Computer Science has no limit. This strong conviction has always been the reason for my attraction to it. But why is there no limit? Because like any other science by definition, it has no ending. Computer Science also brings into reality results of applied researches, themselves supported by fundamental researches.
Half way through the two-year implementation period before the General Data Protection Regulation (GDPR) is taking effect, many decision makers in businesses around the world are still unaware that the new law will affect them.
Even though nothing is better than hosting an on-device security solution to protect sensitive data, there still are some security measures worth knowing to make mobile devices more secure.
In an article published in March, we were informing you about the risks behind malicious clones of popular applications. Five months later, impostor apps are still trying to access our data and to target more users.
Overlay malware allows attackers to create an overlay to be displayed on top of legitimate Android applications. The overlay mimics the real app UI (User Interface) to trick users into entering sensitive data into a fake window that will collect and forward them to a remote attacker.