Trustlook has released its Q4 Trustlook Insights report which focuses on the latest trends and best practices in BYOD (Bring Your Own Device). BYOD is the practice of allowing employees to use personal
SkyEye from Trustlook provides deep insights into mobile apps. The following 10 apps contain the most dangerous malware for the past week.1.Android.Trojan.Kungfu2.Android.Trojan.Vplayer3.Android.Troj.Dialer4.Android.
Trustlook Mobile Security has researched an app (MD5: 67257EA2E9EC6B35C9E5245927980EEA) that is packed/encrypted by Baidu Protect, the service provided by Baidu. Users can upload their APKs to the developer portal in Baidu to
Watch the intro video hereAfrica’s leading mobile device maker TECNO Mobile, a subsidiary of Transsion Holdings has partnered with Trustlook, a next generation mobile security company. Visit https://www.tecno-mobile.com to
360 researchers (Alpha Team) has recently uncovered a vulnerability that affects millions of Android phones. Since it is especially widespread in China and can cause significant damage, it has been assigned CNNVD-201608-414 in
Passwords, usernames and emails have all been made available for some 800,000 users in the latest big name data leak, this time from porn network Brazzers. That’s the number of email
Due to the expanding popularity of Pokémon Go, the app has attracted more hacker’s attention than ever, because the popular game app can help hackers spread their malicious apps more efficiently. An
We reported last week that BadKernel, a flaw in the Google Chromium mobile browser framework that spreads as users click on malicious links, affects 30 million Android users. However, from our internal reporting
An Updated Version (Version 3.5.10) of the Trustlook Mobile Security App Identifies the BadKernel Issue Affecting 30 Million Android UsersTrustlook has released a new feature in its Trustlook Mobile Security app
Trustlook has released a new feature in its Trustlook Mobile Security app that proactively notifies users of any new malware on their device. Instead of a user needing to re-scan their device in
Trustlook was thrilled to be part of Black Hat 2016 at Mandalay Bay in Las Vegas. We had a booth in Innovation City, and had the chance to meet many great people in
Developers working on the Replicant OS Project has claimed to uncover a backdoor into the device’s file-system for several Samsung Galaxy mobile devices using the stock Android image. In particular, the proprietary