Home Android

Android

How to Mitigate Risk Associated With Unverified Android Apps Installations?

Online security blogs don’t leave a single opportunity to show Android apps from unknown sources in bad lights. Not every app from an unknown...

5 Steps to Hack an Android or iOS Device without any Code

Looking for a way to get inside someone's Android or iOS device can be a tough nut to crack. Are you wondering what code...

Hijacker: The WiFi Hacking Suite for Android

Hijacker is a Graphical User Interface for the aircrack-ng suite, mdk3 and reaver. It offers a simple and easy UI to use these tools...

Hack Any Android Device

Android devices are widely used around the world; applications are making this platform preferable by millions of users. As these devices are used by...

Change IMEI – MEUI META 3G

Note : Please read this post before proceeding - All About IMEI . It is important that you know what is database file , etc. Pre-requests...

Mobile Security Framework – MobSF

Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. We've...

Android Vulnerability Scanner: AndroBugs

AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. No splendid GUI interface,...

Android security updates: 7 critical vulnerabilities fixed

Google releases its monthly update for its Nexus users; which eliminated some severe security vulnerabilities in its Android OS. The latest update patches a...

Google fixes four critical vulnerabilities in latest Android update

Google has released it's latest Android update for its Nexus family, which eliminated around 16 vulnerabilities in Android OS. The update is part of the google's...

Amazon selling Android tablets with pre-installed Chinese Trojan

Android Tablets with pre-installed Trojan were sold on Amazon and some other online market places, which will install a malicious malware and corrupts antivirus...

Android fixes critical vulnerabilities with latest Nexus update

Android developers today released a new update for its Nexus devices; which fixes seven severe vulnerabilities two of them are rated as "critical". The update...

How to exploit Vulnerability in Siri and Google Now.

Researchers of French Intelligence Agency, ANSSI found that Hackers can control the smartphone devices from 16 feet away. The user would have no idea...
- Advertisment -

Most Read

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...

Digital Forensics Investigation using Autopsy In Kali Linux

Autopsy is one of the digital forensics tools use to investigate what happened on a computer. It offers a GUI access to variety of...