4 Android Notes Apps Which Can’t Be Hacked
So you’re like one of those people who have a really bad memory. You fail to reach appointments on time, forget your mom’s birthday, or the name of the restaurantRead More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
So you’re like one of those people who have a really bad memory. You fail to reach appointments on time, forget your mom’s birthday, or the name of the restaurantRead More →
Introduction Zscaler ThreatLabZ has been closely monitoring a new Spy Banker Trojan campaign that has been targeting Portuguese-speaking users in Brazil. The malware authors are leveraging Google Cloud Servers toRead More →
The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps. Google has released a new batch of security fixes for its Nexus smartphones and tablets, addressing flawsRead More →
Why create your own rooting functions when someone else has already put the effort into doing the same thing Security researchers have detected a new trojan targeting Android devices, butRead More →
More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but alsoRead More →
Smartphones are almost always connected to the internet, so it stands to reason that they can be hacked remotely. Or perhaps a jealous boyfriend or girlfriend got hold of yourRead More →
This morning, Telegram users on WhatsApp noticed something strange. The chat app was blocking any links to Telegram.me, a rival chat app that grew popular in the wake of earlierRead More →
The U.S. National Security Agency will end its daily vacuuming of millions of Americans’ phone records by Sunday and replace the practice with more tightly targeted surveillance methods, the ObamaRead More →
If you are the type of person that likes to tinker, Linux-based operating systems are for you. You would probably have many hours of fun playing with an Android device orRead More →
Even factory reset cannot smite the foulness that is Shedun. Michael Bentley of security-through-analytics outfit Lookout has found android malware that does not require user permission to install. Bentley, Lookout’sRead More →