![Xiaomi](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110559/xiaomi-400x200.jpg)
Xiaomi smartphones come equipped with backdoor
When you buy a new mobile device with certain apps already pre-installed on, you’re effectively forced to trust that the device maker or reseller (depending on who …
![Pokemon Go](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111556/pokemon_go-400x200.jpg)
Bogus Pokémon GO guide app roots Android devices
The popularity of Pokémon GO is apparently on the wane, but there are still more than enough players to make it a good lure for cyber crooks. In fact, fake apps like the …
![Adobe AIR](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110618/adobe_air-400x200.jpg)
Android apps based on Adobe AIR SDK send out unencrypted data
Developers using the Adobe AIR SDK should update to the latest version of the software development kit and rebuild the apps as soon as possible if they don’t want their …
![trojan](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110846/trojan-400x200.jpg)
Gugi banking Trojan outsmarts Android 6 security
A modification of the Gugi banking Trojan that can bypass Android 6 security features designed to block phishing and ransomware attacks. The modified Trojan forces users into …
![Twitter malware](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110857/twitter-malware-400x200.jpg)
Twitter-controlled Android backdoor delivers banking malware
A backdoor Trojan named Twitoor is the first instance of Android malware that receives its commands from a Twitter account. Keeping their botnet out of law enforcement’s …
![Android 7.0 Nougat](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110923/android-nougat-400x200.jpg)
Android 7.0 Nougat is out, with new security features
Google has released Android 7.0 Nougat, and the newest version of the popular mobile OS is already being rolled out to Google’s existing Nexus devices. “Today, and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111204/twitter-android2-400x200.png)
Attackers can hijack unencrypted web traffic of 80% of Android users
The recently revealed security bug (CVE-2016-5696) in the TCP implementation in the Linux kernel that could allow attackers to hijack unencrypted web traffic without an MitM …
![Google Duo](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111006/google-duo-400x200.jpg)
Google Duo: Simple, encrypted, video calling app
Google Duo is a simple 1-to-1 video calling app available for Android and iOS. In order to use Google Duo all you need is your phone number, no separate account is necessary. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111117/qr-code-boarding-pass-400x200.jpg)
Spoofing boarding pass QR codes with simple app
Przemek Jaroszewski, the head of Poland’s CERT, says anyone can bypass the security of the automated entrances of airlines’ airport lounges by using a specially …
![Android unlocked](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111119/android-unlock-400x200.jpg)
New vulnerabilities affect over 900 million Android devices, enable complete control of devices
Check Point researchers have announced four new vulnerabilities that affect over 900 million Android smartphones and tablets at DEF CON in Las Vegas. QuadRooter is a set of …
![AndroidTamer](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111232/androidtamer-400x200.jpg)
Android Tamer: Virtual platform for Android security professionals
Android Tamer is a free and open source Swiss army knife type of tool for Android security. The recently released version 4 moves towards Debian package compatibility. Users …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111204/twitter-android2-400x200.png)
Impatient users saddled with malicious copycats of popular Prisma app
If an iOS app gains extreme popularity but still does not come in a version for Android, it can be practically guaranteed that malware peddlers and scammers will take …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints