Please turn on your JavaScript for this page to function normally.
Android browser SOP bypass bug: Who’s affected, and what to do?

A security researcher has recently discovered not just one but two vulnerabilities in the Android Open Source Project (AOSP) browser that could allow attackers to bypass the …

Destructive Android Trojan poses as newest Angry Birds game

Android malware masquerading as a legitimate app or game being offered on online app stores is not a rare occurrence, but purposefully destructive malware that does not ask …

Hong Kong protesters hit with malware, turn to “off-the-grid” chat app

The pro-democracy protests started by Hong Kong students’ and backed by the Occupy Central protesters (Central is the name of Hong Kong’s financial district) are …

Kali NetHunter turns Nexus devices into portable hacking tools

Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community …

Google will display Android devs’ physical address

Developers/publishers of paid Android apps and apps that feature in-app purchases will, by the start of next month, be required to add a physical contact address to their …

Critical Android Browser bug threatens users’ privacy

Earlier this month, security researcher Rafay Baloch has released a proof-of-concept exploit that takes advantage of a vulnerability in an Android Browser’s security …

Threema
Secure mobile messaging with Threema

If you're concerned about the privacy of your mobile communications, there's a variety of tools you can use to protect yourself. Today I'm taking a closer look at Threema, a …

Researchers compile list of Android apps that allow MitM attacks

Around 350 Android apps that can be downloaded from Google Play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to …

Malicious and risky apps on Android and iOS

Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc. In this podcast recorded at Black Hat …

Sneak attack through smartphone shared memory

A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of …

Control Android app permissions with NativeWrap

Tired with using mobile apps that demand unneeded permissions that open the door to data collection and worse? Researchers from North Carolina State University have come up …

Most popular Android apps open users to MITM attacks

An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be …

Don't miss

Cybersecurity news