CURRENT TRENDS IN ANDROID MOBILE MALWARE

July 8, 2019

Whilst Apple products are certainly not invulnerable from dangerous malware, Android phones are continuously hitting the headlines due to seemingly constant malware assaults. Google’s official app store, Google Play, has seen witness to risky malware, including the use of mobile botnets and adware. In addition, state-actors have increased their activity and sophistication in the mobile arena. Check Point have analysed the trends in Android malware, looking into the dangerous mobile malware which is infiltrating Google Play, subsequently infecting millions of unsuspecting Android users. Read their full report here.

Spotlight

G2OPS

G2 Ops is a Woman-Owned Small Business and a preferred provider of analytical and innovative solutions in the following areas: Model-Based Systems Engineering. Cybersecurity Requirements, Analysis, and Threat Assessment. Energy Facility Security Planning & Threat Evaluation. Shipboard Network Communications and Security Systems Design & Installation. Energy Sector Security Solutions. Education Consulting. Strategic vision: G2 Ops helps companies stay ahead of cyber crime and IT threats by identifying and measuring weaknesses before incidents occur, then providing remediation priorities based on individual business and financial risk thresholds.

Other Infographics
news image

Impact of Social Engineering Attacks

Infographic | April 4, 2022

A social engineering attack exploits human error to gain access to private and sensitive information.

Read More
news image

Know the Use Cases of Biometric Technologies

Infographic | April 4, 2022

Biometrics is the most suitable means of identifying and authenticating individuals. It is reliable and fast because of the unique biological characteristics it uses.

Read More
news image

Infographic - Top cyber threats in the EU

Infographic | July 29, 2021

Cybersecurity threats are on the rise. Cyberattacks have continued to increase in the EU in 2020 and 2021, in both sophistication and numbers, but also in terms of their impact. The EU is working on various fronts to protect people and businesses from cybercrime and to ensure a safe, open and secure cyberspace.

Read More
news image

Cybersecurity: main and emerging threats in 2021

Infographic | January 27, 2022

The progress of digital transformation has inevitably led to new cybersecurity threats. Cybercriminals take advantage of the Covid-19 pandemic, in particular by targeting organisations and companies working remotely. Parliament has adopted its position on a new EU directive that reflects how cybersecurity threats have evolved and introduces harmonised measures across the EU, including on the protection of essential sectors.

Read More
news image

CYBER SAFETY STARTS AT HOME

Infographic | January 28, 2020

With everyone in the family using the internet to engage in social media, adjust the home thermostat or shop for the latest connected toy, it is vital to make certain that the entire household — including children and older adults — learn to use the internet safely and responsibility.

Read More
news image

Application Security: Paving the Way to Counter Emerging Cyberthreats

Infographic | June 23, 2023

Uncover essential strategies and techniques for application security and empower businesses to protect their digital assets and fortify digital defenses against emerging threats and vulnerabilities.

Read More

Spotlight

G2OPS

G2 Ops is a Woman-Owned Small Business and a preferred provider of analytical and innovative solutions in the following areas: Model-Based Systems Engineering. Cybersecurity Requirements, Analysis, and Threat Assessment. Energy Facility Security Planning & Threat Evaluation. Shipboard Network Communications and Security Systems Design & Installation. Energy Sector Security Solutions. Education Consulting. Strategic vision: G2 Ops helps companies stay ahead of cyber crime and IT threats by identifying and measuring weaknesses before incidents occur, then providing remediation priorities based on individual business and financial risk thresholds.

Events