Thursday, January 9, 2025

Android

Syrian State-sponsored Hacking Group uses COVID-19 Themes to Attacks Android users

Lookout researchers have uncovered a mobile surveillance campaign that has used more than 71 malicious Android apps to spy on Syrian users since the...

Unkillable Android XHelper Malware Reinstall Itself Again After Factory Reset

The Android XHelper malware was first identified in October 2019, it is known for its persistent capabilities.Once it gets installed to the device, the...

Tekya Clicker Malware Hides in 56 Apps that Downloaded 1 Million Times Worldwide From Google Play

Google implements a number of ways to filter the malicious apps getting into the play store, but still, attackers continue to find ways to...

Hackers Spread Android Malware Via Coronavirus Safety App & Gain Contacts Access to Infect All of Them via SMS

Researchers discovered a new Coronavirus safety Android App that infects Android users via malware, as a result, it hefty usage charges for victims.Attackers taking...

Google Advanced Protection Program for High-Risk Users Now Includes Malware Protection

Google launched its Advanced Protection Program in the year 2017, the program aimed to protect users against phishing, blocking malicious apps, and to protect...

Cookiethief – Android Malware that Gains Root Access to Steal Browser & Facebook App Cookies

Researchers uncovered a new powerful Android malware called "Cookiethief " that lunched by unknown cybercriminals to steal cookies from the browsers and Facebook app...

Google Patches the Critical MediaTek rootkit Vulnerability that Affects Millions of Android Devices

Google patches a critical vulnerability with MediaTek rootkit chips that affect millions of devices with chipsets from MediaTek.MediaTek is a large Taiwanese chip design...

Major Vulnerabilities in Top Free Android VPN Apps Let Hackers Stealing Passwords, Photos, Messages From 120 Million Users

Researchers discovered major vulnerabilities in several Free VPN apps for Android that allow attackers to perform dangerous Man-in-the-Middle Attacks and steal usernames, passwords, photos,...