Please turn on your JavaScript for this page to function normally.
Attackers are taking advantage of old vulnerabilities

FortiGuard Labs observed a 30 percent increase in mobile malware in the labs over the last six months. The team is now seeing more than 1,300 new samples per day, is currently …

FBI uses malware to spy on suspects via their phones

The FBI has been known to use malware to spy on suspects via their computers but mobile phones make even better sources of information. Just think about it: the great majority …

Security and privacy risks of top mobile apps

Appthority performed a static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms. They analyzed each app for …

Malicious apps exploiting Android “Master Key” bug found

Malicious apps misusing on of the two recently discovered Android “Master Key” bugs to successfully pose as legitimate ones have been discovered on third-party …

Apps exploiting Android “Master Key” bug offered on Google Play

Researchers from security firm Bitdefender have unearthed two relatively popular apps on Google Play that leverage the infamous Android “Master Key” bug, but …

Android backup sends unencrypted Wi-Fi passwords to Google

The recent revelations on how Internet giants such as Google, Yahoo, Apple and others are compelled by the US government to give its agencies access to user data have …

Mobile operating system wars: Android vs. iOS

When we introduced Clueful for Android, we thought mobile users should know what the applications on their devices were doing. One year and a couple hundred thousand analyzed …

Bluebox releases free scanner for Android “master key” bug

Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and …

App turns a mobile device into a personal authenticator

Passwords are at the root of online security problems because when typed into browsers, sent over open networks and centrally stored, they are easily compromised leaving the …

POC code for critical Android bug published

Last week, researchers from Bluebox Security have made a disconcerting revelation: Google’s Android mobile OS carries a critical bug that allows attackers to modify the …

The magnitude of Android’s “master key” bug

The Android flaw whose existence was revealed last week by Bluebox Security is as bad as they come. “Blowing hash and signing functions so that the underlying code can …

Trojanized Android app collects info, comments on NSA surveillance

An unusual Android Trojan has been recently unearthed by McAfee’s researchers, embedded in a pirated version of a legitimate music app. The app in question is Jay Z …

Don't miss

Cybersecurity news