Android 'Triout' spyware records calls, sends photos and text messages to attackers

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Aug 23, 2018
Featured Image

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Anti-censorship proxy Psiphon to partner with secure messaging app Wickr. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Android 'Triout' spyware records calls, sends photos and text messages to attackers
Refresh your networking skills with this Cisco CCNA training suite
With new tools Zelkova and Tiros, AWS looks to reduce S3 configuration errors
Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says
Arista Networks PICs its spot In security
What are small organizations doing about cybersecurity?

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Thumbnail Image

Android 'Triout' spyware records calls, sends photos and text messages to attackers

Researchers identified new Android spyware with extensive surveillance capabilities being bundled into legitimate apps. Read More

Thumbnail Image
DealPost

Refresh your networking skills with this Cisco CCNA training suite

Over 30 hours of digital content across 399 lectures, which can be viewed on your computer or mobile device. Read More

Thumbnail Image

With new tools Zelkova and Tiros, AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments. Read More

Thumbnail Image

Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says

Over nearly a decade, PHP unserialization vulnerabilities have become a popular route for cyber-criminals to plant remote code execution or deliver other malware into systems. But new research, introduced at Black Hat this month, shows that malevolent hackers can introduce this vulnerability, even in environments that were previously considered low-risk for this attack. Read More

Thumbnail Image

Arista Networks PICs its spot In security

After establishing itself as an innovative network vendor, Arista has moved into the security market, addressing the challenges of 'places in cloud.' Read More

Thumbnail Image

What are small organizations doing about cybersecurity?

Firms with 50 to 499 employees are spending more money, purchasing security product suites, and outsourcing security tasks to MSSPs. Read More

White Paper: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More

Editor’s Picks

1. 3 reasons companies fail to assess the scope of a data breach
2. The 10 Windows group policy settings you need to get right
3. How to perform a risk assessment: Rethinking the process
4. Preparing for the day quantum computing cracks public-key cryptography: What to do now
5. 8 hot cyber security trends (and 4 going cold)
6. Top cyber security certifications: Who they're for, what they cost, and which you need
7. 24 best free security tools
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.