Search Results for: android Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed... Blog Post Over 9 million Android Devices Infected by Trojan Disguised as Game Apps December 21, 2021 An info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over... Blog Post The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud.... Blog Post Major Vulnerabilities in Android June 29, 2020 Security researchers have found a major vulnerability in Android, which lets malware imitate legitimate apps to steal app passwords, and... Blog Post Contradicting Privacy Policies Of Android Apps January 21, 2020 Researchers and academics from North Carolina State University and the University of Illinois at Urbana-Champaign used a language analyzing tool,... Blog Post Bluetooth Vulnerability Impacting Most Android Devices is Now Patched February 12, 2020 Google this week released a report regarding Android security and announced 13 vulnerabilities got patched. A major Bluetooth vulnerability that... Blog Post Finally! 80% of Android Apps Encrypt Network Traffic December 6, 2019 When you use apps on your phone, have you ever thought if your network traffic can be viewed by a... Blog Post Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the... Blog Post Apple’s Craig Federighi Thinks DMA Will Open A “Pandora’s Box of Malware January 7, 2022 During this year’s Web Summit, a technology conference that is held annually in Lisbon, Portugal, Apple’s Craig Federighi, the Senior... Blog Post Google To Protect User Location and Tracking Policies February 26, 2020 Taking into account the recent data breaches and increasing Cyber crimes, Google raises its bar to gain trust of its... Blog Post This Android CryptoMining Malware is Capable of Destroying Android Phones December 18, 2017 Cybersecurity researchers have discovered a “jack of all trades” cryptocurrency mining malware called Loapi that is capable of destroying phones... Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Blog Post Ad-Clicking Bot Malware Hits 60,000 Android Devices June 22, 2018 Cybersecurity researchers have discovered a new malicious Android app that has infected at least 60,000 devices, gaining the means to... Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Blog Post Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,...
Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed...
Blog Post Over 9 million Android Devices Infected by Trojan Disguised as Game Apps December 21, 2021 An info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over...
Blog Post The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud....
Blog Post Major Vulnerabilities in Android June 29, 2020 Security researchers have found a major vulnerability in Android, which lets malware imitate legitimate apps to steal app passwords, and...
Blog Post Contradicting Privacy Policies Of Android Apps January 21, 2020 Researchers and academics from North Carolina State University and the University of Illinois at Urbana-Champaign used a language analyzing tool,...
Blog Post Bluetooth Vulnerability Impacting Most Android Devices is Now Patched February 12, 2020 Google this week released a report regarding Android security and announced 13 vulnerabilities got patched. A major Bluetooth vulnerability that...
Blog Post Finally! 80% of Android Apps Encrypt Network Traffic December 6, 2019 When you use apps on your phone, have you ever thought if your network traffic can be viewed by a...
Blog Post Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the...
Blog Post Apple’s Craig Federighi Thinks DMA Will Open A “Pandora’s Box of Malware January 7, 2022 During this year’s Web Summit, a technology conference that is held annually in Lisbon, Portugal, Apple’s Craig Federighi, the Senior...
Blog Post Google To Protect User Location and Tracking Policies February 26, 2020 Taking into account the recent data breaches and increasing Cyber crimes, Google raises its bar to gain trust of its...
Blog Post This Android CryptoMining Malware is Capable of Destroying Android Phones December 18, 2017 Cybersecurity researchers have discovered a “jack of all trades” cryptocurrency mining malware called Loapi that is capable of destroying phones...
Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
Blog Post Ad-Clicking Bot Malware Hits 60,000 Android Devices June 22, 2018 Cybersecurity researchers have discovered a new malicious Android app that has infected at least 60,000 devices, gaining the means to...
Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Blog Post Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,...