Hosted on MSN1mon
Malicious iPhone apps are spreading screenshot-reading malware on the Apple App Store — how to stay safeFor the first time, the Apple App Store is sharing malware privileges with the Google Play Store as apps infected with screenshot-reading SparkCat malware have been discovered on both platforms by ...
In a new development, researchers at Kaspersky have discovered SparkCat malware in iOS in suspicious App Store apps that can read screenshot contents. The researchers identified a new iOS malware ...
SparkCat is distributed through official app stores and requests permission to access images under the guise of seemingly legitimate functions, such as attaching images in support chats.
Security researchers at Kaspersky said the malware, dubbed SparkCat, has been active since March 2024. Initially, the researchers found the malicious framework within a food delivery app used in ...
Yes, malware has started to make its way from Android to the iPhone. Dubbed SparkCat, this is a kind of malware framework that runs in the background, running OCR on all your photos in hopes of ...
Security researchers at Kaspersky described the malware, SparkCat, as a data-stealing Trojan found to be active in Apple's AppStore and Google Play. They believe it has been floating around the ...
The malware "SparkCat" has been active since March 2024, according to security experts at Kaspersky. The report said they had initially found the malicious framework within a food delivery app in ...
It was recently reported that the “SparkCat” malware is stealing sensitive information in Malaysia through Optical Character Recognition (OCR) technology. Is this true? CSM, said in a ...
The malware, dubbed SparkCat, hides in various inconspicuous-looking apps that are distributed via the official manufacturer stores Google Play and App Store, as security firm Kaspersky reports.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results