Normal view
Why iPhone users should update and restart their devices now
If you were still questioning whether iOS 26+ is for you, now is the time to make that call.
Why?
On December 12, 2025, Apple patched two WebKit zeroβday vulnerabilities linked to mercenary spyware and is now effectively pushing iPhone 11 and newer users toward iOS 26+, because thatβs where the fixes and new memory protections live. These vulnerabilities were primarily used in highly targeted attacks, but such campaigns are likely to expand over time.
WebKit powers the Safari browser and many other iOS applications, so itβs a big attack surface to leave exposed and isnβt limited to βriskyβ behavior. These vulnerabilities allowed an attacker to execute arbitrary code on a device after exploitation via malicious web content.
Apple has confirmed that attackers are already exploiting these vulnerabilities in the wild, making installation of the update a highβpriority security task for every user. Campaigns that start with diplomats, journalists, or executives often lead to tooling and exploits leaking or being repurposed, so βIβm not a targetβ is not a viable safety strategy.β
Due to public resistance to new features like Liquid Glass, many iPhone users have not yet upgraded to iOS 26.2. Reports suggest adoption of iOS 26 has been unusually slow. As of January 2026, only about 4.6% of active iPhones are on iOS 26.2, and roughly 16% are on any version of iOS 26, leaving the vast majority on older releases such as iOS 18.
However, Apple only ships these fixes and newer protections, such as Memory Integrity Enforcement, on iOS 26+ for supported devices. Users on older, unsupported devices wonβt be able to access these protections at all.
Another important factor in the upgrade cycle is restarting the device. What many people donβt realize is that when you restart your device, any memory-resident malware is flushedβunless it has somehow gained persistence, in which case it will return. High-end spyware tools tend to avoid leaving traces needed for persistence and often rely on users not restarting their devices.
Upgrading requires a restart, which makes this a win-win: you get the latest protections, and any memory-resident malware is flushed at the same time.
For iOS and iPadOS users, you can check if youβre using the latest software version, go to Settings > General > Software Update. Itβs also worth turning on Automatic Updates if you havenβt already. You can do that on the same screen.
How to stay safe
The most important fixβhowever painful you may find itβis to upgrade to iOS 26.2. Not doing means missing an accumulating list of security fixes, leaving your device vulnerable to more and more newly found vulnerabilities.
Β But here are some other useful tips:
- Make it a habit to restart your device on a regular basis. The NSA recommends doing this weekly.
- Do not open unsolicited links and attachments without verifying with the trusted sender.
- Remember, Apple threat notifications will never ask users to click links, open files, install apps or ask for account passwords or verification code.
- For Apple Mail users specifically, these vulnerabilities create risk when viewing HTML-formatted emails containing malicious web content.
- Malwarebytes for iOS can help keep your device secure, with Trusted Advisor alerting you when important updates are available.
- If you are a high-value target, or you want the extra level of security, consider using Appleβs Lockdown Mode.
We donβt just report on phone securityβwe provide it
Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices byΒ downloading Malwarebytes for iOS, and Malwarebytes for Android today.
Why iPhone users should update and restart their devices now
If you were still questioning whether iOS 26+ is for you, now is the time to make that call.
Why?
On December 12, 2025, Apple patched two WebKit zeroβday vulnerabilities linked to mercenary spyware and is now effectively pushing iPhone 11 and newer users toward iOS 26+, because thatβs where the fixes and new memory protections live. These vulnerabilities were primarily used in highly targeted attacks, but such campaigns are likely to expand over time.
WebKit powers the Safari browser and many other iOS applications, so itβs a big attack surface to leave exposed and isnβt limited to βriskyβ behavior. These vulnerabilities allowed an attacker to execute arbitrary code on a device after exploitation via malicious web content.
Apple has confirmed that attackers are already exploiting these vulnerabilities in the wild, making installation of the update a highβpriority security task for every user. Campaigns that start with diplomats, journalists, or executives often lead to tooling and exploits leaking or being repurposed, so βIβm not a targetβ is not a viable safety strategy.β
Due to public resistance to new features like Liquid Glass, many iPhone users have not yet upgraded to iOS 26.2. Reports suggest adoption of iOS 26 has been unusually slow. As of January 2026, only about 4.6% of active iPhones are on iOS 26.2, and roughly 16% are on any version of iOS 26, leaving the vast majority on older releases such as iOS 18.
However, Apple only ships these fixes and newer protections, such as Memory Integrity Enforcement, on iOS 26+ for supported devices. Users on older, unsupported devices wonβt be able to access these protections at all.
Another important factor in the upgrade cycle is restarting the device. What many people donβt realize is that when you restart your device, any memory-resident malware is flushedβunless it has somehow gained persistence, in which case it will return. High-end spyware tools tend to avoid leaving traces needed for persistence and often rely on users not restarting their devices.
Upgrading requires a restart, which makes this a win-win: you get the latest protections, and any memory-resident malware is flushed at the same time.
For iOS and iPadOS users, you can check if youβre using the latest software version, go to Settings > General > Software Update. Itβs also worth turning on Automatic Updates if you havenβt already. You can do that on the same screen.
How to stay safe
The most important fixβhowever painful you may find itβis to upgrade to iOS 26.2. Not doing means missing an accumulating list of security fixes, leaving your device vulnerable to more and more newly found vulnerabilities.
Β But here are some other useful tips:
- Make it a habit to restart your device on a regular basis. The NSA recommends doing this weekly.
- Do not open unsolicited links and attachments without verifying with the trusted sender.
- Remember, Apple threat notifications will never ask users to click links, open files, install apps or ask for account passwords or verification code.
- For Apple Mail users specifically, these vulnerabilities create risk when viewing HTML-formatted emails containing malicious web content.
- Malwarebytes for iOS can help keep your device secure, with Trusted Advisor alerting you when important updates are available.
- If you are a high-value target, or you want the extra level of security, consider using Appleβs Lockdown Mode.
We donβt just report on phone securityβwe provide it
Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices byΒ downloading Malwarebytes for iOS, and Malwarebytes for Android today.
pcTattletale founder pleads guilty as US cracks down on stalkerware
Reportedly, pcTattletale founder Bryan Fleming has pleaded guilty in US federal court to computer hacking, unlawfully selling and advertising spyware, and conspiracy.
This is good news not just because we despise stalkerware like pcTattletale, but because it is only the second US federal stalkerware prosecution in a decade. It could could open the door to further cases against people who develop, sell, or promote similar tools.
In 2021, we reported that βemployee and child-monitoringβ software vendor pcTattletale had not been very careful about securing the screenshots it secretly captured from victimsβ phones. A security researcher testing a trial version discovered that the app uploaded screenshots to an unsecured online database, meaning anyone could view them without authentication, such as a username and password.
In 2024, we revisited the app after researchers found it was once again leaking a database containing victim screenshots. One researcher discovered that pcTattletaleβs Application Programming Interface (API) allowed anyone to access the most recent screen capture recorded from any device on which the spyware is installed. Another researcher uncovered a separate vulnerability that granted full access to the appβs backend infrastructure. That access allowed them to deface the website and steal AWS credentials, which turned out to be shared across all devices. As a result, the researcher obtained data about both victims and the customers who were doing the tracking.
This is no longer possible. Not because the developers fixed the problems, but because Amazon locked pcTattletaleβs entire AWS infrastructure. Fleming later abandoned the product and deleted the contents of its servers.
However, Homeland Security Investigations had already started investigating pcTattletale in June 2021 and did not stop. A few things made Fleming stand out among other stalkerware operators. While many hide behind overseas shell companies, Fleming appeared to be proud of his work. And while others market their products as parental control or employee monitoring tools, pcTattletale explicitly promoted spying on romantic partners and spouses, using phrases such as βcatch a cheaterβ and βsurreptitiously spying on spouses and partners.β This made it clear the software was designed for non-consensual surveillance of adults.
Fleming is expected to be sentenced later this year.
Removing stalkerware
Malwarebytes, as one of the founding members of theΒ Coalition Against Stalkerware, makes it a priority to detect and remove stalkerware-type apps from your device.
It is important to keep in mind, however, that removing stalkerware may alert the person spying on you that the app has been discovered. The Coalition Against Stalkerware outlines additional steps and considerations to help you decide the safest next move.
Because the apps often install under different names and hide themselves from users, they can be difficult to find and remove.Β That is whereΒ MalwarebytesΒ can help you.
To scan your device:
- Open your Malwarebytes dashboard
- Start aΒ Scan
The scan may take a few minutes.
Β IfΒ malwareΒ is detected, you can choose one of the following actions:
- Uninstall. The threat will be deleted from your device.
- Ignore Always. The file detection will be added to the Allow List, and excluded from future scans. Legitimate files are sometimes detected as malware. We recommend reviewing scan results and adding files to Ignore Always that you know are safe and want to keep.
- Ignore Once: The detection is ignored for this scan only. It will be detected again during your next scan.
Malwarebytes detects pcTattleTale asΒ PUP.Optional.PCTattletale.
We donβt just report on threatsβwe remove them
Cybersecurity risks should never spread beyond a headline. Keep threats off your devices byΒ downloading Malwarebytes today.
pcTattletale founder pleads guilty as US cracks down on stalkerware
Reportedly, pcTattletale founder Bryan Fleming has pleaded guilty in US federal court to computer hacking, unlawfully selling and advertising spyware, and conspiracy.
This is good news not just because we despise stalkerware like pcTattletale, but because it is only the second US federal stalkerware prosecution in a decade. It could could open the door to further cases against people who develop, sell, or promote similar tools.
In 2021, we reported that βemployee and child-monitoringβ software vendor pcTattletale had not been very careful about securing the screenshots it secretly captured from victimsβ phones. A security researcher testing a trial version discovered that the app uploaded screenshots to an unsecured online database, meaning anyone could view them without authentication, such as a username and password.
In 2024, we revisited the app after researchers found it was once again leaking a database containing victim screenshots. One researcher discovered that pcTattletaleβs Application Programming Interface (API) allowed anyone to access the most recent screen capture recorded from any device on which the spyware is installed. Another researcher uncovered a separate vulnerability that granted full access to the appβs backend infrastructure. That access allowed them to deface the website and steal AWS credentials, which turned out to be shared across all devices. As a result, the researcher obtained data about both victims and the customers who were doing the tracking.
This is no longer possible. Not because the developers fixed the problems, but because Amazon locked pcTattletaleβs entire AWS infrastructure. Fleming later abandoned the product and deleted the contents of its servers.
However, Homeland Security Investigations had already started investigating pcTattletale in June 2021 and did not stop. A few things made Fleming stand out among other stalkerware operators. While many hide behind overseas shell companies, Fleming appeared to be proud of his work. And while others market their products as parental control or employee monitoring tools, pcTattletale explicitly promoted spying on romantic partners and spouses, using phrases such as βcatch a cheaterβ and βsurreptitiously spying on spouses and partners.β This made it clear the software was designed for non-consensual surveillance of adults.
Fleming is expected to be sentenced later this year.
Removing stalkerware
Malwarebytes, as one of the founding members of theΒ Coalition Against Stalkerware, makes it a priority to detect and remove stalkerware-type apps from your device.
It is important to keep in mind, however, that removing stalkerware may alert the person spying on you that the app has been discovered. The Coalition Against Stalkerware outlines additional steps and considerations to help you decide the safest next move.
Because the apps often install under different names and hide themselves from users, they can be difficult to find and remove.Β That is whereΒ MalwarebytesΒ can help you.
To scan your device:
- Open your Malwarebytes dashboard
- Start aΒ Scan
The scan may take a few minutes.
Β IfΒ malwareΒ is detected, you can choose one of the following actions:
- Uninstall. The threat will be deleted from your device.
- Ignore Always. The file detection will be added to the Allow List, and excluded from future scans. Legitimate files are sometimes detected as malware. We recommend reviewing scan results and adding files to Ignore Always that you know are safe and want to keep.
- Ignore Once: The detection is ignored for this scan only. It will be detected again during your next scan.
Malwarebytes detects pcTattleTale asΒ PUP.Optional.PCTattletale.
We donβt just report on threatsβwe remove them
Cybersecurity risks should never spread beyond a headline. Keep threats off your devices byΒ downloading Malwarebytes today.
The Truman Show Scam: Trapped in an AI-Generated Reality
Executive Summary The OPCOPRO βTruman Showβ operation is a fully synthetic, AIβpowered investment scam that uses legitimate Android and iOS apps from the official mobile app stores, and AIβgenerated communities to steal money and identity data from victims. Instead of relying on malicious code, the attackers use social engineering. The attackers pull victims using phishing SMS/ads/Telegram into tightly-controlled WhatsApp and Telegram groups, where AIβgenerated βexpertsβ and synthetic peers simulate an institutionalβgrade trading community for weeks before any money or personal details are requested. The mobile apps themselves contain no trading logic and act only as WebView shells connected to attackerβcontrolled [β¦]
The post The Truman Show Scam: Trapped in an AI-Generated Reality appeared first on Check Point Blog.
Malware in 2025 spread far beyond Windows PCs
This blog is part of a series highlighting new and concerning trends we noticed over the last year. Trends matter because they almost always provide a good indication of whatβs coming next.
If thereβs one thing that became very clear in 2025, itβs that malware is no longer focused on Windows alone. Weβve seen some major developments, especially in campaigns targeting Android and macOS. Unfortunately, many people still donβt realize that protecting smartphones, tablets, and other connected devices is just as essential as securing their laptops.
Android
Banking Trojans on Android are not new, but their level of sophistication continues to rise. These threats continue to be a major problem in 2025, often disguising themselves as fake apps to steal credentials or stealthily take over devices. A recent wave of advanced banking Trojans, such as Herodotus, can mimic human typing behaviors to evade detection, highlighting just how refined these attacks have become. Android malware also includes adware that aggressively pushes intrusive ads through free apps, degrading both the user experience and overall security.
Several Trojans were found to use overlays, which are fake login screens appearing on top of real banking and cryptocurrency apps. They can read whatβs on the screen, so when someone enters their username and password, the malware steals them.
macOS
One of the most notable developments for Mac users was the expansion of the notorious ClickFix campaign to macOS. Early in 2025, I described how criminals used fake CAPTCHA sites and a clipboard hijacker to provide instructions that led visitors ro infect their own machines with the Lumma infostealer.
ClickFix is the name researchers have since given to this type of campaign, where users are tricked into running malicious commands themselves. On macOS, this technique is being used to distribute both AMOS stealers and the Rhadamanthys infostealer.
Cross-platform
Malware developers increasingly use cross-platform languages such as Rust and Go to create malware that can run on Windows, macOS, Linux, mobile, and even Internet of Things (IoT) devices. This enables flexible targeting and expands the number of potential victims. Malware-as-a-Service (MaaS) models are on the rise, offering these tools for rent or purchase on underground markets, further professionalizing malware development and distribution.
Social engineering
iPhone users have been found to be more prone to scams and less conscious about mobile security than Android owners. That brings us to the first line of defense, which has nothing to do with the device or operating system you use: education.
Social engineering exploits human behavior, and knowing what to look out for makes you far less likely to fall for a scam.
Fake apps that turn out to be malware, malicious apps in the Play Store, sextortion, and costly romance scams all prey on basic human emotions. They either go straight for the money or deliver Trojan droppers as the first step toward infecting a device.
Weβve also seen consistent growth in Remote Access Trojan (RAT) activity, often used as an initial infection method. Thereβs also been a rise in finance-focused attacks, including cryptocurrency and banking-related targets, alongside widespread stealer malware driving data breaches.
What does this mean for 2026?
Taken together, these trends point to a clear shift. Cybercriminals are increasingly focusing on operating systems beyond Windows, combining advanced techniques and social engineering tailored specifically to mobile and macOS.
We donβt just report on threatsβwe remove them
Cybersecurity risks should never spread beyond a headline. Keep threats off your devices byΒ downloading Malwarebytes today.
Malware in 2025 spread far beyond Windows PCs
This blog is part of a series highlighting new and concerning trends we noticed over the last year. Trends matter because they almost always provide a good indication of whatβs coming next.
If thereβs one thing that became very clear in 2025, itβs that malware is no longer focused on Windows alone. Weβve seen some major developments, especially in campaigns targeting Android and macOS. Unfortunately, many people still donβt realize that protecting smartphones, tablets, and other connected devices is just as essential as securing their laptops.
Android
Banking Trojans on Android are not new, but their level of sophistication continues to rise. These threats continue to be a major problem in 2025, often disguising themselves as fake apps to steal credentials or stealthily take over devices. A recent wave of advanced banking Trojans, such as Herodotus, can mimic human typing behaviors to evade detection, highlighting just how refined these attacks have become. Android malware also includes adware that aggressively pushes intrusive ads through free apps, degrading both the user experience and overall security.
Several Trojans were found to use overlays, which are fake login screens appearing on top of real banking and cryptocurrency apps. They can read whatβs on the screen, so when someone enters their username and password, the malware steals them.
macOS
One of the most notable developments for Mac users was the expansion of the notorious ClickFix campaign to macOS. Early in 2025, I described how criminals used fake CAPTCHA sites and a clipboard hijacker to provide instructions that led visitors ro infect their own machines with the Lumma infostealer.
ClickFix is the name researchers have since given to this type of campaign, where users are tricked into running malicious commands themselves. On macOS, this technique is being used to distribute both AMOS stealers and the Rhadamanthys infostealer.
Cross-platform
Malware developers increasingly use cross-platform languages such as Rust and Go to create malware that can run on Windows, macOS, Linux, mobile, and even Internet of Things (IoT) devices. This enables flexible targeting and expands the number of potential victims. Malware-as-a-Service (MaaS) models are on the rise, offering these tools for rent or purchase on underground markets, further professionalizing malware development and distribution.
Social engineering
iPhone users have been found to be more prone to scams and less conscious about mobile security than Android owners. That brings us to the first line of defense, which has nothing to do with the device or operating system you use: education.
Social engineering exploits human behavior, and knowing what to look out for makes you far less likely to fall for a scam.
Fake apps that turn out to be malware, malicious apps in the Play Store, sextortion, and costly romance scams all prey on basic human emotions. They either go straight for the money or deliver Trojan droppers as the first step toward infecting a device.
Weβve also seen consistent growth in Remote Access Trojan (RAT) activity, often used as an initial infection method. Thereβs also been a rise in finance-focused attacks, including cryptocurrency and banking-related targets, alongside widespread stealer malware driving data breaches.
What does this mean for 2026?
Taken together, these trends point to a clear shift. Cybercriminals are increasingly focusing on operating systems beyond Windows, combining advanced techniques and social engineering tailored specifically to mobile and macOS.
We donβt just report on threatsβwe remove them
Cybersecurity risks should never spread beyond a headline. Keep threats off your devices byΒ downloading Malwarebytes today.
SMS Phishers Pivot to Points, Taxes, Fake Retailers
China-based phishing groups blamed for non-stop scam SMS messages about a supposed wayward package or unpaid toll fee are promoting a new offering, just in time for the holiday shopping season: Phishing kits for mass-creating fake but convincing e-commerce websites that convert customer payment card data into mobile wallets from Apple and Google. Experts say these same phishing groups also are now using SMS lures that promise unclaimed tax refunds and mobile rewards points.
Over the past week, thousands of domain names were registered for scam websites that purport to offer T-Mobile customers the opportunity to claim a large number of rewards points. The phishing domains are being promoted by scam messages sent via Appleβs iMessage service or the functionally equivalent RCS messaging service built into Google phones.
An instant message spoofing T-Mobile says the recipient is eligible to claim thousands of rewards points.
The website scanning service urlscan.io shows thousands of these phishing domains have been deployed in just the past few days alone. The phishing websites will only load if the recipient visits with a mobile device, and they ask for the visitorβs name, address, phone number and payment card data to claim the points.
A phishing website registered this week that spoofs T-Mobile.
If card data is submitted, the site will then prompt the user to share a one-time code sent via SMS by their financial institution. In reality, the bank is sending the code because the fraudsters have just attempted to enroll the victimβs phished card details in a mobile wallet from Apple or Google. If the victim also provides that one-time code, the phishers can then link the victimβs card to a mobile device that they physically control.
Pivoting off these T-Mobile phishing domains in urlscan.io reveals a similar scam targeting AT&T customers:
An SMS phishing or βsmishingβ website targeting AT&T users.
Ford Merrill works in security research atΒ SecAlliance, aΒ CSIS Security Group company. Merrill said multiple China-based cybercriminal groups that sell phishing-as-a-service platforms have been using the mobile points lure for some time, but the scam has only recently been pointed at consumers in the United States.
βThese points redemption schemes have not been very popular in the U.S., but have been in other geographies like EU and Asia for a while now,β Merrill said.
A review of other domains flagged by urlscan.io as tied to this Chinese SMS phishing syndicate shows they are also spoofing U.S. state tax authorities, telling recipients they have an unclaimed tax refund. Again, the goal is to phish the userβs payment card information and one-time code.
A text message that spoofs the District of Columbiaβs Office of Tax and Revenue.
CAVEAT EMPTOR
Many SMS phishing or βsmishingβ domains are quickly flagged by browser makers as malicious. But Merrill said one burgeoning area of growth for these phishing kits β fake e-commerce shops β can be far harder to spot because they do not call attention to themselves by spamming the entire world.
Merrill said the same Chinese phishing kits used to blast out package redelivery message scams are equipped with modules that make it simple to quickly deploy a fleet of fake but convincing e-commerce storefronts. Those phony stores are typically advertised on Google and Facebook, and consumers usually end up at them by searching online for deals on specific products.
A machine-translated screenshot of an ad from a China-based phishing group promoting their fake e-commerce shop templates.
With these fake e-commerce stores, the customer is supplying their payment card and personal information as part of the normal check-out process, which is then punctuated by a request for a one-time code sent by your financial institution. The fake shopping site claims the code is required by the userβs bank to verify the transaction, but it is sent to the user because the scammers immediately attempt to enroll the supplied card data in a mobile wallet.
According to Merrill, it is only during the check-out process that these fake shops will fetch the malicious code that gives them away as fraudulent, which tends to make it difficult to locate these stores simply by mass-scanning the web. Also, most customers who pay for products through these sites donβt realize theyβve been snookered until weeks later when the purchased item fails to arrive.
βThe fake e-commerce sites are tough because a lot of them can fly under the radar,β Merrill said. βThey can go months without being shut down, theyβre hard to discover, and they generally donβt get flagged by safe browsing tools.β
Happily, reporting these SMS phishing lures and websites is one of the fastest ways to get them properly identified and shut down. Raymond DijkxhoornΒ is the CEO and a founding member ofΒ SURBL, a widely-used blocklist that flags domains and IP addresses known to be used in unsolicited messages, phishing and malware distribution. SURBL has created a website called smishreport.com that asks users to forward a screenshot of any smishing message(s) received.
βIf [a domain is] unlisted, we can find and add the new pattern and kill the restβ of the matching domains, Dijkxhoorn said. βJust make a screenshot and upload. The tool does the rest.β
The SMS phishing reporting site smishreport.com.
Merrill said the last few weeks of the calendar year typically see a big uptick in smishing β particularly package redelivery schemes that spoof the U.S. Postal Service or commercial shipping companies.
βEvery holiday season there is an explosion in smishing activity,β he said. βEveryone is in a bigger hurry, frantically shopping online, paying less attention than they should, and theyβre just in a better mindset to get phished.β
SHOP ONLINE LIKE A SECURITY PRO
As we can see, adopting a shopping strategy of simply buying from the online merchant with the lowest advertised prices can be a bit like playing Russian Roulette with your wallet. Even people who shop mainly at big-name online stores can get scammed if theyβre not wary of too-good-to-be-true offers (think third-party sellers on these platforms).
If you donβt know much about the online merchant that has the item you wish to buy, take a few minutes to investigate its reputation. If youβre buying from an online store that is brand new, the risk that you will get scammed increases significantly. How do you know the lifespan of a site selling that must-have gadget at the lowest price? One easy way to get a quick idea is to run a basic WHOIS searchΒ on the siteβs domain name. The more recent the siteβs βcreatedβ date, the more likely it is a phantom store.
If you receive a message warning about a problem with an order or shipment, visit the e-commerce or shipping site directly, and avoid clicking on links or attachments β particularly missives that warn of some dire consequences unless you act quickly. Phishers and malware purveyors typically seize upon some kind of emergency to create a false alarm that often causes recipients to temporarily let their guard down.
But itβs not just outright scammers who can trip up your holiday shopping: Often times, items that are advertised at steeper discounts than other online stores make up for it by charging way more than normal for shipping and handling.
So be careful what you agree to: Check to make sure you know how long the item will take to be shipped, and that you understand the storeβs return policies. Also, keep an eye out for hidden surcharges, and be wary of blithely clicking βokβ during the checkout process.
Most importantly, keep a close eye on your monthly statements. If I were a fraudster, Iβd most definitely wait until the holidays to cram through a bunch of unauthorized charges on stolen cards, so that the bogus purchases would get buried amid a flurry of other legitimate transactions. Thatβs why itβs key to closely review your credit card bill and to quickly dispute any charges you didnβt authorize.
-
Black Hills Information Security, Inc.

- Intercepting Traffic for Mobile Applications that Bypass the System Proxy
Intercepting Traffic for Mobile Applications that Bypass the System Proxy
![]()
This is a foolproof guide to intercepting traffic from mobile applications built on Flutter, which historically have been especially challenging to intercept.
The post Intercepting Traffic for Mobile Applications that Bypass the System Proxy appeared first on Black Hills Information Security, Inc..
How to Root Android Phones
![]()
This blog will cover how to root an AVD emulator and a physical Pixel 6. But before we cover those topics, let's cover what it is we will be doing and some of the pro/cons of rooting an Android phone.
The post How to Root Android Phones appeared first on Black Hills Information Security, Inc..
How to Install LineageOS on Your Android DeviceΒ
![]()
Hey guys, my name is Connor. I am a web developer here at BHIS who also loves hacking phones. Particularly, Android phones!Β Today, I am going to show you the basics [β¦]
The post How to Install LineageOS on Your Android DeviceΒ appeared first on Black Hills Information Security, Inc..
Field Guide to the Android Manifest File
![]()
Every Android application has a βmanifest.xmlβ file located in the root directory of the APK. (Remember APKs are just zip files.) The manifest file is like a guide to the application.
The post Field Guide to the Android Manifest File appeared first on Black Hills Information Security, Inc..
How to Build a Pentest Robot With Selenium IDE
![]()
Have you ever been on a pentest and thought to yourself, βI wish I had a robot to do this testing for me right now cuz this is just too much workβ?
The post How to Build a Pentest Robot With Selenium IDE appeared first on Black Hills Information Security, Inc..
Start to Finish: Configuring an Android Phone for Pentesting
![]()
Jeff Barbi // *Guest Post Background Unless youβre pentesting mobile apps consistently, itβs easy for your methodologies to fall out of date. Each new version of Android brings with it [β¦]
The post Start to Finish: Configuring an Android Phone for Pentesting appeared first on Black Hills Information Security, Inc..
Embedding Meterpreter in Android APK
![]()
Joff Thyer// Mobile is everywhere these days. So many applications in our daily life are being migrated towards a cloud deployment whereby the front end technology is back to the [β¦]
The post Embedding Meterpreter in Android APK appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security, Inc.

- Android Dev & Penetration Testing Setup β Part 3: Installing the drozer Attack Framework
Android Dev & Penetration Testing Setup β Part 3: Installing the drozer Attack Framework
![]()
Joff Thyer // Editorβs Note: Β This is part 3 of a 3 part series. Β Part 1 discussed configuring your virtual machine engine and virtual hardware emulation. Β Part 2Β covered installing Android [β¦]
The post Android Dev & Penetration Testing Setup β Part 3: Installing the drozer Attack Framework appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security, Inc.

- Android Dev & Penetration Testing Setup β Part 2: Installing Android Studio
Android Dev & Penetration Testing Setup β Part 2: Installing Android Studio
![]()
Joff Thyer // Editorβs Note: Β This is part 2 of a 3 part series. Β Part 1Β discussed configuring your virtual machine engine and virtual hardware emulation. Β Part 2 (this part) covers [β¦]
The post Android Dev & Penetration Testing Setup β Part 2: Installing Android Studio appeared first on Black Hills Information Security, Inc..
Android Dev & Penetration Testing Setup β Part 1
![]()
Joff Thyer // Editorβs Note: Β This is part 1 of a 3 part series. Β Part 1 will discuss configuring your virtual machine engine and virtual hardware emulation. Β Part 2Β covers installing [β¦]
The post Android Dev & Penetration Testing Setup β Part 1 appeared first on Black Hills Information Security, Inc..








