Think twice about Android root
In recent years the practice of Android rooting, that is the process of allowing an Android phone or tablet to bypass restrictions set by carriers, operating systems or …
A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers
As an ever increasing number of mobile carriers around the world switches to from using GSM/UMTS networks to Long-Term Evolution (LTE 4G) ones, both carriers and users are …
Attackers can use Siri, Google Now to secretly take over smartphones
A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …
Which Android smartphones are most secure?
87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …
Fake Android apps bypass Google Play store security
“ESET unveiled fake apps available at the official Google app store. Posing as popular game cheats, such as Cheats for Pou, Guide for SubWay and Cheats for SubWay, these …
Google patches Stagefright 2.0 on Nexus devices
Google has released its monthly security update for Nexus devices. Among the issues this update fixes are the two vulnerabilities in the stagefright and utils Android …
Top 5 Android Marshmallow enterprise security benefits
Google’s new Android Marshmallow operating system offers important new security and ease-of-use features that improve its functionality for both enterprise and individual …
New, improved Ghost Push variants continue to target Android users
“The danger of apps Trojanized with Ghost Push malware is far from over – according to Trend Micro researchers, the number of variants of the hard-to-remove …
Stagefright 2.0: A billion Android devices could be compromised
Most Android users are, once again, in danger of having their devices compromised by simply previewing specially crafted MP3 or MP4 files.Zimperium researchers, who were the …
Oysters tablet comes preinstalled with Trojanized Android firmware
“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …
Silent Circle launches Blackphone 2, delivering business and personal privacy
Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …
Chinese promotion company hijacks Android devices around the world
“A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The company misuses this …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems