The Android Risk

Android devices

There are many posts on Smart Thinking highlighting malicious Android apps and I am constantly reminding you that if you have Android devices in your bring-your-own-device (BYOD) scheme then you need to take positive steps to manage them. Even if they are not your devices, they will have your information …

Stealing your data is a priority for threat actors

There is a highly completive market evolving to provide threat actors with malware that evades detection and then as quietly as possible exfiltrate sensitive data from the compromised system. This can include, cookies, session cookies, credentials, credit card and crypto-wallet data etc. The new info-stealing malware operations to watch out …