Please turn on your JavaScript for this page to function normally.
Android infostealer masquerading as MS Word document

A clever Android information-stealing piece of malware is lurking on third-party app markets popular with Chinese users.“The malware portrays itself as a data file with …

The top threat vector for mobile devices? Porn

As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …

Think twice about Android root

In recent years the practice of Android rooting, that is the process of allowing an Android phone or tablet to bypass restrictions set by carriers, operating systems or …

A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers

As an ever increasing number of mobile carriers around the world switches to from using GSM/UMTS networks to Long-Term Evolution (LTE 4G) ones, both carriers and users are …

Attackers can use Siri, Google Now to secretly take over smartphones

A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …

Which Android smartphones are most secure?

87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …

Fake Android apps bypass Google Play store security

“ESET unveiled fake apps available at the official Google app store. Posing as popular game cheats, such as Cheats for Pou, Guide for SubWay and Cheats for SubWay, these …

Google patches Stagefright 2.0 on Nexus devices

Google has released its monthly security update for Nexus devices. Among the issues this update fixes are the two vulnerabilities in the stagefright and utils Android …

Top 5 Android Marshmallow enterprise security benefits

Google’s new Android Marshmallow operating system offers important new security and ease-of-use features that improve its functionality for both enterprise and individual …

New, improved Ghost Push variants continue to target Android users

“The danger of apps Trojanized with Ghost Push malware is far from over – according to Trend Micro researchers, the number of variants of the hard-to-remove …

Stagefright 2.0: A billion Android devices could be compromised

Most Android users are, once again, in danger of having their devices compromised by simply previewing specially crafted MP3 or MP4 files.Zimperium researchers, who were the …

Oysters tablet comes preinstalled with Trojanized Android firmware

“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …

Don't miss

Cybersecurity news