![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102836/google-play-fake-crypto-400x200.jpg)
Sneaky malware downloader found in apps on Google Play
Google has removed from Google Play eight apps that have served as downloaders for Android banking malware. The malware The packages – a mixture of Android cleaners and …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105803/android-1-400x200.jpg)
Google will remove apps that misuse Android Accessibility Services from Google Play
Android app developers whose offerings implement Accessibility Services for reasons other that helping users with disabilities use their apps have less then 30 days to switch …
![Lovense](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102627/lovense-app-400x200.jpg)
Teledildonics maker Lovense fixes bug to delete recordings of user sessions from phones
Late last week, a Reddit user took to the popular discussion site to reveal that the app that is used to control remote control sex toys made by Lovense “seems to be …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105803/android-1-400x200.jpg)
Cryptocurrency-mining script planted in apps on Google Play
Coinhive’s cryptocurrency-mining script has found its way into mobile apps offered on Google Play. Trend Micro researchers have spotted two apps that have been equipped …
![Pixie](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102829/pixie-400x200.png)
Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks
A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102836/google-play-fake-crypto-400x200.jpg)
Beware fake Android cryptocurrency trading apps on Google Play
Two phishing apps that were made to look like the official app of popular cryptocurrency exchange Poloniex have been booted off Google Play after ESET researchers notified …
![Google](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105215/google-400x200.jpg)
Google wants bug hunters to probe popular Android apps for bugs
Google has started another bug bounty initiative: the Google Play Security Reward Program. While the name of the program might suggest that bug hunters will be after …
![Android malware](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103924/android-malware-400x200.jpg)
Millions download botnet-building malware from Google Play
Researchers have discovered a new batch of malicious apps on Google Play, some of which have been downloaded and installed on some 2.6 million devices. The apps’ …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102910/android-fire-400x200.jpg)
Android DoubleLocker ransomware encrypts data, changes device PIN
A new piece of ransomware is targeting Android users. Dubbed DoubleLocker, it both encrypts users’ files and changes the device’s PIN. About DoubleLocker Lukáš …
![apps](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110500/apps-400x200.jpg)
Top blacklisted Android and iOS apps by enterprises
Enterprises blacklist apps for a range of security concerns, including specific malicious or data leakage behaviors, security policy compliance and concerns about shadow data …
![DJI drone](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09103006/dji-drone-400x200.jpg)
DJI launches privacy mode for drone operators
DJI launched a new Local Data Mode that stops internet traffic to and from its DJI Pilot app, in order to provide enhanced data privacy assurances for sensitive government and …
![Phone unlock pattern](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103051/phone-unlock-pattern-400x200.jpg)
Android unlock patterns are a boon for shoulder surfing attackers
The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)