SIM swapping: The danger inside your phone

SIM swapping: The danger inside your phone

SIM swapping targets people from various areas of life. A taxi driver is technically not less vulnerable to this attack as a business owner. In this article we cover how it works, offer prevention measures and present tips if you’re being SIM swapped right now....
T-RAT 2.0: Malware control via smartphone

T-RAT 2.0: Malware control via smartphone

Malware sellers want to attract customers with convenience features. Now criminals can remote control malware during their bathroom routine by just using a smartphone and Telegram app. Advertisments on Russian forums The researcher @3xp0rtblog discovered T-RAT 2.0...
IceRat evades antivirus by running PHP on Java VM

IceRat evades antivirus by running PHP on Java VM

IceRat keeps low detections rates for weeks by using an unusual language implementation: JPHP. But there are more reasons than the choice of the compiler. This article explores IceRat and explains a way to analyze JPHP malware. Discovery of IceRat User McMcbrad of...