Category: Android
Android CTF — KGB Messenger
Android CTF — KGB MessengerThis is a write up of an open source CTF practice challenge. The aim of this CTF is to learn how to reverse ... Read More
80% of all Android apps encrypt traffic by default
Google keeps pushing in its mission for broader encryption adoption Android commands the lion’s share of the mobile operating system market. And with so many ... Read More
Fake Android apps uploaded to Play store by notorious Sandworm hackers
The Russian ‘Sandworm’ hacking group has been caught repeatedly uploading fake and modified Android apps to Google’s Play Store. . Fake Android apps uploaded to ... Read More
Facebook, Twitter profiles slurped by mobile apps using malicious SDKs
Hundreds of users gave permission to these third-party apps to access their social media accounts, but the apps got more handsy than that. . Facebook, ... Read More
Google plans to take Android back to ‘mainline’ Linux kernel
Android could be returning to its roots. . Google plans to take Android back to ‘mainline’ Linux kernel Naked SecuritySource link Read More
Brand new Android smartphones shipped with 146 security flaws
If you think brand new, just-out-of-the-box Android smartphones are immune from security vulnerabilities - think again. . Brand new Android smartphones shipped with 146 security ... Read More
NowSecure Discovers Critical Android Vuln That May Lead to Remote Code Execution
NowSecure Discovers Critical Android Vuln That May Lead to Remote Code Execution Introduction In the course of performing Android application security testing at NowSecure, I ... Read More
Get the Facts: Mobile App Breaches Are Growing
Get the Facts: Mobile App Breaches Are Growing While corporations widely recognize the convenience and productivity enhancements that mobile applications deliver to their customers and ... Read More
Google patches bug that let nearby hackers send malware to your phone
Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victim's phone . ... Read More