difference

by Paul Ducklin This home delivery scam arrives in an SMS that lures you to a website, but then instead of stealing your data directly via the phoney website, it sweet-talks you into installing an app… …and the app steals your data later on: Watch directly on YouTube if the . . . Read more

The 5 Most-Wanted Threatpost Stories of 2020

A look back at what was hot with readers — offering a snapshot of the security stories that were most top-of-mind for security professionals and consumers throughout the year. As 2020 draws to a close, it’s clear that work-from-home security, ransomware, COVID-19-themed social engineering and attacks by nation-states will go . . . Read more