BrainTest Malware Gets Smart in Google Play Store
It has an arsenal of privilege escalation exploits, which is used to install a rootkit on the device so it can persist even after the user uninstalls it.
More results...
It has an arsenal of privilege escalation exploits, which is used to install a rootkit on the device so it can persist even after the user uninstalls it.
The campaign is part of a long list of cyber-attacks that target one country at a time, at different time intervals, and use the same tactic.
Malware designed to sneak a peek at your hand
IT and security professionals are doing a terrible job at communicating risk, bogged down in technical jargon and a lack of business context.
Three-quarters of US organizations are not prepared to respond to cyber-attacks, leaving them more vulnerable than ever.
KPMG finds private firms have a long way to go to win consumer trust
Given the nation’s big election, the attack was likely hactivist motivated.
Amid fears of government snooping, the data revolution has created a ticking time bomb; sharing personal data is simply not working for anyone at the moment.
Secure Chat, initially available for Android, offers multiple-encrypted SMS and chat communication, and file-sharing.
PwC legal experts predicts “sausage factory” of privacy claims and disputes