Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

“There is gold in them thar networks”…and I agree!

I agree with Jim Martin, and it’s even more relevant today than it was back then. Beyond providing us with worldwide 24/7 connectivity that we have learned to expect, Communication Service Providers – CSPs – are masters of brand marketing, segmentation and continuous introduction of new pricing packages.  When I browse the websites of CSPs,…