ESET has discovered eight fake applications on Google Play, which were promising to boost the number of followers on users’ social network profiles. Our security software is detecting these as Android/Fasurke.
Researchers in Israel have come across a new way of exploiting the Stagefright vulnerability that was uncovered last year, and which affects the library that Android uses to analyze multimedia files.
Exactly seven years ago to the day (September 23rd), after much speculation, Google finally lifted the lid on its secret project, one which would go onto change the mobile world.
Nearly a billion users of a dozen chat apps for Android including popular apps such as Instagram, Oovoo, OKCupid and Grindr could be at risk from eavesdroppers and snoopers after University of New Haven researchers found serious data leakage problems.
Seventeen mysterious cellphone towers have been found in America which can only be identified by a heavily customized handset built for Android security – but seem to be built to spy on passing cellphone users, according to Popular Science.
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play store, where malware does show up from time to time but is much better controlled, thanks to the Google Bouncer, than on alternative app stores.
Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…
Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German security researchers.
ESET LiveGrid® telemetry has indicated several new infection vectors used by Android/Simplocker. The “typical” ones revolve around internet porn, or popular games like Grand Theft Auto: San Andreas.
Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android by our detection engineers.
No one is too surprised to meet robots on the International Space Station – its Robonaut has posed for dozens of photos with astronauts – but a floating ball with an Android smartphone and multiple cameras aboard may turn heads.
Android users beware: a loophole in the mobile OS allows apps to take pictures without users knowing and upload them to the internet, a researcher has found.
Google is to boost security on its Android devices, by continuously checking apps to see that they haven’t mutated into malicious Android malware, monitoring all apps on Android devices for suspicious behavior, according to PC World.
A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS – allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.
Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece – despite Google’s policies explicitly forbidding such programs.