Mobile banking is very convenient, allowing users to access their bank account and manage their finances without actually visiting the bank. Unfortunately, mobile banking apps are a constant target for hackers. A recent blog post from Lookout reveals a cloned banking app that targets user logins was recently at large in the Google Play app store.
A Wolf in Sheep’s Clothing
The malware is called BankMirage. It works by wrapping itself around a bank’s original app, which in this case was the Israeli bank Mizrahi Bank. Attackers then successfully uploaded the app to the Google Play store. When customers opened the app, they would be instructed to enter their login information at which point the malware grabs the user’s ID. After entering the correct information, the user then gets an error message saying their login was incorrect and to install the real app from Google Play.
With more than 100 million users, Evernote is popular for good reason. The app is for much more than just jotting down notes, though — you can add contacts, collaborate and even snap pictures of paper notes. Here are some tips from getting the most out of Evernote.
With magazine and newspaper subscriptions and sales falling every month, more and more people are getting all of their news exclusively online - and with our phones and tablets with us every day of the year, what better way to consume all that news than with the sharp, vibrant screen of the smartphone?
There’s been a lot written over the past year about government spying, but not so much about how governments spy. It’s easy to forget that there’s an industry thriving underneath that controversy. In 2011 WikiLeaks founder Julian Assange released a series of documents it called the Spy Files — a comprehensive database of surveillance products and companies who market their services specifically to government agencies. Companies like Hacking Team specialize in advanced spyware, gifting their customers with the ability to exercise total control over a target’s device while remaining completely invisible. A group of researchers recently tracked down and reverse engineered Hacking Team’s RCS (Remote Control System) tool to see just what these corporate spyware firms are capable of. The answer, is quite a lot.
Spotify is one of the most popular music streaming services out there, but most of us aren’t using it to its full potential. These little known tips can help you use Spotify more efficiently and make you a digital music master.
With revamped policies in the iOS 8 App Store, Candy Crush and other apps that reward you for social sharing could soon be booted. Apps that provide users incentives for sharing on social networks aren’t the only ones to violate Apple’s latest terms and conditions for developers; those that provide in-game credit for watching videos are also under fire, along with apps that promote other apps.
Apple Inc. (NASDAQ:AAPL) unveiled the much-awaited iOS 8 on June 2 at WWDC. The new operating system for iPhone and iPad brought a host of new features and services. Some of these features were “borrowed” from and others were “inspired” by other software programs or apps. The new iOS is going to, or at least will try to, kill these apps:
Your Android handset is the centre of your world, and has too much important stuff on it to risk a virus attack or theft, so what do you do? Sure you can have a lockscreen password that you don’t tell anyone, but what if you want something a bit more secure?
There was a time once when phone cameras were weak, and serious photographers needed to carry a bulky camera around with them. Not so much anymore, with every new phone release promising a dizzying number of megapixels, sharp images and extra features for the budding photographer.