06 Jan 2021

Google Warns of Critical Android Remote Code Execution Bug

Google’s latest Andriod security update fixed 43 bugs affecting Android handsets and Samsung phones. Two of the bigs affecting Google’s Andriod handsets were flagged as critical, while the most serious flaw lies in the Andriod System component and allows remote attackers to compromise a device through executing arbitrary code. Two

Read More
02 Dec 2020

Android Messenger App Still Leaking Photos, Videos

A bug in the GO SMS Pro app for Andriod users has affected millions of users as underground forums begin to actively share images and data stolen from the app’s servers. The app has been downloaded 100 million times and contains a high-level flaw that allows an attacker to access

Read More
27 Aug 2020

‘Transparent Tribe’ APT Group Deploys New Android Spyware for Cyber Espionage

Kaspersky researchers have been observing the Transparent Tribe, an APT group that has been active since 2013. Kaspersky found that the organization has been utilizing a new mobile malware tool that targets Android devices in its cyber-espionage campaigns. The campaign is largely focusing on victims in India, as the spyware

Read More
12 Aug 2020

TikTok Caught Breaking Google Rules To Secretly Track Android Users—Report

TikTok has allegedly been violating its own privacy policy and Google’s privacy rules to secretly track Android users. A new report that was published in the Wall Street Journal states that the company performed tracking techniques on its Andriod users for roughly 15 months after researchers uncovered the app linking

Read More
24 Jul 2020

Malicious ‘Blur’ Photo App Campaign Discovered on Google Play

Researchers at the White Ops Satori Threat Intelligence and Research Team have uncovered a new campaign consisting of malicious photo apps on Google Play. The malicious apps flood Android devices with random ads aiming to compromise the victim’s device rather than functioning as advertised. According to researchers, the app also

Read More
16 Jul 2020

New BlackRock Android malware can steal passwords and card data from 337 apps

A new Android malware strain called BlackRock has been discovered by researchers at ThreatFabric. BlackRock comes equipped with a range of sophisticated data theft capabilities that allow it to target over 300 Android applications. The malware was discovered in May and operates similarly to most other Android banking trojans. The

Read More
09 Jul 2020

Joker Android malware keeps evading Google Play Store defenses

The Joker Android malware operators have continuously managed to slip spyware infected apps onto the Play Store, which is Google’s official Android app store. Android applications infected with the Joker malware have been tracked since 2017 and were originally designed to perform SMS fraud. However, the Joker operators have now

Read More
07 Jul 2020

Android Users Hit with ‘Undeletable’ Adware

According to researchers at Kaspersky, 14.8 percent of Android users who were targeted with mobile malware or adware last year were left with permanent and undeletable files. This is called a system partition infection, and the undeletable files can range from trojans that can install and run apps without the

Read More
02 Jul 2020

New Android Spyware Tools Emerge in Widespread Surveillance Campaign

Brand new Android spyware tools have been discovered being deployed in a widespread APT campaign designed to spy on the Uyghur ethnic minority group. Researchers discovered the surveillance campaign, which dates back to 2013 and includes three never-before-seen surveillance tools, through analyzing trojanized legitimate applications. The campaign’s Android surveillance tools,

Read More
03 Jun 2020

Two Critical Android Bugs Open Door to RCE

In June updates, Google and Qualcomm addressed significant vulnerabilities affected Andriod users that could lead to remote code execution (RCE) on applicable devices. The bugs, CVE-2020-0117, and CVE-2020-8597 affect Andriod versions 8 to 10 and can allow for RCE in the context of a privileged process. An attacker could potentially

Read More