Archive for the ‘Android hacking’ Category

TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services

March 25th, 2020
The malware authors behind TrickBot banking Trojan have developed a new Android app that can intercept one-time authorization codes sent to Internet banking customers via SMS or relatively more secure push notifications, and complete fraudulent transactions. The Android app, called "TrickMo" by IBM X-Force researchers, is under active development and has exclusively targeted German users

Posted in Android, Android hacking, banking malware, banking Trojan, hacking software, Malware apps, TrickBot Banking Malware | Comments (0)

Android Cookie-Stealing Malware Found Hijacking Facebook Accounts

March 13th, 2020
A new simple but dangerous strain of Android malware has been found in the wild that steals users' authentication cookies from the web browsing and other apps, including Chrome and Facebook, installed on the compromised devices. Dubbed "Cookiethief" by Kaspersky researchers, the Trojan works by acquiring superuser root rights on the target device, and subsequently, transfer stolen cookies to

Posted in Android hacking, Android Malware, browser cookies, cookies stealing, cyber security, hack android mobile, malware, password security, password stealer | Comments (0)

Mysterious malware that re-installs itself infected over 45,000 Android Phones

October 29th, 2019
Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides on the infected devices and can reportedly reinstall itself even after users delete it, or factory reset their devices. Dubbed Xhelper, the malware has already infected more than 45,000 Android devices in just the last six months and is continuing to spread by

Posted in Android, Android hacking, Android Malware, Android Security, cyber security, malware, Malware apps, smartphone hacking | Comments (0)

1-Click iPhone and Android Exploits Target Tibetan Users via WhatsApp

September 24th, 2019
A team of Canadian cybersecurity researchers has uncovered a sophisticated and targeted mobile hacking campaign that is targeting high-profile members of various Tibetan groups with one-click exploits for iOS and Android devices. Dubbed Poison Carp by University of Toronto's Citizen Lab, the hacking group behind this campaign sent tailored malicious web links to its targets over WhatsApp,

Posted in Android hacking, browser exploit, browser security, cyber security, hacking news, iPhone hacking, Tibetan | Comments (0)

Severe Flaws in SHAREit Android App Let Hackers Steal Your Files

February 27th, 2019
Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and steal files containing sensitive from a victim's device. With over 1.5 billion users worldwide, SHAREit is a popular file sharing application for Android, iOS, Windows and Mac that has been designed to help people share

Posted in Android APK, Android File encryption, Android hacking, hacking news, how to hack android, shareit app | Comments (0)

Google Makes 2 Years of Android Security Updates Mandatory for Device Makers

October 25th, 2018
When it comes to security updates, Android is a real mess. Even after Google timely rolls out security patches for its Android platform, a major part of the Android ecosystem remains exposed to hackers because device manufacturers do not deliver patches regularly and on a timely basis to their customers. To deal with this issue, Google at its I/O Developer Conference May 2018 revealed the

Posted in Android, Android hacking, android hacking software, Android Security, Android Security Updates, Android Vulnerability, cybersecurity, Google Android, how to hack android | Comments (0)

Google Adds Control-Flow Integrity to Beef up Android Kernel Security

October 12th, 2018
Google has added a new security feature to the latest Linux kernels for Android devices to prevent it against code reuse attacks that allow attackers to achieve arbitrary code execution by exploiting control-flow hijacking vulnerabilities. In code reuse attacks, attackers exploit memory corruption bugs (buffer overflows, type confusion, or integer overflows) to take over code pointers stored

Posted in Android, Android hacking, Android Kernel, Android Security, Buffer Overflow, Linux kernel, Linux kernel development, Linux kernel exploit, memory corruption vulnerability | Comments (0)

New Ransomware Threatens to Send Your Internet History & Private Pics to All Your Friends

July 13th, 2017

After WannaCry and Petya ransomware outbreaks, a scary (but rather creative) new strain of ransomware is spreading via bogus apps on the Google Play Store, this time targeting Android mobile users.

Dubbed LeakerLocker, the Android ransomware does not encrypt files on victim’s device, unlike traditional ransomware, rather it secretly collects personal images, messages and browsing history and

Posted in Android hacking, Android Malware, android ransomware, Cyber Attack, hacking android phone, hacking news, ransomware, ransomware malware, web browsing history | Comments (0)

New Ransomware Threatens to Send Your Internet History & Private Pics to All Your Friends

July 13th, 2017

After WannaCry and Petya ransomware outbreaks, a scary (but rather creative) new strain of ransomware is spreading via bogus apps on the Google Play Store, this time targeting Android mobile users.

Dubbed LeakerLocker, the Android ransomware does not encrypt files on victim’s device, unlike traditional ransomware, rather it secretly collects personal images, messages and browsing history and

Posted in Android hacking, Android Malware, android ransomware, Cyber Attack, hacking android phone, hacking news, ransomware, ransomware malware, web browsing history | Comments (0)