Archive for the ‘how to hack android’ Category
Beware! If you are using UC Browser on your smartphones, you should consider uninstalling it immediately.
Why? Because the China-made UC Browser contains a "questionable" ability that could be exploited by remote attackers to automatically download and execute code on your Android devices.
Developed by Alibaba-owned UCWeb, UC Browser is one of the most popular mobile browsers, specifically
Posted in hack android mobile, hacking news, how to hack android, malware, man-in-the-middle attack, mobile browser, mobile hacking, Mobile Security, UC Browser, UC Web Browser | Comments (0)
Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and steal files containing sensitive from a victim's device.
With over 1.5 billion users worldwide, SHAREit is a popular file sharing application for Android, iOS, Windows and Mac that has been designed to help people share
Posted in Android APK, Android File encryption, Android hacking, hacking news, how to hack android, shareit app | Comments (0)
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users.
The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging
Posted in Android Malware, Android Security, clipboard hijacking, cryptocurrency, cyber security, how to hack android, malware, malware protection software | Comments (0)
Using an Android device?
Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.
Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of
Posted in cyber security, hack android mobile, hacking android phone, how to hack android, mobile exploit, mobile vulnerability, PNG Image Hack, remote code execution, Vulnerability | Comments (0)
When it comes to security updates, Android is a real mess.
Even after Google timely rolls out security patches for its Android platform, a major part of the Android ecosystem remains exposed to hackers because device manufacturers do not deliver patches regularly and on a timely basis to their customers.
To deal with this issue, Google at its I/O Developer Conference May 2018 revealed the
Posted in Android, Android hacking, android hacking software, Android Security, Android Security Updates, Android Vulnerability, cybersecurity, Google Android, how to hack android | Comments (0)
Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They have now shifted from traditional to more clandestine techniques that come with limitless attack vectors and are harder to detect.
Security researchers have discovered that one of the most dangerous Android banking Trojan families has now been modified to add a keylogger to its recent strain, giving
Posted in Android Banking Malware, android banking trojan, Android Malware, how to hack android, keylogger, keylogger tool, mobile hacking | Comments (0)
Google has released its latest monthly security update for Android devices, including a serious bug in some Broadcom Wi-Fi chipsets that affects millions of Android devices, as well as some iPhone models.
Dubbed BroadPwn, the critical remote code execution vulnerability resides in Broadcom’s BCM43xx family of WiFi chipsets, which can be triggered remotely without user interaction, allows a
Posted in Android Vulnerability, Broadcom, Broadcom Wifi chip, hacking news, how to hack android, how to hack iphone, iOS vulnerability, remote code execution, Vulnerability | Comments (0)
The brand new Android smartphone launched by Google just a few months back has been hacked by Chinese hackers just in less than a minute.
Yes, the Google’s latest Pixel smartphone has been hacked by a team white-hat hackers from Qihoo 360, besides at the 2016 PwnFest hacking competition in Seoul.
The Qihoo 360 team demonstrated a proof-of-concept exploit that used a zero-day vulnerability in
Posted in Android hacking, Chinese Hackers, google phone, Google Pixel phone, Google Security, hacking Google, hacking news, how to hack android, pwnfest, Vulnerability, Zero-Day Vulnerability | Comments (0)
A vulnerability in Chrome for Android is actively being exploited in the wild that allows hackers to quietly download banking trojan apps (.apk) onto victim’s’ device without their confirmation.
You might have encountered a pop-up advertisement that appears out of nowhere and surprise you that your mobile device has been infected with a dangerous virus and instructs you to install a security
Posted in android antivirus, Android Malware, Android Security, banking malware, banking Trojan, Best Android apps, hacking android phone, how to hack android, security application | Comments (0)
Security researchers have discovered a way to target a huge number of Android and iOS apps that could allow them to remotely sign into any victim’s mobile app account without any knowledge of the victim.
A group of three researchers – Ronghai Yang, Wing Cheong Lau, and Tianyu Liu – from the Chinese University of Hong Kong has found [PPT] that most of the popular mobile apps that support
Posted in android apps hack, android OAuth, Android Security, hacking android, how to hack android, iOS hacking, OAuth Implementation | Comments (0)