Gadget Hacks’ Favorite Must-Have Android Apps of 2015
Here at Gadget Hacks, we spend countless hours scouring the web to find the most interesting apps as they make their debuts, so the recent influx of new software hasRead More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
Here at Gadget Hacks, we spend countless hours scouring the web to find the most interesting apps as they make their debuts, so the recent influx of new software hasRead More →
Malware authors employ open-source Android firewall utility to block security app from talking to their cloud servers.Even if some malware families never get to cause worldwide damage, it’s sometimes interestingRead More →
Wristband and armband devices such as smartwatches and fitness trackers could be used by attackers to spy on you! We have discussed several times about the possibility to exploit IoT devicesRead More →
Last year I together with my friend Sourav Kar made the world’s smallest code which could crash whatsapp. In a video demonstration, we have showed that how a 2000 wordsRead More →
Trojan works by injecting fake logins into legitimate apps.A new Android banking trojan, named SlemBunk, has been uncovered by FireEye’s security team, one that targets users utilizing mobile banking appsRead More →
We believe the payload belongs to a new iOS Trojan family that we’re calling “TinyV”. In December 2015, Chinese users reported they were infected by this malware. After further research,Read More →
So you’re like one of those people who have a really bad memory. You fail to reach appointments on time, forget your mom’s birthday, or the name of the restaurantRead More →
Introduction Zscaler ThreatLabZ has been closely monitoring a new Spy Banker Trojan campaign that has been targeting Portuguese-speaking users in Brazil. The malware authors are leveraging Google Cloud Servers toRead More →
The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps. Google has released a new batch of security fixes for its Nexus smartphones and tablets, addressing flawsRead More →
Why create your own rooting functions when someone else has already put the effort into doing the same thing Security researchers have detected a new trojan targeting Android devices, butRead More →