QR codes

AppWizard
December 18, 2025
A new Android malware campaign has been launched by the North Korean threat actor Kimsuky, introducing a variant called DocSwap. This malware is distributed via QR codes on phishing websites that impersonate CJ Logistics. Attackers use QR codes and notification pop-ups to lure victims into downloading the malware, which decrypts an embedded APK and activates Remote Access Trojan (RAT) capabilities. The malicious app is disguised as a legitimate application to bypass Android's security measures. Victims are tricked into installing the app through smishing texts or phishing emails that mimic delivery companies. The app downloads an APK named "SecDelivery.apk," which then loads the malware. It requests permissions to access various device functions and registers a service that simulates an OTP authentication screen. The app connects to an attacker-controlled server, allowing execution of commands such as logging keystrokes, capturing audio, and gathering sensitive information. Additionally, two other malicious samples have been identified, disguised as a P2B Airdrop app and a trojanized version of the BYCOM VPN app. The campaign also includes phishing sites mimicking popular South Korean platforms to capture user credentials.
AppWizard
November 26, 2025
CISA has issued a warning about spyware targeting users of instant messaging applications, particularly highlighting the Sturnus trojan, which poses significant risks to Android smartphone users. Sturnus, identified as a banking trojan, can bypass encrypted messaging by capturing messages after they are decrypted on the smartphone screen, rather than cracking the encryption itself. Security expert Aditya Sood noted that Sturnus uses a combination of plaintext, RSA, and AES-encrypted communication, complicating detection efforts. The trojan can read everything displayed on the smartphone screen in real time, including sensitive messages and contacts. CISA also identified tactics used by cyber threat actors, such as phishing, zero-click exploits, and impersonation to gain unauthorized access to messaging apps. Users are advised to keep Google’s Play Protect activated, avoid unauthorized app stores, and be cautious with accessibility permissions to protect against these threats.
AppWizard
November 25, 2025
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about the increasing threat of spyware targeting messaging applications, particularly on Android devices like Samsung. Cybercriminals are using social engineering techniques, including sending harmless-looking image files via WhatsApp, to install malicious software. Russian hackers have been reported to compromise Signal accounts. The alert highlights a focus on high-value individuals, including government officials and civil society members in the U.S., Middle East, and Europe. CISA has a history of issuing such alerts and provides cybersecurity guidance, including a "must-patch" list for federal agencies. Users are advised to be vigilant and follow mobile security guidelines, as threat groups are also using malicious QR codes and zero-click exploits to compromise devices.
TrendTechie
October 18, 2025
Many methods of console piracy have emerged over time, often exploiting unintentional vulnerabilities in licensed games. For example, the PSP was easily hacked due to flaws in games like Grand Theft Auto: Liberty City Stories and Medal of Honor: Heroes, which allowed users to manipulate save files to gain access to the system. A debug code in Alien: Resurrection for the PS1 enabled users to swap discs without turning off the console. Various makeshift tools have been used for hacking, such as a paperclip to exploit the Nintendo Switch and tweezers to access dormant memory sections in the Wii. The Nintendo 3DS was hacked using a magnet to trick the lid sensor, allowing access to developer mode. The Xbox 360 faced significant modding due to its firmware modification capabilities. A notable method involved drilling into the drive to bypass rewrite protection, known as the "Kamikaze Hack." While piracy methods have evolved, modern consoles have become increasingly secure, with fewer successful hacks reported in recent years. The appeal of piracy has diminished as subscription services and sales provide easier access to games.
AppWizard
October 15, 2025
Google has introduced two safety features for its Messages app: the Android Key Verifier and a spam protection feature. The Android Key Verifier is available for users on Android 10 and above, using QR codes to verify end-to-end encrypted message exchanges. Users can verify keys by tapping on the contact's name and selecting “Verify keys.” A confirmation message appears upon successful verification, and users are alerted if a contact's key changes due to reasons like acquiring a new device or SIM card, key expiration, or encryption protocol upgrades. Potential malicious reasons for key changes include man-in-the-middle attacks and SIM swapping. Users are advised to keep the Android System Key Verifier app updated. The spam protection feature prevents access to harmful links in texts unless marked as “not spam,” and it is now available worldwide.
Winsage
August 30, 2025
Microsoft will retire the Mobile Plans app on February 27, 2026, directing users to manage cellular plans through a web browser instead. The app will remain functional for managing eSIM data plans, but adjustments will require visiting the provider's website. Windows 11 users can activate eSIMs via QR codes or manual entry, with a new feature in testing that may simplify this process. Many Windows laptops, including Microsoft's Surface Pro 11, offer 5G or 4G LTE options. An eSIM integrates SIM functionality into the device, eliminating the need for a physical card and allowing easier carrier switching. Laptops can connect through 5G or 4G LTE networks, with 5G providing enhanced speeds and lower latency.
Winsage
August 29, 2025
Microsoft will retire the Mobile Plans app in Windows 11 by February 2026 to simplify the process of connecting PCs to mobile data. Users will manage cellular plans through web browsers and the Settings app instead of the app. The Mobile Plans app, which allowed users to discover mobile operators and manage pay-as-you-go plans, is becoming redundant as these tasks can now be done online. Existing eSIM profiles will remain functional, but management will shift to carriers' websites. Notifications about the app's end of support will be sent to users, and it will be removed from the Microsoft Store after February 27, 2026. Cellular carriers are adapting their systems for web-based activations to support this transition.
AppWizard
August 11, 2025
A wave of mobile malware is targeting Android users in India, posing as legitimate banking applications. This malware can fully compromise infected devices, stealing sensitive data, intercepting communications, and conducting unauthorized financial transactions. It typically spreads through deceptive "dropper" apps via phishing messages on platforms like WhatsApp, SMS, or email, often disguised as system updates or official banking apps. The malware requests extensive Android permissions, allowing it to read and send SMS messages and intercept two-factor authentication codes. It operates stealthily, bypassing Android’s battery optimization features, and can manipulate notification content. All captured data is transmitted to attackers, enabling potential financial fraud and identity theft. Users are advised to install apps only from trusted sources, be skeptical of unexpected installation prompts, and review permission requests carefully.
Search