fbpx
Home Android

Android

Google fixes four critical vulnerabilities in latest Android update

Google has released it's latest Android update for its Nexus family, which eliminated around 16 vulnerabilities in Android OS. The update is part of the google's...

Amazon selling Android tablets with pre-installed Chinese Trojan

Android Tablets with pre-installed Trojan were sold on Amazon and some other online market places, which will install a malicious malware and corrupts antivirus...

Android fixes critical vulnerabilities with latest Nexus update

Android developers today released a new update for its Nexus devices; which fixes seven severe vulnerabilities two of them are rated as "critical". The update...

How to exploit Vulnerability in Siri and Google Now.

Researchers of French Intelligence Agency, ANSSI found that Hackers can control the smartphone devices from 16 feet away. The user would have no idea...

Kemoge Malware: A nightmare for Android users.

A malware name Kemoge was discovered by researchers on Wednesday which is effecting Android users in more than 20 countries.The malware was discovered by...

MFFA – Media Fuzzing Framework for Android

The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software...

How to Setup An Android Pentesting Environment

Android, undoubtedly the most advanced and the sophisticated mobile operating system. Most of the mobile sets around the world are using Android as their...

WhatsSpy Public Track & Spy on Whatsapp users

WhatsSpy Public is an web-oriented application that tracks every move on WhatsApp of whoever you like to follow (by only knowing their phonenumber). This...

Google Engineer Denounced myths regarding Android Security

Adrian Ludwig, lead engineer for Android Security at Google criticized a number of myths surrounding the definitions of malware and spyware in general. The...

Google adds ‘Trusted Voice’ feature to Android devices

Google is most likely looking to add more options to unlock your device according to a new report. It is said that some Android...

Google Claims that in 2014, the Android devices Infected with Malware were Fewer than 1%

According to a recent report from Google Inc., the Android ecosystem is as safe as it's ever been. However some experts question key data...

Google Play Conducts 200 Million Security scans per Day

Google has enacted a system through Google play for Android devices called Verify Apps. The latest Android Security State of the Union includes clarification...
- Advertisment -

Most Read

What are Online Casinos doing to be as Safe and Secure as Possible?

Online casinos have continued to increase in popularity over recent years as more and more gamblers have turned to virtual options to further enhance...

Reconnaissance for Bug Bounty Hunters & Pentesters

New to the bug bounty and confused about where to start? Worry not! This reconnaissance for bug bounty hunters guides you to take the...

Access & Manage Android Phone Remotely – L3MON Tutorial

There is software available, like Metasploit, to gain remote access to any android phone. But other than that, we have the L3MON tool (A...

How to Hide Shellcode Behind Closed Port?

Every company has a variety of scanners for analyzing its network and identifying new or unknown open ports. It's unthinkable to disguise the potentially...