Android Application Penetration Testing

Android Application Penetration Testing – Part 5

Android Components Three of the four component types—activities, services, and broadcast receivers—are activated by an asynchronous message called an...
Black Rose Lucy

Malware-as-a-Service – New Black Rose Lucy Malware Targets Android Devices With a Special Logic...

Malware-as-a-Service(MaaS) is a practice in which the attackers puts the malware for sale allows anyone with little technical knowledge can launch an attack. Checkpoint research...
Free Android VPN apps

Hidden Malware and Privacy Risks with the Top Free Android VPN apps in the...

Many of the VPN apps in the google play store failed to protect the user privacy, potentially malicious and spy on users...
WhatsApp hacked

WhatsApp Hacked – Attackers Exploit iPhone or Android device by Making a WhatsApp call

A critical remote code execution vulnerability in WhatsApp allows hackers to deploy spyware remotely on the vulnerable devices. The...
SMS gateways

Hackers Exploit the SMS Gateway to Sent Text Millions of U.S Phone Numbers

Hackers who have compromised SmartTVs, Chromecast devices and thousands of vulnerable printers to promote PewDewPie Youtube channel, now back to form and exploits...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security