Please turn on your JavaScript for this page to function normally.
Hong Kong protesters hit with malware, turn to “off-the-grid” chat app

The pro-democracy protests started by Hong Kong students’ and backed by the Occupy Central protesters (Central is the name of Hong Kong’s financial district) are …

Kali NetHunter turns Nexus devices into portable hacking tools

Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community …

Google will display Android devs’ physical address

Developers/publishers of paid Android apps and apps that feature in-app purchases will, by the start of next month, be required to add a physical contact address to their …

Critical Android Browser bug threatens users’ privacy

Earlier this month, security researcher Rafay Baloch has released a proof-of-concept exploit that takes advantage of a vulnerability in an Android Browser’s security …

Threema
Secure mobile messaging with Threema

If you're concerned about the privacy of your mobile communications, there's a variety of tools you can use to protect yourself. Today I'm taking a closer look at Threema, a …

Researchers compile list of Android apps that allow MitM attacks

Around 350 Android apps that can be downloaded from Google Play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to …

Malicious and risky apps on Android and iOS

Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc. In this podcast recorded at Black Hat …

Sneak attack through smartphone shared memory

A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of …

Control Android app permissions with NativeWrap

Tired with using mobile apps that demand unneeded permissions that open the door to data collection and worse? Researchers from North Carolina State University have come up …

Most popular Android apps open users to MITM attacks

An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be …

Gyroscopes on Android devices can be used to eavesdrop on users’ conversations

If you think that denying an app permission to use your phone’s microphone is enough to prevent it from listening in on your conversations, think again, as a group of …

Android ransomware masquerades as Symantec mobile AV

A new piece of Android ransomware is doing rounds, and is tricking users into installing it by posing as a legitimate AV app. The malware sports a logo similar to that of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools