Home Android

Android

Amazon selling Android tablets with pre-installed Chinese Trojan

Android Tablets with pre-installed Trojan were sold on Amazon and some other online market places, which will install a malicious malware and corrupts antivirus...

Android fixes critical vulnerabilities with latest Nexus update

Android developers today released a new update for its Nexus devices; which fixes seven severe vulnerabilities two of them are rated as "critical". The update...

How to exploit Vulnerability in Siri and Google Now.

Researchers of French Intelligence Agency, ANSSI found that Hackers can control the smartphone devices from 16 feet away. The user would have no idea...

Kemoge Malware: A nightmare for Android users.

A malware name Kemoge was discovered by researchers on Wednesday which is effecting Android users in more than 20 countries.The malware was discovered by...

MFFA – Media Fuzzing Framework for Android

The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software...

How to Setup An Android Pentesting Environment

Android, undoubtedly the most advanced and the sophisticated mobile operating system. Most of the mobile sets around the world are using Android as their...

WhatsSpy Public Track & Spy on Whatsapp users

WhatsSpy Public is an web-oriented application that tracks every move on WhatsApp of whoever you like to follow (by only knowing their phonenumber). This...

Google Engineer Denounced myths regarding Android Security

Adrian Ludwig, lead engineer for Android Security at Google criticized a number of myths surrounding the definitions of malware and spyware in general. The...

Google adds ‘Trusted Voice’ feature to Android devices

Google is most likely looking to add more options to unlock your device according to a new report. It is said that some Android...

Google Claims that in 2014, the Android devices Infected with Malware were Fewer than 1%

According to a recent report from Google Inc., the Android ecosystem is as safe as it's ever been. However some experts question key data...

Google Play Conducts 200 Million Security scans per Day

Google has enacted a system through Google play for Android devices called Verify Apps. The latest Android Security State of the Union includes clarification...

Android’s ‘PackageInstaller’ Vulnerability a Gateway to hack Devices

A security flaw was found in the Android's 'PackageInstaller' system service that provides path to the hacker to hijack the installation process of a...
- Advertisment -

Most Read

The Ultimate Blockchain & Bitcoin Guide

Let us start with a scenario. Whenever there is an election, we always hear the rumor that there is rigging in the election. In...

5 Top Cybersecurity Career Paths & Certifications

We are living in a world of innovations. Now, imagine innovative technologies with zero security is such a big nightmare. Cybersecurity comes here for...

How to Become a Certified Ethical Hacker (CEH)?

Data security becomes more important in running a successful business since persistent threats, hacks, and data breaches happening to an organization’s data. Every organization...

How to Tell if an Online Casino is Safe

Before the UK government established the Gambling Commission in 2005, online gambling was generally unregulated. Sure, Curacao and Malta had regulatory agencies at the...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.