Search Results for: android Blog Post Over 9 million Android Devices Infected by Trojan Disguised as Game Apps December 21, 2021 An info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over... Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed... Blog Post The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud.... Blog Post Major Vulnerabilities in Android June 29, 2020 Security researchers have found a major vulnerability in Android, which lets malware imitate legitimate apps to steal app passwords, and... Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Blog Post Contradicting Privacy Policies Of Android Apps January 21, 2020 Researchers and academics from North Carolina State University and the University of Illinois at Urbana-Champaign used a language analyzing tool,... Blog Post Bluetooth Vulnerability Impacting Most Android Devices is Now Patched February 12, 2020 Google this week released a report regarding Android security and announced 13 vulnerabilities got patched. A major Bluetooth vulnerability that... Blog Post Finally! 80% of Android Apps Encrypt Network Traffic December 6, 2019 When you use apps on your phone, have you ever thought if your network traffic can be viewed by a... Blog Post Crypto.com Admits $35 Million Hack January 27, 2022 A massive crypto attack occurred on January 17, affecting 483 users of Crypto.com – one of the most ambitious cryptocurrency... Blog Post Apple’s Craig Federighi Thinks DMA Will Open A “Pandora’s Box of Malware January 7, 2022 During this year’s Web Summit, a technology conference that is held annually in Lisbon, Portugal, Apple’s Craig Federighi, the Senior... Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Blog Post Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the... Blog Post LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital... Blog Post Google To Protect User Location and Tracking Policies February 26, 2020 Taking into account the recent data breaches and increasing Cyber crimes, Google raises its bar to gain trust of its... Blog Post Mobile Ad Fraud ‘DrainerBot’ Consumes Large Amounts of Data February 21, 2019 Dubbed DrainerBot, this malware consumes large amounts of data in Android devices. The ad fraud campaign uses malicious code to...
Blog Post Over 9 million Android Devices Infected by Trojan Disguised as Game Apps December 21, 2021 An info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over...
Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed...
Blog Post The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud....
Blog Post Major Vulnerabilities in Android June 29, 2020 Security researchers have found a major vulnerability in Android, which lets malware imitate legitimate apps to steal app passwords, and...
Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
Blog Post Contradicting Privacy Policies Of Android Apps January 21, 2020 Researchers and academics from North Carolina State University and the University of Illinois at Urbana-Champaign used a language analyzing tool,...
Blog Post Bluetooth Vulnerability Impacting Most Android Devices is Now Patched February 12, 2020 Google this week released a report regarding Android security and announced 13 vulnerabilities got patched. A major Bluetooth vulnerability that...
Blog Post Finally! 80% of Android Apps Encrypt Network Traffic December 6, 2019 When you use apps on your phone, have you ever thought if your network traffic can be viewed by a...
Blog Post Crypto.com Admits $35 Million Hack January 27, 2022 A massive crypto attack occurred on January 17, affecting 483 users of Crypto.com – one of the most ambitious cryptocurrency...
Blog Post Apple’s Craig Federighi Thinks DMA Will Open A “Pandora’s Box of Malware January 7, 2022 During this year’s Web Summit, a technology conference that is held annually in Lisbon, Portugal, Apple’s Craig Federighi, the Senior...
Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Blog Post Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the...
Blog Post LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital...
Blog Post Google To Protect User Location and Tracking Policies February 26, 2020 Taking into account the recent data breaches and increasing Cyber crimes, Google raises its bar to gain trust of its...
Blog Post Mobile Ad Fraud ‘DrainerBot’ Consumes Large Amounts of Data February 21, 2019 Dubbed DrainerBot, this malware consumes large amounts of data in Android devices. The ad fraud campaign uses malicious code to...