![Nexus](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113041/nexus-400x200.jpg)
Presidential primary election apps may expose sensitive data
Did you know that there are over 1,200 Android apps, both official and unofficial, that help voters keep track of the happenings in the US presidential primary? Better yet, …
![cyber.police android ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112939/Towelroot-400x200.jpg)
Exploit kit targets Android devices, delivers ransomware
Ransomware hitting mobile devices is not nearly as widespread as that which targets computers, but Blue Coat researchers have discovered something even less common: mobile …
![mobile payment encryption attack](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113448/mobile-payment-encryption-attack-400x200.jpg)
Encryption securing money transfers on mobile phones can be broken
A group of researchers has proved that it is possible to break the encryption used by many mobile payment apps by simply measuring and analysing the electromagnetic radiation …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111204/twitter-android2-400x200.png)
Android adware infiltrates devices’ firmware, Trend Micro apps
Dubbed Gmobi by Dr. Web researchers, the malware comes in the form of a software development kit (SDK), and has been found in several legitimate applications by well-known …
![MobSF](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113520/mobsf-400x200.png)
MobSF: Security analysis of Android and iOS apps
The Mobile Security Framework (MobSF) is an open source framework capable of performing end to end security testing of mobile applications. MobSF can be used for security …
![Android Marshmallow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194956/android-marshmallow-400x200.jpg)
Hotel replaces light switches with insecure Android tablets
Here’s another documented instance for the “insecure Internet of Things” annals, courtesy of CoreOS security developer Matthew Garrett. Garrett, who’s …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195534/android-large-400x200.png)
Google plugs 19 holes in newest Android security update
In the March 2016 security update for the Android Open Source Project (AOSP), Google has fixed 19 security issues, seven of which are considered to be critical. Among these, …
![mobile fingerprint hack](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113722/mobile-fingerprint-hack-400x200.png)
Hack a mobile phone’s fingerprint sensor in 15 minutes
Two researchers from Michigan State University’s biometrics group have devised a method for hacking mobile phone’s fingerprint authentication by using just a color …
![connected](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113848/sophos-400x200.jpg)
Open source risk management tool for Android application packages
Are there any security vulnerabilities in the open source you use? At RSA Conference, WhiteSource announced the release of the industry’s first Android Application Package …
![Porn clicker](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114048/pornclicker-400x200.jpg)
Porn Clicker Android malware hits Google Play hard
In a little over seven months, cybercriminals using click-jacking mobile malware to earn affiliate income have managed to push over 340 instances of the malware into Google …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194237/code-400x200.jpg)
Source code of “game changer” Android banking malware leaked online
If you ask users and malware analysts, the Android threat landscape is wide enough, but unfortunately it’s likely to get even wider as source code for the GM Bot banking …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194536/android-400x200.jpg)
Mobile banking Trojan bypasses Google Play security
The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints