Home Android

Android

Amazon selling Android tablets with pre-installed Chinese Trojan

Android Tablets with pre-installed Trojan were sold on Amazon and some other online market places, which will install a malicious malware and corrupts antivirus...

Android fixes critical vulnerabilities with latest Nexus update

Android developers today released a new update for its Nexus devices; which fixes seven severe vulnerabilities two of them are rated as "critical". The update...

How to exploit Vulnerability in Siri and Google Now.

Researchers of French Intelligence Agency, ANSSI found that Hackers can control the smartphone devices from 16 feet away. The user would have no idea...

Kemoge Malware: A nightmare for Android users.

A malware name Kemoge was discovered by researchers on Wednesday which is effecting Android users in more than 20 countries.The malware was discovered by...

MFFA – Media Fuzzing Framework for Android

The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software...

How to Setup An Android Pentesting Environment

Android, undoubtedly the most advanced and the sophisticated mobile operating system. Most of the mobile sets around the world are using Android as their...

WhatsSpy Public Track & Spy on Whatsapp users

WhatsSpy Public is an web-oriented application that tracks every move on WhatsApp of whoever you like to follow (by only knowing their phonenumber). This...

Google Engineer Denounced myths regarding Android Security

Adrian Ludwig, lead engineer for Android Security at Google criticized a number of myths surrounding the definitions of malware and spyware in general. The...

Google adds ‘Trusted Voice’ feature to Android devices

Google is most likely looking to add more options to unlock your device according to a new report. It is said that some Android...

Google Claims that in 2014, the Android devices Infected with Malware were Fewer than 1%

According to a recent report from Google Inc., the Android ecosystem is as safe as it's ever been. However some experts question key data...

Google Play Conducts 200 Million Security scans per Day

Google has enacted a system through Google play for Android devices called Verify Apps. The latest Android Security State of the Union includes clarification...

Android’s ‘PackageInstaller’ Vulnerability a Gateway to hack Devices

A security flaw was found in the Android's 'PackageInstaller' system service that provides path to the hacker to hijack the installation process of a...
- Advertisment -

Most Read

Security Against Hacks: A Simple Game of Economics

One of the cold hard truths behind cybersecurity is that it's impossible to prevent a hack 100% of the time. It only takes one...

Certain Things That You Must Know About Microsoft MS-500 Exam and Its Practice Tests

If you want to be a Microsoft 365 security administrator, then there would be a number of responsibilities that will fall on your shoulders,...

Quick Ways to Avoid Being Watched by the NSA’s PRISM Program

Big brother is on the watch online. Today, a week hardly passes without news of government spying, whistleblowers, cell phone hacking, or even private photos...

Android Post Exploitation: Exploit ADB using Ghost Framework in Kali Linux

This article is the part of Android Hacking tutorial; it covers step by step guide to exploit Android ADB to get the persistent connection...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.