Android

New WhatsApp RCE Vulnerability Let Remote Hackers Steal the Files in Your Android Phone Using Malformed GIF’sNew WhatsApp RCE Vulnerability Let Remote Hackers Steal the Files in Your Android Phone Using Malformed GIF’s

New WhatsApp RCE Vulnerability Let Remote Hackers Steal the Files in Your Android Phone Using Malformed GIF’s

A security researcher discovered a critical Double-free vulnerability in WhatsApp allows remote attackers to take control of your Android phone and…

6 years ago
9 Android Zero-day Vulnerabilities Affects Billions of Android Devices – Hackers Perform DOS, RCE, Make, Deny & Spoof Calls9 Android Zero-day Vulnerabilities Affects Billions of Android Devices – Hackers Perform DOS, RCE, Make, Deny & Spoof Calls

9 Android Zero-day Vulnerabilities Affects Billions of Android Devices – Hackers Perform DOS, RCE, Make, Deny & Spoof Calls

Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice…

6 years ago
Top 10 Best Android Games for 2019Top 10 Best Android Games for 2019

Top 10 Best Android Games for 2019

Are you looking for the Best Android games? Here we have list Top 15 best Android games free with an…

6 years ago
Beware!! 29 Malicious Apps Found on Google Play with Over 10 Million+ DownloadsBeware!! 29 Malicious Apps Found on Google Play with Over 10 Million+ Downloads

Beware!! 29 Malicious Apps Found on Google Play with Over 10 Million+ Downloads

Google has removed 29 malicious adware apps that have more than 10 million downloads from the Google play store. These…

6 years ago
One-Click iOS and Android Exploits Targets Tibetan Users Via WhatsApp Message to Deliver MalwareOne-Click iOS and Android Exploits Targets Tibetan Users Via WhatsApp Message to Deliver Malware

One-Click iOS and Android Exploits Targets Tibetan Users Via WhatsApp Message to Deliver Malware

A new highly sophisticated malware campaign targets Tibetan groups to exploit and install spyware on their iPhone and Android devices.…

6 years ago
Beware!! 25 Malicious Apps with Over 2.1 Million Downloads Found in the Google PlayBeware!! 25 Malicious Apps with Over 2.1 Million Downloads Found in the Google Play

Beware!! 25 Malicious Apps with Over 2.1 Million Downloads Found in the Google Play

Researchers uncovered several malicious apps in the Google play poses as photo utility app and a fashion app. These malicious…

6 years ago
Selfie Camera apps with 1.5M+ Downloads Push Ads, Brick the DevicesSelfie Camera apps with 1.5M+ Downloads Push Ads, Brick the Devices

Selfie Camera apps with 1.5M+ Downloads Push Ads, Brick the Devices

Everyone wants to have a perfect selfie to share with friends or to post online, selfie filter camera apps are…

6 years ago
ES-File Explorer Vulnerability Let Attacker Access All Your Personal Files In Your Phone Remotely within 2 MinES-File Explorer Vulnerability Let Attacker Access All Your Personal Files In Your Phone Remotely within 2 Min

ES-File Explorer Vulnerability Let Attacker Access All Your Personal Files In Your Phone Remotely within 2 Min

A high severity authentication bypass vulnerability that resides in ES-File Explorer due to insecure FTP activity let remote attackers gain…

6 years ago
Threat Actor Sells Entire Source Code of Popular Android RAT in the Dark Web for $15,000Threat Actor Sells Entire Source Code of Popular Android RAT in the Dark Web for $15,000

Threat Actor Sells Entire Source Code of Popular Android RAT in the Dark Web for $15,000

Dark web forums are the nesting grounds for threat actors to distribute hacking tools and other illicit documents. These dark…

6 years ago
Unpatched Android Zero-day Vulnerability Let Hackers Escalate the Privilege and Take Control Of The DeviceUnpatched Android Zero-day Vulnerability Let Hackers Escalate the Privilege and Take Control Of The Device

Unpatched Android Zero-day Vulnerability Let Hackers Escalate the Privilege and Take Control Of The Device

Researchers disclosed an unpatched Android zero-day vulnerability that allows local attackers to escalate the privilege and take control of the…

6 years ago