Home Search

Android - search results

If you're not happy with the results, please do another search
vulnerabilities in DSP Chip, vulnerabilities in Qualcomm MSM Chip

Qualcomm’s MSM Chips’ Vulnerability Affects 40% of All Mobile Phones

0
Researchers at Check Point found a vulnerability in Qualcomm’s mobile station modem (MSM) chips, which are trusted with cellular communication in nearly 40% of...
Mobile Apps Security, mobile apps

40 Mobile Apps with Over 100 Mn Downloads Found Leaking AWS API Keys

0
Security threats from mobile applications continue to be a major risk for developers and users. Cybercriminals often try to exploit vulnerabilities or misconfigurations in...
Ritesh Chopra

Mobile Side of Technology Adoption Still Continues to Present a Challenge

0
India has transformed into a mobile-first economy. The ease of accessibility and cheaper data make these a primary source of entertainment. Given the transition...
Malware and Vulnerability Trends Report, Mobile malware threats

97% of Organizations Suffered a Mobile Malware Attack in 2020

0
The number of threats that our mobile devices encounter increases every year and the risks from mobile malware has a large share in it....
Fleeceware Applications

Google Play Restricts QUERY_ALL_PACKAGES Permission

0
Threat actors often leverage fleeceware or fake apps to drop malware on consumers’ devices. Usually, cybercriminals use these kinds of apps to break into...
Fleeceware Applications

Fleeceware Apps Continue to Deceit Consumers; Scammers Earn S400 Mn

0
Cybersecurity experts discovered hundreds of fleeceware mobile applications on the Apple Store and Google Play Store tricking thousands of unwitting users into paying unnecessary...
Chinese actors target telecom

Chinese State-sponsored Cybercriminals Got an “Evil Eye” on Uyghur Community

0
Threat intelligence analysts from Facebook disrupted cyber espionage campaigns by Chinese state-sponsored cybercriminal groups. Tracked as “Earth Empusa” or “Evil Eye,” the criminal group is allegedly...
BotenaGo, malware over encrypted connections

Beware! Malware Posing as Clubhouse App Making Rounds

0
Clubhouse, a popular invite-only audio chat app, ran into severe security issues after threat actors allegedly misused the app’s popularity. Security experts recently found...
phishing, Telegram bots and Google Forms used for phishing

1 in 15 Government Employees Exposed to Phishing Attacks

0
Android users who are running older versions of the operating system are prone to various mobile takeover attacks.  A recent analysis from mobile security...
Acronis Cyber Readiness Report, cyberattacks in India, cybercrime in India, India’s Private Sector

Multiple Indian Banks Encounter Phishing Attacks

0
Sensitive financial information is always a lucrative target for cybercriminals. Threat actors often use advanced techniques in their phishing campaigns to harvest victims’ banking...

MOST POPULAR

RECENT POSTS

Cybersec Europe

HackVSIT 6.0

CyberX Bahrain

Infosecurity Europe