Google verifies update for apps installed from unknown sources
If you were wondering how to receive the latest updates for Android apps installed through a third party, now you can do it directly from Google Play Store. For securityRead More →
If you were wondering how to receive the latest updates for Android apps installed through a third party, now you can do it directly from Google Play Store. For securityRead More →
Recently, researchers unveiled a DNS hijacking campaign that was found to spread malware from banking Trojans to Android smartphone users mostly in Asia, which has now extended its reach toRead More →
It was revealed that Facebook has been collecting call records and SMS data from Android devices for years. Facebook has been using what it calls an “opt-in feature” to improveRead More →
Most of us don’t interfere with default Android settings, yet in the event that you are searching for ways to improve your general Android experience; there are a couple ofRead More →
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commandsRead More →
Malware detection by learning and retrieving information for Android Overview MADLIRA is a tool for Android malware detection. According to cyber security professionals, this tool consists of two components: the TFIDF componentRead More →
A strain of Android malware found lurking on third-party application stores is so packed full of nefarious capabilities it can cause physical damage to smartphones. Security experts from Moscow-based anti-virusRead More →
There’s certainly no shortage of commercial spying apps for Android, with most positioned as parental control tools. In reality, however, these apps barely differ from spyware, with the exception perhapsRead More →
GO Keyboard, an insanely popular custom keyboard app for the Android OS, also available on the official Google Play Store, was caught collecting user data and downloading and running codeRead More →
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled outRead More →
Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses “Toast” notifications to help malware in obtaining admin rights or access to Android’sRead More →
This week, with the release of Windows 10 Insider Preview Build 16251 for PC, Microsoft added support for linking Android devices to one’s computer, allowing users to share files fromRead More →
The world’s two most popular mobile platforms are affected by a security vulnerability called Broadpwn and which allows attackers to gain remote code execution rights on unpatched devices. The security flaw wasRead More →
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million inRead More →
Hacking WiFi networks is an important part of learning the subtleties of ethical hacking and penetration testing. This also gives rise to the need for some quality WiFi hacking appsRead More →
Almost 100 such apps, with >1 million downloads, found so far (but not by Google). For the second time this month, Google has removed Android apps from its Google PlayRead More →
Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities similar to any desktop. It is clear today that our smartphones and tablets have evolvedRead More →
Latest Android.Lockdroid.E variant uses speech recognition instead of typing for unlock code input. Being a good listener is normally considered an admirable quality in a person; however, it isn’t aRead More →
The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks. Further investigation of this resurfacing threat has uncovered its codeRead More →
Mobile security experts from Skycure have found two methods for bypassing the security containers put around “Android for Work,” allowing attackers to access business data saved in this seemingly secureRead More →