And You Won't Have To...
And You Won't Have To...
Your Data Is Your's
Text Message Opt-in
I confirm that I want to receive automated reminders and promotional messages from this company using any contact information I provide. I also agree to your terms of service and Privacy Policy. This agreement isn't a condition of any purchase. Msg & Data rates may apply. Reply STOP to end or HELP for help.
Threat Alert:
"iRecorder – Screen Recorder" with more than 50,000 installs Google Play store since its 2021nfall 2021 launch was an app considered to be harmless... at first.
Malware, at some point during a subsequent update, was introduced and the app became a threat to the Android users who had previously downloaded it.
With that said, here's what you should know:
The code extracts microphone recordings, searches for and then steals files with specific extension. Targeting specific file extensions is often an indicator of espionage type campaigns.
This RAT or remote access Trojan is a malware known as AhMyth, that accesses a victim's phone data and sends the data to the attackers allowing them to do what they want with the data or to the compromised devices.
It's been pulled from Google Play, but I am advising you to check your downloaded apps and delete the app if found. Currently, this RAT is not being detected in the wild.
Check the App's Google Play page and familiarize yourself with the permissions the app requires. This once legitimate app was compromised and would have asked for additional permissions beyond what the app creators have listed.
I've got workshops and understanding cybersecurity trainings in the works. But if you need help you can book a security call. We'll cover protection and defense... securing your home networks and more. Then we'll tackle how to shield your privacy... out in the wild. Finally, learn the favorite techniques and products security experts use to shut down access to those all important social apps.
I created the GhostMode Cybersecurity 101 & 201 Series to bring cutting edge, up-to-date security info and how to understand it. We'll cover AI, Web3, and even blockchain technologies in easy to understand every day language.
We call the vulnerable point of attack an endpoint. We can start with a security audit and create a strategy of recommended products and services you can tailor to your home or business needs. You'll have access to recurring security updates and previews of what we're seeing in the cyberworld.
Meet Your Security Expert
Oh Hello! I’m Angela "Ange Gos" Payton. I've reverse-engineered malware and as the tech copywriter, I made tech jargon understandable for everyday people. Retiring from the Security and Response team at Symantec didn't end my cybersecurity life.
My corporate copywriting clients, top competitors of my former company, wanted less technobabble in their marketing info, anchoring and keeping me deep in cybersecurity for years.
After several years of copywriting for competitors, why pivot to cybersecurity, now? I watched a "cybersecurity expert" with zero threat experience provide outdated information... so outdated, I knew I needed to help internet denizens, like yesterday because I have a wealth of knowledge and How-To's people need.
So here we are.
Imagine keeping your family, home, AND business safe. Simply and easily.
“A really strong testimonial that confirms the transformation that is waiting.”
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Autem dolore, alias, numquam enim ab voluptate id quam harum ducimus cupiditate similique quisquam et deserunt, recusandae. Lorem ipsum dolor sit amet, consectetur adipisicing elit. Autem dolore, alias, numquam.
I haz friends. I've already started inviting experts to come and talk about security trends and what's next. There may even be some history stories about how some threats were found.
In the member's area, we'll have a dedicated set of lists for apps, tools, & SaaS (both Software as a Service and Security as a Service). We'll cover who's behind them and what they cover.
An ounce of prevention... yada, yada. But really, think of how cool it will feel to know the latest social phishing scams and shutting it down. That's where our courses come in. Based on the Categorical Lists O'Security, we break down the how so you can decide if it'll work great for your or keep your $$. We'll also offer courses that will the protection protocols you'll use often.