data theft

AppWizard
April 21, 2026
A new variant of the NGate malware targets Android users by disguising itself within a trojanized version of the HandyPay app, which is a legitimate mobile payment processing application. This malware, documented since mid-2024, siphons payment card information through the mobile device's near-field communication (NFC) chip and sends the stolen data directly to attackers, who create virtual cards for unauthorized purchases or cash withdrawals from NFC-enabled ATMs. The new variant has been injected with malicious code into the HandyPay app, which has been available on Google Play since 2021. The code includes emojis, indicating the possible use of a generative AI tool in its development. The shift from previous iterations, which used an open-source tool named NFCGate, to HandyPay is likely motivated by financial considerations and the need for evasion, as HandyPay is more affordable and requires fewer permissions. This NGate variant has been active since November 2025, primarily targeting Android devices in Brazil. It employs two main distribution methods: a counterfeit app named “Proteção Cartão” hosted on a fraudulent Google Play page and a fake lottery website that redirects users to WhatsApp to download the malicious APK. Upon installation, the app prompts users to set it as their default NFC payment application, requests their card PIN, and instructs them to tap their card on the phone for reading, transmitting all collected information to an attacker's email address. To protect against such threats, Android users are advised to avoid downloading APKs from outside Google Play, disable NFC when not in use, and use Play Protect to scan for threats.
AppWizard
March 20, 2026
Google is implementing a policy change to allow easier installation of Android applications from sources outside its Play Store, following an antitrust settlement. This includes an "advanced flow" option that lets users bypass mandatory app verification safeguards through a structured process. The changes aim to balance user choice with protections against scams and malware risks. Previously, Google required all Android applications to be registered by verified developers to mitigate risks like malware and fraud. The new process requires users to enable developer mode, restart their devices, and undergo a waiting period of up to 24 hours before verifying their identity with biometrics or a PIN to install apps from unverified developers. Users can install these apps temporarily for up to seven days or indefinitely, with ongoing warning prompts. Additionally, Google is offering free, limited app distribution accounts for students and hobbyists to share apps without full developer verification.
AppWizard
March 19, 2026
Cybersecurity researchers have identified a new family of Android malware called Perseus, designed for device takeovers and financial fraud. It utilizes Accessibility-based remote sessions for real-time monitoring and interaction with infected devices, particularly targeting Turkey and Italy. Perseus monitors user notes to extract personal or financial information and is distributed through dropper applications via phishing websites. It expands on the codebase of previous malware like Phoenix and employs disguises as IPTV services to reduce user suspicion. Once operational, it performs overlay attacks and captures keystrokes to steal credentials from financial applications. The malware allows operators to issue commands through a command-and-control panel, enabling various malicious actions, including capturing note content and initiating remote visual streams. Perseus also conducts environment checks to evade detection and ensure it operates on legitimate devices.
Tech Optimizer
March 19, 2026
Cybersecurity experts warn that MacBooks are becoming increasingly vulnerable to cyber threats, making the installation of robust antivirus software essential for protecting personal and financial data. Leading antivirus solutions for MacBooks include: - Bitdefender: Highly rated for security performance, includes a VPN, and offers protection across multiple devices. - Norton: Known for its dedicated malware research lab, offers features like phishing detection and a firewall, and ranks second-best for Mac antivirus. - Malwarebytes: User-friendly with strong malware removal capabilities, ranks second to Bitdefender, and offers a 14-day free trial. - Intego Mac Internet Security X9: Easy to use with comprehensive features including a firewall and parental controls. - ClamXAV: An open-source option that allows customization and provides multiple levels of protection at a low cost. Apple's built-in security features are less effective against sophisticated threats like ransomware, leaving users without antivirus protection at higher risk for attacks and financial losses. Cybersecurity threats targeting macOS are increasing, emphasizing the need for dedicated antivirus solutions.
AppWizard
February 22, 2026
Google blocked approximately 1.75 million dangerous or policy-violating apps from reaching users in 2025 and shut down over 80,000 developer accounts associated with fraud, malware, and repeated policy violations. Play Protect identified millions of risky apps installed from external sources, and it scans apps in real-time, even after installation. Key reasons for app rejections include malware behavior, financial fraud, misuse of permissions, and deceptive advertisements. The crackdown results in safer app downloads, reduced risk of data theft, improved privacy enforcement, and lower exposure to counterfeit applications.
Search