Blog Posts Tagged with "Android"
July 29, 2014 Added by:InfosecIsland News
A serious vulnerability exists in the Android operating system, which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet.
February 17, 2014 Added by:Patrick Oliver Graf
The recent revelation from Ben Gurion University of malicious apps that can be used to bypass VPN configurations and push communications to a different network address changes the conversation entirely.
January 20, 2014 Added by:Anthony M. Freed
Security researchers at Ben Gurion University in Israel have disclosed the discovery of a vulnerability in Android devices that would allow an attacker to bypass VPN configurations to intercept what are intended to be secure communications.
September 10, 2013 Added by:Patrick Oliver Graf
With each version and new feature that Google adds to Android, the security of mobile devices with older Android releases falls farther down the priority ladder, and unfortunately for IT executives, this means their enterprises become more susceptible to potential attacks.
April 16, 2013 Added by:InfosecIsland News
Popular texting, messaging and microblog apps developed for the Android smartphone have security flaws that could expose private information or allow forged fraudulent messages to be posted, according to researchers at the University of California, Davis.
February 01, 2013 Added by:Dan Dieterle
China may be the source for a lot of international cyber attacks and malware, but they get hit by it too. 620,000 Android phones in China were infected with a nasty virus that collects personal information and begins to send costly text messages to benefit the malware maker...
September 27, 2012 Added by:Robert Siciliano
As more online retailers introduce mobile e-commerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they sometimes fail to provide the necessary security to support a payment application...
August 14, 2012 Added by:Andrew Case
Tmpfs is interesting from a forensics perspective for a few reasons. The first is that, in a traditional forensics scenario, the investigator expects that he can shut a computer off, images its disk(s), and get back the filesystem at the time of when the computer was running. With tmpfs, this is obviously not true...
July 31, 2012 Added by:Nicholas Cifranic
Android app stores such as Google Play have little or no security implementation, so anyone with a developer account may publish applications. Although Google has been attempting to enforce more controls to detect malicious apps, hackers are still publishing malware disguised as popular applications...
July 09, 2012 Added by:Headlines
Researchers have discovered a new malware strain targeting Android devices that is designed to make unauthorized purchases from infected units. The malware has been detected as being spread by at least nine different application markets and may have infected as many as one-hundred thousand users...
June 29, 2012 Added by:Headlines
Unlike traditional malware detection tools, RiskRanker does not rely on malware samples and signatures already identified. It is able to identify applications that exhibit signs of malicious code while they are still in the marketplace, before the malware is downloaded onto potential victim's mobile devices...
June 19, 2012 Added by:Headlines
"One of the remote server domains was registered using the same fake data which was used for registering ZeuS C&Cs back in 2011. And the malware’s functionality is almost the same as in old ZitMo samples. Therefore ‘Android Security Suite Premium’ = New ZitMo"...
May 17, 2012 Added by:Headlines
"The number of malicious Android application package files (APKs) received in Q1 2011 and in Q1 2012 reveals... an increase from 139 to 3063 counts... attributed to malware authors crafting their infected or trojanized applications to defeat anti-virus signature detection..."
March 19, 2012 Added by:Tom Eston
Having a lineup of great speakers really made the summit flow as well as it did. What I liked most about this event was that there were plenty of “real world” talks on how enterprises are setting up and managing mobile deployments…real “in the trenches” types of talks...
Join the Security Intelligence Network on Li... Robin Joan on 01-25-2015
Steps Toward Weaponizing the Android Platfor... Robin Joan on 01-25-2015
Today's Mobile Device Data Protection Must G... Robin Joan on 01-25-2015