fbpx
Home Android

Android

Google fixes four critical vulnerabilities in latest Android update

Google has released it's latest Android update for its Nexus family, which eliminated around 16 vulnerabilities in Android OS. The update is part of the google's...

Amazon selling Android tablets with pre-installed Chinese Trojan

Android Tablets with pre-installed Trojan were sold on Amazon and some other online market places, which will install a malicious malware and corrupts antivirus...

Android fixes critical vulnerabilities with latest Nexus update

Android developers today released a new update for its Nexus devices; which fixes seven severe vulnerabilities two of them are rated as "critical". The update...

How to exploit Vulnerability in Siri and Google Now.

Researchers of French Intelligence Agency, ANSSI found that Hackers can control the smartphone devices from 16 feet away. The user would have no idea...

Kemoge Malware: A nightmare for Android users.

A malware name Kemoge was discovered by researchers on Wednesday which is effecting Android users in more than 20 countries.The malware was discovered by...

MFFA – Media Fuzzing Framework for Android

The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software...

How to Setup An Android Pentesting Environment

Android, undoubtedly the most advanced and the sophisticated mobile operating system. Most of the mobile sets around the world are using Android as their...

WhatsSpy Public Track & Spy on Whatsapp users

WhatsSpy Public is an web-oriented application that tracks every move on WhatsApp of whoever you like to follow (by only knowing their phonenumber). This...

Google Engineer Denounced myths regarding Android Security

Adrian Ludwig, lead engineer for Android Security at Google criticized a number of myths surrounding the definitions of malware and spyware in general. The...

Google adds ‘Trusted Voice’ feature to Android devices

Google is most likely looking to add more options to unlock your device according to a new report. It is said that some Android...

Google Claims that in 2014, the Android devices Infected with Malware were Fewer than 1%

According to a recent report from Google Inc., the Android ecosystem is as safe as it's ever been. However some experts question key data...

Google Play Conducts 200 Million Security scans per Day

Google has enacted a system through Google play for Android devices called Verify Apps. The latest Android Security State of the Union includes clarification...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...