Read more about Android
Bookmark and Share
  • Sneak attack through smartphone shared memory

    22.08.2014

    A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.

  • Control Android app permissions with NativeWrap

    22.08.2014

    Tired with using mobile apps that demand unneeded permissions that open the door to data collection and worse? Researchers from North Carolina State University have come up with a brilliant solution to the problem.

  • Most popular Android apps open users to MITM attacks

    21.08.2014

    An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing man-in-the-middle (MITM) attacks, and occasionally additional ones, as well.

  • Gyroscopes on Android devices can be used to eavesdrop on users' conversations

    18.08.2014

    If you think that denying an app permission to use your phone's microphone is enough to prevent it from listening in on your conversations, think again, as a group of researchers have demonstrated that the device's gyroscopes can serve as a crude microphone.

  • Android ransomware masquerades as Symantec mobile AV

    18.08.2014

    A new piece of Android ransomware is doing rounds, and is tricking users into installing it by posing as a legitimate AV app.




Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //