IT decision-makers need to fast-track the EMM selection process to stay ahead of the evolving threat landscape and more effectively manage Android devices.
Researchers at Malwarebytes observed two instances of pre-installed malware targeting critical applications on Android devices.
Avast security analysts reported that the Hide 'N Seek botnet continues to grow by infecting vulnerable Internet of Things (IoT) devices still using their default passwords.
Nearly 30,000 Android users accidentally downloaded banking malware after filling out phishing forms that were personalized based on the apps they use.
The TimpDoor malware family enables cybercriminals to turn infected Android devices into network proxies without users' knowledge.
Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
Security researchers discovered a new malware-as-a-service offering designed to enable cybercriminals to infect Android phones and block users from running security solutions on their devices.
Researchers discovered two new monero malware attacks: one that targets Windows with stealthy mining operations, and another that masquerades as a Google Play Store update for Android.
IBM X-Force researchers unpacked ExoBot's inner workings to reveal insights into its dynamic mechanisms and the features that help criminals use it in cross-channel bank fraud schemes.
A new Android spyware family is capable of retrieving chats from several mobile messaging apps and stealing on other types of information, such as browser history and call logs.