Mobile

Google Unwanted Software Policy – It’s a fight against snooping apps

Google has expanded enforcement of Google's Unwanted Software Policy waring Android developers to explicitly declare data collection behaviors. A few days…

8 years ago

Google detects Android Tizi Spyware that spies on popular apps like WhatsApp and Telegram

Google identified a new family of Android malware dubbed Tizi spyware by using Google Play Protect, it spies on popular apps…

8 years ago

Google gathers Android users’ location data even when location services are disabled

Google is secretly gathering location data from billions of Android users, the news is disconcerting and once again raise the debate…

8 years ago

Lazarus APT uses an Android app to target Samsung users in the South Korea

The North Korea linked group Lazarus APT has been using a new strain of Android malware to target smartphone users in…

8 years ago

BankBot Trojan bypasses again security checks implemented by Google for the Play Store

Experts from several security firms has spotted two new malware campaigns targeting Google Play Store users, once of them spreads…

8 years ago

A bug in the Android MediaProjection service lets hackers to record audio and screen activity on 77% of all devices

A flaw in the Android MediaProjection service could be exploited by an attacker to record audio and screen activity on around…

8 years ago

Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once again

Researchers from security firm ESET, discovered a multi-stage Malware dubbed Android/TrojanDropper.Agent.BKY that evaded Google Play detection. Security experts at ESET have discovered…

8 years ago

A Backdoor in OnePlus devices allows root access without unlocking bootloader

Expert discovered a backdoor in OnePlus devices that allows root access without unlocking the bootloader. Other problems for the owners of…

8 years ago

Experts bypass ultra secure Apple iPhone X Face ID with a 3D-Printed mask

A group of researchers hacked Apple iPhone X Face ID facial recognition technology by using a 3D-Printed Mask that costs less than…

8 years ago

TOASTAMIGO – the first known strain of malware that uses the Toast Overlay exploit

Trend Micro spotted TOASTAMIGO, the first known malware that uses the recently patched vulnerability that ties with the Toast Overlay attacks.…

8 years ago

This website uses cookies.