Major software and OS vulnerabilities and the prevalence of adware and potentially unwanted apps make up the most notable stories of the mobile threat landscape over the first half of 2015.
What is the RCSAndroid spying tool capable of? Who is affected? Which devices are vulnerable? Here are some quick facts you need to know about the Hacking Team’s leaked mobile malware suite:
Attackers are finding more security gaps to abuse, whether they're in existing public-facing technologies or in new developments in the Internet of Things.
Earlier this year, a PoC malware that could infect Apple Macs through a Thunderbolt accessory was introduced. The sequel to the “Thunderstrike“ exploit doesn’t need physical access and can now be delivered online—just like PC threats.
What will the threat landscape look like in the next two years? How will it evolve? The "FuTuRology" project attempts to answer these questions in a series of articles that covers the future of threats to different industries.
Watch what happens during a ransomware infection, from the time a user receives the email with the spiked attachment to the time the malware itself is executed.