Sunday, January 12, 2025

Android

Beware!! Scammers use Google Calendar Notifications to steal the User’s Money and Identity

Scammers are abusing Google Calendar services to trick victims into giving away the personal and financial information such as passwords, card details, or account...

Newly Discovered Tap ’n Ghost Attack Let Hackers to Remotely Control Android Smartphones

A new attack dubbed Tap ‘n Ghost targets NFC enabled Android smartphones, let attackers to trigger malicious events on the victim's smartphone and to...

Tor Browser 8.5 Released – Tor For Android is Now Available from Google Play

Tor Browser 8.5 officially launched now along with the new version of Tor for Android which is also first time available in Google play...

Chinese Video App VidMate Stealing Personal Data, Drain Battery, Fake Ad Click to Generate Revenue From 500 Million Android Users

Most popular video app VidMate caught up for various malicious activities in their customers Android mobiles including drain users battery, collecting personal information, Create...

WhatsApp Hacked – Attackers Exploit iPhone or Android device by Making a WhatsApp call

A critical remote code execution vulnerability in WhatsApp allows hackers to deploy spyware remotely on the vulnerable devices.The vulnerability was discovered earlier this month...

Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android

A new form of a sophisticated phishing attack on Android Chrome let hackers hide the original address bar' screen space by displaying its...

Google Banned An App Developer whose Apps Installed 500 Million Times Followed the Previous Massive Ad Fraud Campaign

Google has taken action against Chinese Android developer and banned from play store for committing ad fraud and canceling the app ownership.DO Global,...

Security Vulnerabilities in Sony Smart TVs Expose WiFi Passwords and Stored Images

Security vulnerabilities in Android-based Sony smart TVs allow attackers to access WiFi Passwords and the images stored on the devices.The vulnerability resides in the...