A new Android flaw potentially affecting up to 80% of users could leave handsets vulnerable to rogue apps - leapfrogging the defenses used to ensure malicious developers are kept out.
Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…
Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German security researchers.
A feature in newer Android phones puts users' privacy at risk - effectively broadcasting an accurate location history over the air even when the handset's screen is turned off, according to the Electronic Frontier Foundation.
ESET LiveGrid® telemetry has indicated several new infection vectors used by Android/Simplocker. The “typical” ones revolve around internet porn, or popular games like Grand Theft Auto: San Andreas.
Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android by our detection engineers.
No one is too surprised to meet robots on the International Space Station - its Robonaut has posed for dozens of photos with astronauts - but a floating ball with an Android smartphone and multiple cameras aboard may turn heads.
Android users beware: a loophole in the mobile OS allows apps to take pictures without users knowing and upload them to the internet, a researcher has found.
Google is to boost security on its Android devices, by continuously checking apps to see that they haven’t mutated into malicious Android malware, monitoring all apps on Android devices for suspicious behavior, according to PC World.
A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS - allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.
Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece - despite Google’s policies explicitly forbidding such programs.
A hidden backdoor in the modified version of Android run by nine Samsung Galaxy models could allow attackers to spy remotely on user data - and even snoop on users using hardware such as the GPS system, camera and microphone.
Boeing has unveiled a smartphone fit for James Bond - the Boeing Black, which can connect to satellites and secret government telecoms networks, will self-destruct if tampered with, deleting all data and rendering the device useless.
It is now possible to enable HTTPS secure browsing on every website using Firefox for Android, the Electronic Frontier Foundation has announced.
Researchers as Ben Gurion university in Israel have discovered a vulnerability in Android 4.4 KitKat that allows an attacker to intercept and divert secure virtual private network (VPN) traffic.
At least two recent models of Google’s flagship Nexus Android handsets can be crashed remotely - simply by sending them a flurry of SMS text messages, a Dutch researcher has warned.
Androids destroyed: Hacking contest pays out $50,000 “bug bounties” for successful attacks on Nexus 4 and Galaxy S4
“Pinkie Pie”, an under-21 hacker won $50,000 at the Pwn2Own contest, as he used drive-by attacks to take over a Samsung Galaxy S4 and a Nexus 4, both of which run Android.
Cybercriminals are already targeting mobile banking apps as a “way in” to customer accounts – as witnessed in ESET’s discovery of a new, advanced Trojan, Hesperbot. But a new IBM system may help secure smartphones – by using near-field communications chips (NFC) for an additional layer of security. It’s the first system to allow “two-factor”
Most smartphones today contain an accelerometer - without them, the latest fitness apps don’t work - but a Stanford researchers has shown that the sensor can be used to “fingerprint” a device, handing valuable data to unscrupulous advertisers.
Plugging your smartphone in to charge up could soon offer an alert that you’ve contracted malware - with a new charger that lights up when it detects malicious software. For businesses, it could be a "last line of defense" against employees bringing infected devices to work.