Blog Posts Tagged with "Android"


Android RAT Exclusively Targets Brazil

September 02, 2019 Added by:Ionut Arghire

A newly discovered Android remote access Trojan (RAT) is specifically targeting users in Brazil, Kaspersky reports.

Comments  (0)


Android Trojan Downloads Google Play Apps onto SD Cards

February 01, 2017 Added by:Ionut Arghire

A newly discovered Android Trojan can download applications from Google Play, but saves them onto the SD card instead of installing them, to keep this malicious activity hidden from the user.

Comments  (0)


Android N Deprecating Crypto Provider and SHA1PRNG Algorithm

June 13, 2016 Added by:Ionut Arghire

The Android N operating system version will no longer use the Crypto provider and the SHA1PRNG algorithm, Google announced.

Comments  (0)


"Fake ID" Android Vulnerability in Lets Malicious Apps Impersonate Trusted Apps

July 29, 2014 Added by:InfosecIsland News

A serious vulnerability exists in the Android operating system, which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet.

Comments  (3)


A Closer Look at the Android VPN Flaw

February 17, 2014 Added by:Patrick Oliver Graf

The recent revelation from Ben Gurion University of malicious apps that can be used to bypass VPN configurations and push communications to a different network address changes the conversation entirely.

Comments  (0)


Android VPN Vulnerability Allows Data Interception in Plain Text

January 20, 2014 Added by:Anthony M. Freed

Security researchers at Ben Gurion University in Israel have disclosed the discovery of a vulnerability in Android devices that would allow an attacker to bypass VPN configurations to intercept what are intended to be secure communications.

Comments  (0)


The Need for Network Security in the Face of Android Vulnerabilities

September 10, 2013 Added by:Patrick Oliver Graf

With each version and new feature that Google adds to Android, the security of mobile devices with older Android releases falls farther down the priority ladder, and unfortunately for IT executives, this means their enterprises become more susceptible to potential attacks.

Comments  (0)


Steps Toward Weaponizing the Android Platform

May 13, 2013 Added by:Kyle Young

In this article I will be covering ways that one can turn their Android based device into a powerful pocket sized penetration testing tool.

Comments  (10)


UC Davis Uncovers Security Holes in Mobile Apps

April 16, 2013 Added by:InfosecIsland News

Popular texting, messaging and microblog apps developed for the Android smartphone have security flaws that could expose private information or allow forged fraudulent messages to be posted, according to researchers at the University of California, Davis.

Comments  (0)


Android Phones in China Hit by Most Costly Malware in History

February 01, 2013 Added by:Dan Dieterle

China may be the source for a lot of international cyber attacks and malware, but they get hit by it too. 620,000 Android phones in China were infected with a nasty virus that collects personal information and begins to send costly text messages to benefit the malware maker...

Comments  (0)


Lack of Security in Android Apps? That Could Be

December 02, 2012 Added by:Keith Mendoza

Have you ever installed an app in your Android phone and when you got to the permission screen you just couldn't justify to yourself why an app would require the permissions it's asking for?

Comments  (0)


New Mobile Security App for Android Smartphones

September 27, 2012 Added by:Robert Siciliano

As more online retailers introduce mobile e-commerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they sometimes fail to provide the necessary security to support a payment application...

Comments  (1)


Recovering tmpfs from Linux and Android Memory Captures with Volatility

August 14, 2012 Added by:Andrew Case

Tmpfs is interesting from a forensics perspective for a few reasons. The first is that, in a traditional forensics scenario, the investigator expects that he can shut a computer off, images its disk(s), and get back the filesystem at the time of when the computer was running. With tmpfs, this is obviously not true...

Comments  (3)


Five Security Tips for Android Phones and Tablets

July 31, 2012 Added by:Nicholas Cifranic

Android app stores such as Google Play have little or no security implementation, so anyone with a developer account may publish applications. Although Google has been attempting to enforce more controls to detect malicious apps, hackers are still publishing malware disguised as popular applications...

Comments  (0)


MMarketPay.A Android Malware Found in the Wild

July 09, 2012 Added by:Headlines

Researchers have discovered a new malware strain targeting Android devices that is designed to make unauthorized purchases from infected units. The malware has been detected as being spread by at least nine different application markets and may have infected as many as one-hundred thousand users...

Comments  (0)


Researchers Unveil Advanced Malware Detection Method

June 29, 2012 Added by:Headlines

Unlike traditional malware detection tools, RiskRanker does not rely on malware samples and signatures already identified. It is able to identify applications that exhibit signs of malicious code while they are still in the marketplace, before the malware is downloaded onto potential victim's mobile devices...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »