Google has outlined the enhanced security credentials of the upcoming Android 5.0 – nicknamed Lollipop – in an official blog post.
Nearly a billion users of a dozen chat apps for Android including popular apps such as Instagram, Oovoo, OKCupid and Grindr could be at risk from eavesdroppers and snoopers after University of New Haven researchers found serious data leakage problems.
Another major phone brand has added biometric security to a flagship smartphone as Huawei unveiled the ultra-thin Mate P7, complete with a rather unique fingerprint scanner, at Berlin’s IFA 2014 show.
Seventeen mysterious cellphone towers have been found in America which can only be identified by a heavily customized handset built for Android security – but seem to be built to spy on passing cellphone users, according to Popular Science.
Cuando hace apenas dos meses empezamos a hablar de cómo los delincuentes estaban migrando el malware de tipo ransomware (secuestro de dispositivo) a dispositivos Android, ya preveíamos que su evolución sería rápida. No obstante, esta rapidez con la que han ido adaptando sus amenazas para pc a smartphones con Android nos ha sorprendido. Antecedentes y
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play store, where malware does show up from time to time but is much better controlled, thanks to the Google Bouncer, than on alternative app stores.
Cubriendo BlackHat USA 2014, vimos cómo se podría explotar vulnerabilidades en el sistema de control de las operadoras para comprometer teléfonos.
Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…
Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German security researchers.
A high-profile ‘connected’ lighting system had a critical vulnerability which allowed attackers to take control of the entire system, switching off light bulbs at will, and which could be executed by criminals within 100 feet of a home.
A hack shown off by Dutch security researchers allows an attacker to ‘take over’ Google’s new Glass headset, and send pictures and videos from the frames’ built in camera, to another computer – in effect, seeing through their victim’s eyes
Hoy en día nadie se sorprende cuando hablamos de nuevas amenazas para dispositivos móviles, especialmente aquellos con Android como sistema operativo. Pero hasta no hace mucho los teléfonos móviles se creían inmunes a los códigos maliciosos. En junio de 2004 nació Cabir, un gusano sin fines delictivos capaz de autorreplicarse saltando de móvil en móvil utilizando la conexión bluetooth.
When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.
No one is too surprised to meet robots on the International Space Station – its Robonaut has posed for dozens of photos with astronauts – but a floating ball with an Android smartphone and multiple cameras aboard may turn heads.