It’s billed as the hottest new messaging app on the planet, and it’s rocketed into the top ten in the U.S. in just a year. But how safe are you on Yik Yak?
Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.
Google has outlined the enhanced security credentials of the upcoming Android 5.0 – nicknamed Lollipop – in an official blog post.
Nearly a billion users of a dozen chat apps for Android including popular apps such as Instagram, Oovoo, OKCupid and Grindr could be at risk from eavesdroppers and snoopers after University of New Haven researchers found serious data leakage problems.
Another major phone brand has added biometric security to a flagship smartphone as Huawei unveiled the ultra-thin Mate P7, complete with a rather unique fingerprint scanner, at Berlin’s IFA 2014 show.
Seventeen mysterious cellphone towers have been found in America which can only be identified by a heavily customized handset built for Android security – but seem to be built to spy on passing cellphone users, according to Popular Science.
Cuando hace apenas dos meses empezamos a hablar de cómo los delincuentes estaban migrando el malware de tipo ransomware (secuestro de dispositivo) a dispositivos Android, ya preveíamos que su evolución sería rápida. No obstante, esta rapidez con la que han ido adaptando sus amenazas para pc a smartphones con Android nos ha sorprendido. Antecedentes y
Encontramos un RAT, o troyano de acceso remoto (por sus siglas en inglés), que se hace pasar por varias aplicaciones legítimas para Android. Observemos más de cerca la forma en que se propaga este malware, lo que hace y su conexión con una noticia que hace poco llegó a primera plana.
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play store, where malware does show up from time to time but is much better controlled, thanks to the Google Bouncer, than on alternative app stores.
Cubriendo BlackHat USA 2014, vimos cómo se podría explotar vulnerabilidades en el sistema de control de las operadoras para comprometer teléfonos.
Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…
Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German security researchers.
A high-profile ‘connected’ lighting system had a critical vulnerability which allowed attackers to take control of the entire system, switching off light bulbs at will, and which could be executed by criminals within 100 feet of a home.
A hack shown off by Dutch security researchers allows an attacker to ‘take over’ Google’s new Glass headset, and send pictures and videos from the frames’ built in camera, to another computer – in effect, seeing through their victim’s eyes