A new strain of Android malware uses the Tor privacy network to avoid detection while it snoops on your text messages, according to a report by Moscow-based security firm Kaspersky Lab. Dubbed Backdoor.AndroidOS.Torec.a, the Trojan connects to what's called a command-and-control server, through which, as the name implies, the Trojan's creators can send commands to infected phones. Once on your phone, the Trojan can collect and export a phone's vital information: telephone number, country, unique device ID, phone model, operating system and the names of all installed apps.
More...
Bookmarks