• September 23, 2023
  • Apple
    Apple

    Download iOS 17.0.2 IPSW Links, OTA Profile Update On iPhone 15 / Pro Max The First Thing You Get The Phone

    New iPhone 15 Boxes Have A Secret Security Feature To Stop Fake Phone Scams

    How To Turn USB-C iPad Into A HDMI Monitor

  • Google
    Google

    How To Bypass Samsung Google Account FRP If Forgot Password

    Google Maps Gets An ‘Immersive View For Routes’ Feature

    Google Announces Pixel Fold Specs, Price And Release Date

  • Microsoft
    Microsoft

    Save More Than $50 On The GoPro HERO11 Black Essential Bundle

    Pay Just $219.99 For This WQHD Monitor By MSI With USB-C Connectivity

    Save $150 On Dyson Hot+Cool HP07 Purifier And Breathe The Finest Quality Air At Home

  • Tesla
    Tesla

    Tesla Is Again Working On A Cheaper EV With A Cybertruck-Like Design

    Tesla’s Model 3 Refresh Finally Adds A Blind Spot Indicator

    Tesla Cybertruck Spotted Charging At Supercharger As Launch Nears

  • Reviews
    Reviews

    Stellar Repair For Outlook: An Effective Solution For PST File Recovery

    Wondershare MobileTrans Review For iPhone 14 And iOS 16

    The iPhone Photo Academy Online Course Can Help You Up Your Mobile Photography Game [Review]

  • Deals
    Deals

    This Dual-Port USB-C Charger Is Perfect For Your New iPhone 15, Nearly 25% Off Today

    This 128GB 11-Inch iPad Pro With 5G Cellular And M2 Chip Is $65 Off

    Final September Software Sales 2023: Get Windows 10, Windows 11, Microsoft Office, Visual Studio Starting As Low As Just $13

Latest
  • Latest
  • Oldest
  • Random
  • A to Z

malware

How Hackers Can Silently Control Siri And Google Now On Your Phone From A Distance

Paul Morris·October 16, 2015
It seems that a day or two can't go by at the moment without another security researcher or research company finding vulnerabilities in the world's leading mobile platforms. Two security researchers who have been undertaking work on behalf of the French government have discovered a new clever way for hackers to gain control of an iOS or Android device by tapping into the platform's digital assistants, Siri and Google Now.

Kemoge Adware Can Root And Infect Your Android Device On Its Own

Paul Morris·October 10, 2015
A new strain of malicious mobile adware has yet again been discovered, and it seems to have the potential to cause some serious damage to any device that it sinks its teeth into. It seems that rarely a day or two can pass by at the minute without us hearing about a new form of infection on one of the world's most popular mobile operating system. Some are extremely malicious and can do serious damage, some are less so. This newly discovered strain, dubbed Kemoge, falls under the former category due to its ability to gain full access to the infected device.

YiSpecter iOS Malware Can Infect Non-Jailbroken Devices, Here Are The Details

Paul Morris·October 6, 2015

New OS X Exploit Easily Bypasses Gatekeeper Security, El Capitan Also Affected

Paul Morris·October 1, 2015
When you think of Apple devices and software, such as iPhones and iPads that run iOS, and Mac computers that run OS X from a security perspective, you tend to think on the more positive side. After all, Mac computers and iOS-powered devices are as secure as can be, right? Recent discoveries have shown that iOS isn't as secured as consumers may have hoped, and now a newly discovered exploit in OS X has revealed that it's possible to bypass Apple's Gatekeeper protection to install malicious apps without a user's consent.

Apple Lists Top 25 Apps Infected With XcodeGhost Malware

Paul Morris·September 24, 2015
Apple has taken the opportunity to provide some additional information about a number of third-party iOS apps that were recently discovered to be infected with the XcodeGhost malware. After the existence of the XcodeGhost trojan filtered down into the public domain, Apple took a number of steps to not only combat the issue, but also provide clarification on what it means to users, developers, and how it plans to rectify the problem and ensure that it doesn't happen again. Now, as an addendum to that info, the Cupertino-based company has listed the top 25 apps that have been affected by the malware.

Apple Posts XcodeGhost Malware FAQ, Will Alert Users Who Installed Infected Apps

Oliver Haslam·September 23, 2015

XcodeGhost Malware: List Of Infected iOS Apps That You Should Delete Right Now

Aatif·September 22, 2015
As we reported recently, Apple's App Store was a victim of a large-scale attack, infecting a bunch of iPhone and iPad apps, mostly from China, with malware.

New Android Ransomware Locking Down Devices By Changing Lock Screen Code

Paul Morris·September 11, 2015
It is becoming increasingly rare for few days to pass by without us hearing about yet another malicious Android app that is loaded with ransomware, and sent out into the wild to wreak havoc amongst unsuspecting users. Just a few days back we heard about a ransomware which communicated over XMPP, and now a new strain, being dubbed Android/Lockerpin.A, appears to be taking things to a higher, more sophisticated level, by setting or resetting the PIN that is required to grant access to the Android device. Device owners are then forced to perform a factory reset and wipe all data from the device, or shell out $500 to the malicious individuals operating the malware, which is the really the standard course of action now.

Find And Remove KeyRaider Malware From Your iPhone, Here’s How

Oliver Haslam·September 7, 2015

Newly Discovered Android Ransomware Communicates Over XMPP, Poses As NSA

Paul Morris·September 4, 2015
A new strain of Android ransomware, which disguises itself as a legitimate application, has been discovered to be utilizing the Extensible Messaging and Presence Protocol (XMPP) for instant messaging, to receive commands and to communicate remotely with the server that controls the malicious installation.

Lenovo PCs Can Reinstall Bloatware Even If You Format And Clean Install Windows, But There’s A Fix

Aatif·August 13, 2015
Lenovo has gained a lot of fame recently for making quality laptops, among other things. However, a recently-uncovered "feature" in its laptops, allows Lenovo to install their own software on the laptops - without the user's permission and/or knowledge - even if a clean install has been performed using a Windows DVD or flash disk.

Security Researchers Discover PC Firmware Vulnerabilities In Mac

Oliver Haslam·August 4, 2015

This Windows 10 Upgrade Scam Holds Your Computer Files For Ransom

Oliver Haslam·August 4, 2015
A new type of malware attack is on the loose, taking advantage of the recent Windows 10 release to spread its reach far and wide. According to a blog post by Cisco security researcher Nick Biasini, the attackers are using Microsoft's latest version of Windows as a way of getting people to install the malware, which then goes off and wreaks havoc.

Newly Discovered Android Vulnerability Can Render Your Phone Or Tablet Useless

Ali Hassan·July 31, 2015
Security researchers at Trend Micro have discovered a new vulnerability that they claim is present in Android 4.3 Jelly Bean up to the latest Android 5.1.1 Lollipop, which constitute to almost half of the Android devices out there. The vulnerability, if and when exploited, could make your device silent, unable to make phone calls and completely unusable. This apparently is caused by the way Android handles media files.

A Simple Text Message Can Hack 95% Of Android Phones, Researcher Says

Paul Morris·July 27, 2015
Load More

TRENDING

Download iOS 17.0.2 IPSW Links, OTA Profile Update On iPhone 15 / Pro Max The First Thing You Get The Phone

New iPhone 15 Boxes Have A Secret Security Feature To Stop Fake Phone Scams

How To Turn USB-C iPad Into A HDMI Monitor

Cut The Cord: Power Up Your New iPhone 15 With These Sleek Magnetic Wireless Chargers Starting From Just $10

Download: iOS 17.0.1 IPSW Links, OTA Update For iPhone, iPadOS 17.0.1 For iPad Released

Recent Comments

  • DedRaids Zero on This May Be Why Apple TV App Isn’t Coming To Android
  • Stephanie Duran on How To Hack WhatsApp Account Using Phone Number: Best Methods
  • Luis Familia on Apple Releases iTunes 12.12.4 For Windows Including Security Updates
  • iOS Salad on Jailbreak iOS 15.5 On iPhone And iPad Status Update
  • hopdyelet on iCloud Hack Sees Celebrities Have Their Private Photos Stolen, Posted Online
  • About
  • Advertise
  • Privacy Policy
  • Tip Us
Copyright © 2008-2023 Redmond Pie. All Rights Reserved.
  • About
  • Advertise
  • Privacy Policy
  • Apple
  • Google
  • Microsoft
  • Tesla
  • Reviews
  • Deals
Start typing to see results or hit ESC to close
iPhone Apple deals iPad Android
See all results

SUBSCRIBE

Join 100k+ other tech lovers and get the latest news in your inbox
[mc4wp_form id="389"]