At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.
A Carnegie Mellon University study has discovered that a selection of Android apps collect location data on their users on average every three minutes, according to the Wall Street Journal.
Wondering how secure your Android smartphone is? Well, a 9-year-old cybersecurity expert has demonstrated how hackers could steal contacts, call logs and messages within just 15 minutes.
A vulnerability in Android’s Wi-Fi Direct functionality has been uncovered by security researchers.
Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software
It’s billed as the hottest new messaging app on the planet, and it’s rocketed into the top ten in the U.S. in just a year. But how safe are you on Yik Yak?
Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.
Google has outlined the enhanced security credentials of the upcoming Android 5.0 – nicknamed Lollipop – in an official blog post.
Nearly a billion users of a dozen chat apps for Android including popular apps such as Instagram, Oovoo, OKCupid and Grindr could be at risk from eavesdroppers and snoopers after University of New Haven researchers found serious data leakage problems.
Another major phone brand has added biometric security to a flagship smartphone as Huawei unveiled the ultra-thin Mate P7, complete with a rather unique fingerprint scanner, at Berlin’s IFA 2014 show.
Seventeen mysterious cellphone towers have been found in America which can only be identified by a heavily customized handset built for Android security – but seem to be built to spy on passing cellphone users, according to Popular Science.
Cuando hace apenas dos meses empezamos a hablar de cómo los delincuentes estaban migrando el malware de tipo ransomware (secuestro de dispositivo) a dispositivos Android, ya preveíamos que su evolución sería rápida. No obstante, esta rapidez con la que han ido adaptando sus amenazas para pc a smartphones con Android nos ha sorprendido. Antecedentes y
Encontramos un RAT, o troyano de acceso remoto (por sus siglas en inglés), que se hace pasar por varias aplicaciones legítimas para Android. Observemos más de cerca la forma en que se propaga este malware, lo que hace y su conexión con una noticia que hace poco llegó a primera plana.
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play store, where malware does show up from time to time but is much better controlled, thanks to the Google Bouncer, than on alternative app stores.
Cubriendo BlackHat USA 2014, vimos cómo se podría explotar vulnerabilidades en el sistema de control de las operadoras para comprometer teléfonos.