article thumbnail

June 2023 Security Update for Android fixed Arm Mali GPU bug used by spyware?

Security Affairs

June 2023 security update for Android released by Google fixes about fifty flaws, including an Arm Mali GPU bug exploited by surveillance firms in their spyware. The flaw made headlines because it was exploited by surveillance firms for their spyware. This vulnerability grants the attacker system access. In early April, U.S.

Spyware 82
article thumbnail

Mobile malware evolution 2020

SecureList

In 2020, Kaspersky mobile products and technologies detected: 5,683,694 malicious installation packages, 156,710 new mobile banking Trojans, 20,708 new mobile ransomware Trojans. Pandemic theme in mobile threats. The mobile malware Trojan-Ransom.AndroidOS.Agent.aq The year in figures. Trends of the year.

Mobile 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Android malware, Android malware and more Android malware

SecureList

Introduction Malware for mobile devices is something we come across very often. million malware, adware, and riskware attacks on mobile devices. Among the mobile platforms, Android remains the most popular target operating system for cybercriminals. In 2023 , our technologies blocked 33.8 Collects system information (e.g.

Malware 84
article thumbnail

Zero-Click Attacks a Growing Threat

eSecurity Planet

NSO Group’s Pegasus software has been routinely in the headlines in recent years for using zero-click attacks to install its spyware. Spyware and Zero-Days: A Troubling Market. It can even access the chip’s firmware to gain root access on the device, a significant privilege escalation.

Spyware 123
article thumbnail

Spyware in the IoT – the Biggest Privacy Threat This Year

SiteLock

The Main Threats to Your Mobile and Domestic Tranquility. Most manufacturers of IoT enabled devices update their firmware frequently. Think your table lamps can’t expose you to danger? Think again. Many companies are re-thinking BYOD policies in recent years in order to protect their business networks. Update, Update, Update.

IoT 98
article thumbnail

Security Affairs newsletter Round 362 by Pierluigi Paganini

Security Affairs

T-Mobile confirms Lapsus$ had access its systems Are you using Java 15/16/17 or 18 in production? Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. Patch them now!

article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybercriminals often use malware to gain access to a computer or mobile device to deploy viruses, worms, Trojans, ransomware, spyware, and rootkits. For the top malware strains, the advisory provides six mitigations: Update software, including operating systems, applications, and firmware, on IT network assets. Enforce MFA.

Malware 80