Tag "Android"

Back to homepage
Software

Vulnerable Android password managers make phishing attacks easier

Android password managers can be tricked into entering valid login credentials into phishing apps, a group of researchers has discovered. They have also found that Instant Apps, a Google technology that

Mobile

Android Pie: Security and privacy changes

It is official: “Android P” is Android Pie, and it comes with a variety of new capabilities and security and privacy changes. The newest version (9.0) of the popular mobile OS introduces

Software

MysteryBot Deployed the Best Latest Overlay Attacks

By Julia Sowells – Senior Information Security Specialist at Hacker Combat, Banking Trojans successfully became the standard form of attack for cybercriminals who want easy money. They created various social

Mobile

Android Trojan Spreads via DNS Hijacking

An Android Trojan masquerading as popular mobile applications is propagating via smartphones roaming between Wi-Fi networks, Kaspersky Lab warns. Over the span of two months, the Moscow-based security firm observed

Mobile

Mitigating Digital Risk from the Android PC in Your Pocket

Security Teams Must Prioritize Risk Mitigation Against Android MalwareFew of us could have imagined that a device that allows us to talk to anyone from anywhere at any time would

Industry Insights

77 Facts About Cyber Crime One Should Know in 2018

As a society, we cherish our right to privacy probably more than anything else. Sharing is great, and we all enjoy it, but there is always that other side, the

Mobile

Android P: Expected security and privacy improvements

Google has released a developer preview of the next version of Android, currently called “Android P.” Functional changes are many, but here’s an overview of those that should improve device

Software

Cryptomining malware continues to drain enterprise CPU power

Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global Threat Impact Index.Researchers discovered three different

Mobile

Millions of Android devices forced to mine Monero for crooks

No device is safe from criminals looking to make it stealthily mine cryptocurrency for them. However weak its processing power is, it still costs them nothing.With that in mind, forced

Mobile

How to track smartphone users when they’ve turned off GPS

As it turns out, turning off location services (e.g., GPS) on your smartphone doesn’t mean an attacker can’t use the device to pinpoint your location.A group of Princeton University researchers