Android

Pierluigi Paganini June 20, 2017
Two Ztorg Trojans Removed from Google Play Store Are Definitely Better

For the second time in a month, Google removed malicious apps infected with the Ztorg Trojans that could allow attackers to root targeted devices. Most software developers update their apps to patch vulnerabilities and add new features. But when the software is malware, an update could be the worst thing to do. The Google Play […]

Pierluigi Paganini June 16, 2017
A New malware dubbed dvmap for android was found and removed from play store

Kaspersky Lab had discovered a new malware dubbed dvmap for Android was found and removed from the official Google Play store A New malware dubbed dvmap for Android was found and removed from the official Google Play store Kaspersky Lab had discovered the new malware that is capable of obtaining root access on Android devices […]

Pierluigi Paganini May 26, 2017
Millions of Android devices potentially exposed to the Cloak and Dagger attack

Researchers at Georgia Institute of Technology have discovered a new attack against Android OS, dubbed ‘Cloak and Dagger,’ millions of devices at risk. Security researchers at Georgia Institute of Technology have discovered a new attack, dubbed ‘Cloak and Dagger’, that allows taking full control of Android devices. The  ‘Cloak and Dagger’ attack works against all versions […]

Pierluigi Paganini May 21, 2017
Google is rolling out Google Play Protect, a machine-learning system to protect Android users

Google is rolling out a new protection system called Google Play Protect, it is a machine-learning system to protect Android users. Good news for Android users, Google has introduced another security defense system, called Google Play Protect, to protect the devices running its mobile OS. Google already uses several security measures to protect the smartphone, such as […]

Pierluigi Paganini May 08, 2017
Android’s Vampire Bat Apps are listening to your life through ultrasonic beacons

Researchers at Technische Universitat Braunschweig published a study on 200+ Android mobile apps that are listening to your life through ultrasonic beacons. Researchers at Technische Universitat Braunschweig in Germany recently published a finding that over 200 Android mobile applications are listening to your life through ultrasonic beacons. Like digital electronic vampire bats, these apps are checking […]

Pierluigi Paganini April 23, 2017
Fake app hiding a SMSVova spyware went undetected for years in the Google Play Stores

Millions of users looking to get software updates have downloaded an app hiding a spyware called SMSVova through the official Google Play store. Bad news for millions of Android users looking to get software updates, they have been tricked into downloading a spyware called SMSVova through the official Google Play store. Experts at Zscaler discovered […]

Pierluigi Paganini April 07, 2017
Vulnerability in Apple Music for Android could be exploited to steal user data

Apple fixed a vulnerability tracked as CVE-2017-2387 in the Apple Music for Android that could allow attackers to launch MitM attacks on the application. The update released Apple for the Apple Music application for Android fixes a certificate validation issue that can be exploited by an attacker to run MitM attacks and intercept user data. […]

Pierluigi Paganini April 04, 2017
Android Chrysaor spyware went undetected for years

Chrysaor spyware is an Android surveillance malware that remained undetected for at least three years, NSO Group Technology is suspected to be the author. Security experts at Google and Lookout spotted an Android version of one of the most sophisticated mobile spyware known as Chrysaor that remained undetected for at least three years. due to its […]

Pierluigi Paganini March 23, 2017
Rogue Cellphone towers used to spread the Android Swearing Trojan

Chinese scammers are deploying rogue cellphone towers to spread the Android Swearing Trojan via malicious URL in SMS messages. Chinese scammers are deploying fake mobile base stations to spread the Android Swearing Trojan in text messages. The attackers have improved the well-known Smishing attack using rogue cell phone towers as the attack vector and distribute the Android […]

Pierluigi Paganini March 12, 2017
Flaws in MAC address randomization implemented by vendors allow mobile tracking

Researchers devised a new attack method that can be leveraged to track mobile devices that rely on MAC address randomization mechanism. The MAC address is a unique and an hardcoded identifier assigned to a device’s network interface. This characteristic makes it an excellent tool for the tracking of the devices. A group of researchers from the U.S. Naval […]