Malware & Adware
Latest about Malware & Adware
This nasty Android trojan is hijacking calls to your bank and sending them to hackers — how to stay safe
By Anthony Spadafora published
The FakeCall banking trojan is back with new capabilities and now it can redirect calls to your bank directly to hackers to steal your financial info.
This Android banking trojan uses a fake lock screen to steal your PIN and your cash — how to stay safe
By Anthony Spadafora last updated
The TrickMo banking trojan is back with upgraded capabilities that make it easier for hackers to use it to commit on-device fraud from vulnerable Android phones.
This nasty Android adware is making phones unusable — how to stay safe
By Anthony Spadafora published
The MobiDash Android adware has returned and is targeting users through phishing emails and posts on Facebook.
Octo2 banking trojan is taking over Android phones and stealing cash — how to stay safe
By Anthony Spadafora last updated
After its source code leaked earlier this year, the Octo malware is back with a new version that can completely take over infected Android phones remotely.
11 million Android users infected with dangerous Necro trojan — how to stay safe
By Anthony Spadafora published
The Necro trojan has resurfaced and is now being injected into legitimate apps by hackers through malicious SDKs.
Think tap to pay is safer? New Android malware uses stolen NFC data to drain your accounts
By Anthony Spadafora published
The newly discovered NGate malware uses a malicious app to relay payment data from a victim’s phone to hackers.
New macOS malware poses as legitimate apps to steal passwords and personal data — how to stay safe
By Alyse Stanley last updated
Security researchers issue public warning about Cthulhu Stealer, a malware-as-a-service sold cheaply to criminals looking to target macOS users
Chrome and Edge users infected with malicious browser extensions that steal your personal data — what to do now
By Anthony Spadafora published
Security researchers have discovered a new malware campaign that uses malicious extensions distributed via fake sites impersonating popular software and services.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!