Please turn on your JavaScript for this page to function normally.
Trojanized versions of 20,000 popular apps found secretly rooting Android devices

Lookout researchers have discovered some 20,000 apps that secretly root users’ phone and install themselves as system applications, which makes them able to access …

11 zero-days uncovered in Samsung Galaxy S6 Edge

An internal contest between the North American and European members of Google’s Project Zero has resulted in the discovery of eleven high-impact zero-day flaws affecting …

XcodeGhost gets updated, now hits also US users

The XcodeGhost threat is far from over, and iOS users are still in danger of unknowingly using apps infected with it, FireEye researchers have warned.“After monitoring …

Open source tool checks for vulnerabilities on Android devices

OEMs like Samsung and HTC run heavily customized versions of Android. Unfortunately, the OEM patch deployment infrastructure is disorganized and too often end users are left …

Signal for Android finally out, offers end-to-end encrypted calls and messages

Open Whisper Systems (formerly Whisper Systems) has finally released the Android version of its popular free, open source iOS app for end-to-end encrypted voice calls.Signal …

Security update kills several critical bugs in Android Marshmallow

Google’s November Android security update carries fixes for seven vulnerabilities, including two remote code execution flaws that are rated “critical” …

Android infostealer masquerading as MS Word document

A clever Android information-stealing piece of malware is lurking on third-party app markets popular with Chinese users.“The malware portrays itself as a data file with …

The top threat vector for mobile devices? Porn

As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …

Think twice about Android root

In recent years the practice of Android rooting, that is the process of allowing an Android phone or tablet to bypass restrictions set by carriers, operating systems or …

A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers

As an ever increasing number of mobile carriers around the world switches to from using GSM/UMTS networks to Long-Term Evolution (LTE 4G) ones, both carriers and users are …

Attackers can use Siri, Google Now to secretly take over smartphones

A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …

Which Android smartphones are most secure?

87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools