Android

Pierluigi Paganini September 08, 2014
CERT disclosed the list of most popular vulnerable Android apps

The CERT has published the results of its test conducted on popular Android applications that fail to properly validate SSL certificates. In several posts we have discussed about the improper validation of  SSL certificates made by mobile devices, recently we mentioned the case of the Gmail app for iOS devices which, according to an expert at mobile security […]

Pierluigi Paganini September 06, 2014
Chinese criminal underground is doubled between 2012 and 2013

Expert at TrendMicro published a new chapter of the Cybercriminal Underground Economy Series in which analyzed the Chinese underground. Chinese cybercrime underground activity is rapidly increasing, according to a new interesting report published by Trend Micro the Chinese it is doubled between 2012 and 2013. The findings confirm that amount of underground activity in China doubled both with […]

Pierluigi Paganini September 02, 2014
Bogus cellphone towers found in the US

CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for surveillance activities. Seventeen mysterious cellphone towers have been discovered in the USA, they are identical to legitimate towers, the unique difference is related a heavily customized handset built for Android security. According to the Popular Science, […]

Pierluigi Paganini August 09, 2014
1million Android devices infected by Xshqi Worm on Chinese Valentine’s day

One million Android devices in China were infected with an Xshqi SMS worm on August 2, the day the country celebrated Valentine’s Day. Experts at Kaspersky Lab revealed that a  malware, dubbed Trojan.AndroidOS.Xshqi.a, infected neatly 500,000 Android devices in just six hours last week in China, but Chinese media provided a more pessimistic estimate declaring that the […]

Pierluigi Paganini August 04, 2014
Billion devices could be controlled with built-in management tools by hackers

Security researchers have discovered that billions mobile devices could be remotely controlled due the presence of a built-in management tool. Two researchers at Accuvant Labs, Mathew Solnik and Marc Blanchou, have recently discovered the existence of built-in vulnerabilities in a large number of mobile devices that would allow an attacker to gain complete control of […]

Pierluigi Paganini July 30, 2014
Millions of Android devices exposed to fake ID flaw

Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its permissions. Researchers at Bluebox Security have discovered a critical vulnerability in millions of Android devices that allow a malicious app to impersonate a trusted application in a stealthy way, allowing a bad actor an attacker to perform different malicious actions. […]

Pierluigi Paganini July 29, 2014
Kaspersky uncovered the complex infrastructure of Koler ransomware

Researchers at Kaspersky Lab issued a report on the Koler ransomware, which is targeting both Android devices and desktop browsers. Experts at Kaspersky Lab published a report titled “Koler—The Police Ransomware for Android” that examines how bad actors behind the Reveton campaign have operated, Koler ransomware recently targeted Android users. The report on the Koler malware is more […]

Pierluigi Paganini June 28, 2014
Android 4.3 and Earlier affected by Critical Code-Execution Flaw

A serious code-execution vulnerability in Android 4.3 and earlier was patched with latest KitKat Android Operating System version. Are you using the Android 4.3 version and you are convinced to be secure? You are unfortunately wrong, because this version of Android and earlier are affected by a critical code-execution vulnerability. According to data proposed by the Android […]

Pierluigi Paganini June 24, 2014
HackingTeam, new revelations on the surveillance network

Kaspersky Lab and Citizen Lab have released the results of their analysis on the global C2 infrastructure used by the Italian firm HackingTeam. Security experts from Kaspersky Lab and Citizen Lab at the Munk School of Global Affairs at the University of Toronto have released the results of their analysis on the  global command and control […]

Pierluigi Paganini June 18, 2014
Towelroot, how to root a Android devices with a click

The popular hacker George Hotz, also known as Geohot, as releases a one click tool dubbed Towelroot to root Android devices exploiting a known Linux flaw. The popular hacker George Hotz, also known as Geohot, has designed a root tool called Towelroot that will let most Android smartphones users to root their device without a particular effort and technical knowledge. […]