The use of mobile devices in government environments concerns the secret service of any states, cyber espionage more often exploits the mobile platforms. Mobile devices are reason of great concern for governments, they have a great computational capability, huge memories to store our personal data, GPS to follow our movements and are equipped with a […]
Vulnerability In Android Firefox browser app allows hackers to steal user’s files from the SD Card And Firefox’s Privately Stored Data. Androidpolice blog reported that security researcher Sebastián Guerrero discovered an Android Firefox browser app vulnerability that allows hackers to access both the contents of the SD card and the browser’s private data. Once again mobile security is under discussion, the number of […]
IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on Java exploits, mobile threats, Bitcoin mining, APTs and Mac malware. F-Secure security firm has released the Threat Report H1 2013 that provides an overview on cyber security landscape analyzing the events that characterized the first part of the year. The primary cause of incidents according the […]
A fake Apple iMessage app for Android OS has been published on official Google Play app store for around one month and totaling at least 10000 downloads. A fake Apple iMessage app for Android platform is concerning mobile developers and security experts. The app was initially published on the Google Play store but it isn’t the Android version […]
Google might have the access to WiFi passwords of customers stored in Android mobile devices due a built-in feature in the Android OS. Google company might know every WiFi password in the world used by every single Android user, and extraordinary amount of sensitive data could be exposed. According a Michael Horowitz post published on […]
A researcher at Malwarebytes has discovered that a Russian hacker recently released an Android Firefox Zero-Day exploits on the underground. A new Android Firefox Zero-Day Exploit is available on the underground market for sale, a Russian exploit writer known as “fil9” has proposed it in the open exploit market with a starting price of $460. The […]
Security experts continues to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile market. In the last months security firms have observed an increase in criminal activities that exploited Android OS supported by the proactive evolution of the offerings in the underground mobile market. Dancho Danchev is considered one of most accredited experts of […]
The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including Android, iPhone and BlackBerry. Here we are with weekly news on NSA surveillance activities, last week we were shocked by the news on Bullrun program meanwhile today we discuss on the capability of the agency to access data stored […]
Security experts at Kaspersky have detected numerous Android malicious applications that uses Google Cloud Messaging Service as C&C. Android malware exploits the Google Cloud Messaging Service (GCM) as Command and Control server. The Google service allows Android app developers to send messages using JSON format to installed apps, but hackers exploited it for malicious purposes. The discovery has been made […]
Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow money theft. Yesterday I’ve written on RAT for Android today we will speak of a weakness in some Android wallet apps for the popular mobile operating system that exposes Bitcoin users to risk of theft. […]