Tag: Android security
Malicious Apps from Google PlayStore Bypassing SMS-Based Two-Factor Authentication and Steal OTPs in SMS
Researchers discovered new malicious Android apps from Google Play Store bypassing SMS-based two-factor authentication (2FA) mechanisms and steal the OTP without SMS's permission.
Google recently...
Tor Browser 8.5 Released – Tor For Android is Now Available from Google Play
Tor Browser 8.5 officially launched now along with the new version of Tor for Android which is also first time available in Google play...
Dangerous Function in UC Browser Lets Hackers to Hijack Millions Of Android Users via...
Potentially dangerous future in UC browser puts Hundreds of millions of Android users under high risk that allows hackers to hijack Android devices...
Android Application Penetration Testing – Part 5
Android Components
Three of the four component types—activities, services, and broadcast receivers—are activated by an asynchronous message called an intent.
Activating Components
Intents bind individual components to...
Android Released First Security updates for 2019 & Fixed 13 vulnerabilities – Update Your...
Google released a first security update for Android in 2019 and fixed 13 critical vulnerabilities that affected latest Android versions 7.0, 7.1.1,...
Android Application Penetration testing Part 3
With my last article(Android Application Penetration testing Part 1), (Android Application Penetration testing Part 2)we had look at basic architecture and penetration testing tools....
Google Released Security Updates for More than 40 Android Security vulnerabilities
Google released security updates under Android security bulletin for more than 40 Android security vulnerabilities that affected Android devices.
Security updates contain 2 patch level, the...
Android Application Penetration Testing – Part 6
Let the fun begins. As per Owasp, Vulnerabilities has been categorized as TOP 10.
M1 - Improper Platform Usage ...
Android Mobile Antivirus App Collecting User Data Without Device Owner’s Permission
To keep our personal data safe we use Antivirus, but what results if the Antivirus solution can't be trusted. Security experts form Check Point...
Millions of Android Phones including latest Versions Vulnerable to Cloak & Dagger attack
Cloak & Dagger attack discovered by security experts from Georgia Institute of Technology, which allows attackers to get complete control over your device.
These attack...