Android
Beware!! Scammers use Google Calendar Notifications to steal the User’s Money and Identity
Scammers are abusing Google Calendar services to trick victims into giving away the personal and financial information such as passwords, card details, or account...
Android
Newly Discovered Tap ’n Ghost Attack Let Hackers to Remotely Control Android Smartphones
A new attack dubbed Tap ‘n Ghost targets NFC enabled Android smartphones, let attackers to trigger malicious events on the victim's smartphone and to...
Android
Tor Browser 8.5 Released – Tor For Android is Now Available from Google Play
Tor Browser 8.5 officially launched now along with the new version of Tor for Android which is also first time available in Google play...
Adware
Chinese Video App VidMate Stealing Personal Data, Drain Battery, Fake Ad Click to Generate Revenue From 500 Million Android Users
Most popular video app VidMate caught up for various malicious activities in their customers Android mobiles including drain users battery, collecting personal information, Create...
Android
WhatsApp Hacked – Attackers Exploit iPhone or Android device by Making a WhatsApp call
A critical remote code execution vulnerability in WhatsApp allows hackers to deploy spyware remotely on the vulnerable devices.The vulnerability was discovered earlier this month...
Android
Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android
A new form of a sophisticated phishing attack on Android Chrome let hackers hide the original address bar' screen space by displaying its...
Adware
Google Banned An App Developer whose Apps Installed 500 Million Times Followed the Previous Massive Ad Fraud Campaign
Google has taken action against Chinese Android developer and banned from play store for committing ad fraud and canceling the app ownership.DO Global,...
Android
Security Vulnerabilities in Sony Smart TVs Expose WiFi Passwords and Stored Images
Security vulnerabilities in Android-based Sony smart TVs allow attackers to access WiFi Passwords and the images stored on the devices.The vulnerability resides in the...