300 shades of gray: a look into free mobile VPN apps

Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.

Categories:

Tags:

(Read more…)

The post 300 shades of gray: a look into free mobile VPN apps appeared first on Malwarebytes Labs.

Unprecedented new iPhone malware discovered

Google announced late last night that hacked websites have been used to drop iPhone malware on unsuspecting users over a two-year period. Thomas Reed investigates.

Categories:

Tags:

(Read more…)

The post Unprecedented new iPhone malware discovered appeared first on Malwarebytes Labs.

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Categories:

Tags:

(Read more…)

The post Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks appeared first on Malwarebytes Labs.

Data and device security for domestic abuse survivors

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Categories:

Tags:

(Read more…)

The post Data and device security for domestic abuse survivors appeared first on Malwarebytes Labs.

Parental monitoring apps: How do they differ from stalkerware?

What are the differences between stalkerware apps and parental monitoring apps? What is an “acceptable” or “safe” parental monitoring app? And how can a parent know whether they’re downloading a “legitimate” parental monitoring app or instead a stalkerware app merely disguised as a tool for parents?

Categories:

Tags:

(Read more…)

The post Parental monitoring apps: How do they differ from stalkerware? appeared first on Malwarebytes Labs.

All the reasons why cybercriminals want to hack your phone

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Categories:

Tags:

(Read more…)

The post All the reasons why cybercriminals want to hack your phone appeared first on Malwarebytes Labs.

All the reasons why cybercriminals want to hack your phone

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Categories:

Tags:

(Read more…)

The post All the reasons why cybercriminals want to hack your phone appeared first on Malwarebytes Labs.

Something else is phishy: How to detect phishing attempts on mobile

Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.

Categories:

Tags:

(Read more…)

The post Something else is phishy: How to detect phishing attempts on mobile appeared first on Malwarebytes Labs.

Seven security tips for staying safe on an iPhone

iPhones have a reputation for being incredibly secure. However, using an iPhone is not an automatic guarantee of invulnerability. These seven tips will help make sure your iPhone is the digital fortress it was meant to be.

Categories:

Tags:

(Read more…)

The post Seven security tips for staying safe on an iPhone appeared first on Malwarebytes Labs.

GrayKey iPhone unlocker poses serious security concerns

GrayKey, an iPhone unlocker, is secretly being marketed to law enforcement. Thanks to an anonymous source, we now know how the device works—and the danger it presents to security.

Categories:

Tags:

(Read more…)

The post GrayKey iPhone unlocker poses serious security concerns appeared first on Malwarebytes Labs.