More than 50 malicious apps that designed for kids as coloring apps or games found on Google play has no functionality other than displaying ads.
Mobile security researcher LUKAS STEFANKO identified the malicious app and reported to Google Security team, now most of the apps have been removed and few still available to download.
The functionality of the app is to only display the interstitial ads that cover the entire device screen.
Once these malicious apps installed and launched it displays error and hides from user view and continues to run the background.
Stefanko spotted that one of the apps was even in the trending list, at sixth place in the Educational category. Altogether these malicious apps are downloaded for more than 350,000 times.
All these applications hide after installation from home screen, even if the user tries to remove manually it is a tough job as the app hides between other application changes its name and icon.
Recently a new Android malware spotted that spying users WhatsApp messages and other sensitive data such as browsing history, photos.
Serious checks need to be done about the apps you download, particularly if you’re using an Android operating system.
Because of Android’s open network, apps are more likely to have malware built in, that will harm your phone with no knowledge of it whatsoever.
A recent technical study conducted by researchers at Trinity College Dublin has revealed that Google…
In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in a…
Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based Security…
A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the United…
Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from Kerberos…
Security researchers have uncovered sophisticated obfuscation techniques employed by APT28, a Russian-linked advanced persistent threat…