Barnes & Noble has joined the list of Android device vendors who sold smartphones and tablets affected by the Adups backdoor.
0The current generation of Android banking trojans are all equipped with ransomware-like features in order to lock the user's device, and in some cases encrypt his data.
0
Modern attacks have shifted focus to the browser, yet detection tools remain largely blind to the crucial activity happening there.
Join Push Security on February 11th for an interactive "choose-your-own-adventure" webinar on ClickFix, credential phishing, and other in-browser attacks we've observed in the wild.
The backdoor found in the firmware of various low-end Android smartphones, which was traced back to a Chinese company, was active since July this year, according to mobile security firm Trustlook.
0Comodo security researchers have spotted version 2.0 of a deadly Android trojan named Tordow, which first came to light in February this year.
2Google engineers have found a way to shrink the size of Android app updates once again, revealing that a new technology they've recently started deploying has allowed them to cut down the size of app update packages with 65% on average when compared to the original app APK file.
0Security researchers have discovered a new Android trojan that uses the DroidPlugin framework to split malicious behavior across multiple plugins, making detection much harder.
0An Android banking trojan is requesting users to whitelist its process against the Android Doze power saving module in order to stay connected to its command and control (C&C) servers and continue its malicious behavior.
0Security researchers have discovered that third-party firmware included with over 2.8 million low-end Android smartphones allows attackers to compromise Over-the-Air (OTA) update operations and execute commands on the target's phone with root privileges.
0Researchers from Red Naga Security have discovered new Android spyware that was used to target government employees, which initially appeared to be tied to the HackingTeam, but might very well be the work of a fellow Italian company, also a maker of surveillance software.
0Security researchers have found a secret backdoor in the firmware of many Android smartphones sold in the US, which covertly gathers information on phone owners and sends it to a server in China.
2Security researchers from Dr.Web say they've identified a new malware family inside an Android app found on the Google Play Store under the name of "Multiple Accounts: 2 Accounts."
0The extremely popular WhatsApp instant messaging client is set to receive support for two-step verification (2SV), a process which is often also (incorrectly) referred to as two-factor authentication.
0The way users move fingers across a phone's touchscreen alters the WiFi signals transmitted by a mobile phone, causing interruptions that an attacker can intercept, analyze, and reverse engineer to accurately guess what the user has typed on his phone or in password input fields.
0In the month of October 2016, for the first time in history, traffic from mobile internet browsers surpassed traffic from desktop browsers, according to web analytics company StatCounter.
0A bug in the iOS WebView component allows an attacker to force someone's iPhone to dial any number, while also locking the user's interface for a few moments, preventing him to cancel the outgoing call.
0Google released today Android's Security Bulletin for the month of November, which among a total of 83 security vulnerabilities has also patched two high profile bugs identified as Drammer and Dirty COW.
0Crooks distributing the Svpeng Android banking trojan have discovered a flaw in how Google Chrome for Android handles file downloads and have used it to forcibly and secretly download their malicious payload on the devices of over 318,000 users in the span of three months, starting with July 2016.
0Three researchers from the Chinese University of Hong Kong discovered a flaw in how app developers and identity providers support Single-Sign-On (SSO) via the OAuth 2.0 protocol, a flaw that allows an attacker to assume the identity of another person.
0Over the course of three months, more than 200,000 users have downloaded apps infected with an Android malware derived from the source code of the GM Bot, Czech security firm Avast reports.
0A set of malicious gaming applications for Android available on the Google Play Store employ obfuscation at multiple levels and antiemulation techniques to avoid detection. There are six malicious apps in total. They all advertise a different mod for Minecraft, the popular sandbox video game.
0