Browsing tag

android

How to use headphones or Bluetooth to hack and take control of any Android device

A recent research published by vulnerability testing specialists from Purdue University details a new exploit that abuses some Android operating system smartphones through the use of malicious peripheral devices (specifically through Bluetooth and USB). The application processor of almost any relatively recent smartphone model uses the AT Command Interface to launch high-level commands to the […]

11 Best Drawing Apps In 2019 For Creative Minds (Android and iOS)

As a kid I have always loved to doodle around; I remember carrying those A4-size sheets and crayons to my school only to draw in the free time. Over a decade later, I still wish to do that, but less time at my disposal always restricts me. However, if you still have your creative side […]

Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices

Hundreds of millions of devices, especially Android smartphones and tablets, using Qualcomm chipsets, are vulnerable to a new set of potentially serious vulnerabilities. According to a report cybersecurity firm CheckPoint shared with The Hacker News, the flaws could allow attackers to steal sensitive data stored in a secure area that is otherwise supposed to be […]

Google Makes ‘App Defense Alliance’ To Spot Malicious Apps Easily

Android has a major problem with malicious apps affecting user data every now and then. Every year Google takes various initiatives to combat it and to ensure the safety of its users. The latest in the efforts by Google is the ‘App Defense Alliance‘ in which the search giant, for the first time, has sought […]

How To Install OTA Updates Using Android Recovery And ADB Sideload?

Even if the smartphone manufacturer has begun the rollout process, it could take weeks before the Over-the-Air update arrives on your Android smartphone. To make sure the download servers are not overcrowded, manufacturers purposely make the OTA update (system update) process slow. However, only a few know that phone brands compensate users by uploading the […]

Hackers can unlock a smartphone with fingerprints on glass of water

Fingerprints have long been considered one of the most reliable security measures, thanks to their biometric nature verified by science. But, this is largely changing with hackers catching up. Such was seen at the GeekPwn conference held in Shanghai recently where the X-Lab security team from a firm named Tencent gave a demonstration of how […]

Hackers Can Plant Malware In Your Android Smartphone Via NFC

Android devices have a not-so-common feature dubbed NFC Beam which is intended for sharing files, videos, apps and photos between two devices via NFC (Near Field Communication) radio waves. A bug (CVE-2019-2114) has affected the Android devices running Android 8.0 (Oreo) or above that allows a bad actor to plant malware on your smartphone via […]

Beware! This Android Malware Can’t Be Removed Even After Factory Reset

MalwareBytes has identified a new malware strain that has affected 45,000 Android devices to date. The malware dubbed xHelper is seven months old and has already reached the MalwareBytes’ top 10 list of malware in the month of August. According to security researchers, this malware has one of the most efficient methods to disguise itself […]

Malicious Android Dropper App ‘Xhelper’ Reinstall Itself after Uninstall – Infected 45K Devices

Researchers observed a persistent malicious Android dropper app dubbed XHelper capable of reinstalling itself again if users uninstalled from the devices. The malicious app is persistent, once the app installed it hides and downloads other malware, displays pop-up ads. The malware found to be downloaded from unknown sources, not available with Google play. Android Trojan […]

Mysterious malware that re-installs itself infected over 45,000 Android Phones

Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides on the infected devices and can reportedly reinstall itself even after users delete it, or factory reset their devices. Dubbed Xhelper, the malware has already infected more than 45,000 Android devices in just […]

How to Create a Dating App: A to Z Guide

Back in the days, finding a date was as easy as walking into a pub and ordering a drink for the person you like. However, in just over a decade, things have dramatically changed. Today, we have smartphones! And thanks to smartphones, we are introduced to a whole new world of meeting & networking.  Although […]

9 Best Parental Control Apps All Parents Need In 2019

Of late, the use of devices (mostly smartphones) has become bothersome; we tend to use them a lot. As we adults can go haywire with its usage (we all know how Snapchat, Instagram, and WhatsApp have become really dear to us), children ought to follow in our footsteps too. That’s when we need parental control […]

How To Safeguard Android Apps From Hackers?

It is needless to say that mobile applications are all the hype of this decade and others to come. There are a million applications available across all app stores and hundreds of new applications are published every day. To be precise, an average adult has about 26 to 55 apps in the smartphone device.  This […]

Redmi 8A Is Proof That No One Does Budget Smartphones Better Than Xiaomi

Chinese company Xiaomi has been providing us with well-specced devices since its inception and the one thing which acted as a sigh of relief for users, especially in India, is the budget smartphones by the company. Adding to its list of budget smartphones, Xiaomi has added a new one, christened the Redmi 8A, which is […]

UC Browser’s 500+ Million Users At Risk As Browser Violated Policies

Google Play Store policies clearly state that Android apps cannot update or modify from third party sources other than Google Play Store themselves. But a report suggests that the UC browser went ahead and violated Google Play Store policies. The popular browser, with over 600 million downloads, made its users vulnerable to man-in-the-middle (MiTM) attacks […]

How your work phone could be a huge security threat

You know about cyber security and mobile network vulnerabilities. You’ve heard of DDoS attacks. You might have even moved on from your petsname123 password.  Reports show, however, that around one in three organizations have willingly sacrificed mobile device security for business performance. Although we’ve heard of these risks, their intangibility and a seeming lack of […]