Android apps have always remained an easy target of exploitation primarily because of the high number of Android users across the globe. In the latest research...
According to the latest findings from TeamSIK, a group of security researchers associated with Darmstadt, Germany-based Fraunhofer Institute for Secure Information Technology,...
Android Malware which has admirable listening quality, force victim to speak unlock code. The latest variant of the Android ransomware named Android.Lockdroid.E...
Latest Android.Lockdroid.E variant uses speech recognition instead of typing for unlock code input. Being a good listener is normally considered an admirable...
Cybercriminals prefer crypto-ransomware as it not only successfully targets Windows desktop but also those devices that run on MacOS or Linux. Now,...
The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks. Further investigation...
You can safeguard your online privacy when you are using an Android or iOS device to browse the internet by using TOR....
Mobile security experts from Skycure have found two methods for bypassing the security containers put around “Android for Work,” allowing attackers to...
Israeli members of the armed forces have remained under the radar of cyber spies and espionage actors for a very long time....
Short Bytes: Verify Apps is a cloud-based security feature in the Android operating system. It regularly scans the device for potentially malicious...
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed...
Islamic State supporters are being targeted with a modified version of the Telegram Android app that contains a version of the OmniRAT...
Xagent for Macs steals passwords, grabs screenshots, and exfiltrates iPhone backups. APT28, the Russian hacking group tied to last year’s interference in...
Cyber-security researchers at Securify, a Dutch security firm, have been evaluating the Marcher Android banking Trojan for the past six months. They...
Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to...
The Android Nougat 7.1.2 Beta is for developers, but as before anyone will be able to install it on a compatible device. Read...
Cyber criminals prefer targeting Android devices due to its open-source model which means the source code is freely available for anyone to...
Downloading an application means that you are allowing the software open access to your mobile phone and all the data that is...
CheckPoint, a renowned security firm, has discovered that at least one app on Google Play Store is infected with Charger Malware. Charger...
Pattern lock on Android smartphones might be the quickest and simplest way to gain get entry to to the device. a collection of...
CheckPoint security firm has detected a presence of the notorious HummingWhale malware in 20 Android apps, which are quite commonly used by Android...