Android apps such as Jetpack Joyride, Madden NFL 12, Pinterest and Batman Arkham City Lockdown are rife with malware. But these aren't the official apps. No, they're merely impostor apps that have snuck past the security gates of the Android Market.
Google's adding a new feature to the Android Market called Bouncer, which will scan available apps for malware without hassling developers or interfering with user experience at all. It's one of the first signs that Google's taking Android malware seriously, and it's about time.
Hackers just don’t take a break do they? You’ve heard of drive-by downloads, well meet drive-by emails -- the next stage in the evolution of the email-carried malware that you don’t even need to download.
Symantec’s Android scaremongering last week wasn’t all that justified it seems. Although the 13 apps that it pinpointed as malware aren’t all that great, it appears they’re actually slightly less vicious adware – something Windows users are horribly familiar with.
According to Symantec, 13 apps from three developers—many in the official Android Market—have been carrying malicious chunks of code called Android.Counterclank, and are suspected of running on as many as five million phones, stealing info and running ads against the will of the device's owner.
Have you ever gotten a random DM from someone you weren't following, pleading you to click through a blind link for McDonald's Gift Cards — but instead of a gift card, there's only a website laden with Trojans and malware? Well, Twitter just acquired a company that could put an end to all those shenanigans.
Facebook’s had enough of worms targeting its users; both it and Sophos have taken the fight to the hackers with a WikiLeaks-style naming and shaming. A four-strong Russian hacking gang were behind the botnet, which has taken control of over 800,000 machines and terrorised millions.
Ramnit, the bank information-stealing worm has recently taken a bite out of Facebook and it seems to like the taste. It’s managed to steal 45,000 Facebook login credentials already, mostly from the UK and France, and there doesn’t seem to be any stopping it.
The ESNET security company is reporting that the Tsunami Trojan originally developed for Linux systems has been ported to OSX. The Trojan is designed to hijack an infected system and use its network connection in DDoS attacks or to automatically download more malware. More details are available at MacWorld.
It sounds like the plot of a mid-tier thriller, but it actually happened: German governments have been deploying state-sponsored malware to spy on its citizens... for two years. And the trojan they used is serious business.