Kaspersky discovered ‘SparkCat’ malware aimed at stealing cryptocurrency in multiple iOS apps.
Malware that includes code for reading the contents of screenshots has been found in suspicious App Store apps for the first time, according to a report from Kaspersky. Dubbed "SparkCat," the ...
Occasionally though, iPhone apps with malicious code slip through the cracks, and today, researchers at Kaspersky have reported on new malware they discovered in App Store apps—which they say is ...
A user who fell prey to the malware left a Google review on the Apps page. Source: Kaspersky Labs Kaspersky’s analysts recommended not to store sensitive information in screenshots or a phone ...
But neither company is perfect, and apps infected with malware end up on official app marketplaces more often that we'd like to think. These apps usually pop up on the Play Store more than the App ...
In what appears to be a first, a strain of malware that can secretly steal screenshots from smartphones has infiltrated the Apple App Store. The so-called “SparkCat” malware was discovered ...
For the first time, the Apple App Store is sharing malware privileges with the Google Play Store as apps infected with screenshot-reading SparkCat malware have been discovered on both platforms by ...
Information on new "SparkCat" malware infesting a small number of iOS apps was shared yesterday by Kaspersky, and shortly after the report came out, Apple pulled the apps from the App Store.
Apps delivering malware to users to steal crypto found on iOS app store Some of these apps have thousands of installs across iOS and Android The 'SparkCat' campaign has been active since March ...
Italian company SIO, which sells to government customers, is behind an Android spyware campaign called Spyrtacus that spoofed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results