Android Security »
If you’re from the West, then you might not have heard of Xunlei, a popular BitTorrent client in China. Aside from delivering entertainment to its users, the BitTorrent client is also distributing malware to Windows PCs and Android devices. We …Read More »
Android Device Manager lets Android users remotely lock, reset, wipe, and locate lost or stolen devices
Android Device Manager launched last month with the ability to track or remotely wipe misplaced or stolen smartphones or tablets through the web. Now, Google has added the crucial functionality of being able to lock down your phone remotely.
When …Read More »
Concerned about privacy on your Android device? You’re in the right place! With this guide you’ll learn exactly how to encrypt the storage of your Android device. Doing this will allow you to feel a bit better if someone goes …Read More »
The U.S. federal government is concerned by Android’s massive fragmentation problem as it attracts quite a lot of malware, according to a new study delivered by the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). The …Read More »
Responding to the recent claim by Bluebox Security indicating that 99% of Android devices are at risk from malware attack due to a security vulnerability, Google has released a fix. Google said that they’ve issued a patch for the security …Read More »
It’s safe to say that the NSA is pretty low on the list of most people’s favorite government organizations these days (if people even make lists like that), but recent reports are also calling into question Google’s credibility, as it …Read More »
Bluebox Security, a relatively unknown mobile security startup, recently made a big name for itself by uncovering a huge four-year-old point of vulnerability in Android’s security model that has put almost 900 million Android phones (or around 99% of Android …Read More »
We’ve all heard the stories about malware and Android. Many believe the claims to be false, especially considering most malware has to be actively installed by the user before it can cause any damage. The biggest problem with malware is …Read More »
F-Secure, a security firm, has released their Mobile Threat Report for Q4 2012 and the trend is not surprising: Android has a bullseye on its back.
Accounting for a whopping 79% of 301 new malware discovered in 2012, Android is …Read More »
Bug in Galaxy S III makes lockscreen disappear, allows complete access to phone without password or pattern
Remember that security flaw on iOS 6.1? The one that would allow anyone to bypass your passcode and gain access to contacts and photos? It looks like Samsung’s Galaxy S III has a similar problem, and it might even be …Read More »
“You don’t need [a zero-day exploit] to attack most Android devices if consumers are running 13-month old software,” says Chris Soghoian. Soghoian is principal technologist and senior policy analyst with the American Civil Liberties Union. He believes that the reason …Read More »
A serious security flaw has been found in one of Samsung’s Exynos chipsets, news that no Galaxy device user wants to hear. The flaw affects the Samsung Exynos 4, which means that Galaxy S III, Galaxy Note, Galaxy Note 2 …Read More »
Would you want Apple apps like iPhoto, iMovie, Garage Band and iWork suite on your Android advice? I know I wouldn’t mind would probably even pay for apps, assuming they are quality.
One malicious “developer” clearly thinks the same and …Read More »
Millions of Android users can have their passwords, e-mails, and other data stolen due to poorly coded apps
Have you never done any banking on your smartphone because you had security concerns? Then you, my friend, might have made the right decision. A new study conducted by researchers from two German universities reveals that millions of Android users …Read More »
PlaceRaider. The name sounds like a gamer tag someone would use on Xbox. It isn’t a gamer tag, however. (Well it might be but not in the context of this article.) PlaceRaider is the name of a new malware developed …Read More »
At the EUSecWest 2012 conference in Amsterdam, there is a Mobile Pwn2Own contest in which security researchers — or hackers, if you want — try to demonstrate their prowess at hacking mobile devices. The two best hacks of the day? …Read More »
When it comes to smartphone/mobile security, there are two types of malware.
First there is socially engineered malware. This type of malware, typically in the form of apps, works by tricking users into installing it and then proceeds to abuse …Read More »
You know how you are always cautioned about clicking on any and all links you see? The reason behind this is you simply don’t know what may be behind the URL, and by the time you find it out it …Read More »
‘FinFisher’ malware can remotely hijack iPhone, iPad, Android, Windows Phone, and BlackBerry devices
Malware only hits Android and is only created by scumbags, right? Wrong. Malware can hit any operating system (regardless of how secure people claim XXX OS is) and can be used for “good” or evil. In this case the spotlight …Read More »